More Related Content
laudon-traver_ec10_ppt_ch05.ppt laudon-traver_ec10_ppt_ch05.ppt Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ... Secure your network to secure your reputation and your income 04-1 E-commerce Security slides Similar to Understanding Security Measures in E-Commerce Systems (20)
Cisco Live Cancun PR Session Chapter 3: Information Security Framework Information Security for Enterprise CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) 1st Edition Data Breaches. Are you next? What does the data say? Borderware Security Platform Information Security Seminar www.more.net | University of Missouri Web Security Field Guide 1st Edition Steve Kalman CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) 1st Edition Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies Slicksheet best practicesforkeepingyourhomenetworksecure The top 5 basics fundamentals of network security cyberhunter solutions Small Business Administration Recommendations What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec Partner Zymbian & Fortinet webinar on Web2.0 security Recently uploaded (20)
hemostasis and its significance, physiology Cite It Right: A Compact Illustration of APA 7th Edition.pptx Neurology of Systemic disease all systems Compact First Student's Book Cambridge Official hsl powerpoint resource goyloveh feb 07.ppt CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI... principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt Chevening Scholarship Application and Interview Preparation Guide Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,... fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf Horaris_Grups_25-26_Definitiu_15_07_25.pdf anganwadi services for the b.sc nursing and GNM Health aspects of bilberry: A review on its general benefits CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf 2025 High Blood Pressure Guideline Slide Set.pptx 0520_Scheme_of_Work_(for_examination_from_2021).pdf Everyday Spelling and Grammar by Kathi Wyldeck Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx The TKT Course. Modules 1, 2, 3.for self study Neurological complocations of systemic disease Understanding Security Measures in E-Commerce Systems
- 2. The E-commerce Security Environment
Figure 5.1, Page 252
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-2
- 3. Table 5.3, Page 254
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-3
- 4. The Tension Between Security and
Other Values
Ease of use
The more security measures added, the more
difficult a site is to use, and the slower it becomes
Public safety and criminal uses of the
Internet
Use of technology by criminals to plan crimes or
threaten nation-state
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
- 5. Vulnerable Points in an E-commerce
Transaction
Figure 5.3, Page 257
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
- 6. Most Common Security Threats in the
E-commerce Environment
Malicious code (malware, exploits)
Drive-by downloads
Viruses
Worms
Ransomware
Trojan horses
Backdoors
Bots, botnets
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6
- 7. Most Common Security Threats (cont.)
Potentially unwanted programs (PUPs)
Browser parasites
Adware
Spyware
Phishing
Social engineering
E-mail scams
Spear-phishing
Identity fraud/theft
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-7
- 8. Most Common Security Threats (cont.)
Hacking
Hackers vs. crackers
Types of hackers: White, black
Hacktivism
Cybervandalism:
Disrupting, defacing, destroying Web site
Data breach
Losing control over corporate information to outsiders
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-8
- 9. Most Common Security Threats (cont.)
Spoofing and pharming
Spam (junk) Web sites (link farms)
Denial of service (DoS) attack
Hackers flood site with useless traffic to overwhelm
network
Distributed denial of service (DDoS) attack
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-9
- 10. Most Common Security Threats (cont.)
Sniffing
Eavesdropping program that monitors information
traveling over a network
Insider attacks
Poorly designed server and client software
Social network security issues
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-10
- 11. Insight on Technology: Class Discussion
Think Your Smartphone Is Secure?
What types of threats do smartphones face?
Are there any particular vulnerabilities to this
type of device?
Are apps more or less likely to be subject to
threats than traditional PC software
programs?
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-11
- 12. Technology Solutions
Protecting Internet communications
Encryption
Securing channels of communication
SSL, VPNs
Protecting networks
Firewalls
Protecting servers and clients
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-12
- 13. Tools Available to Achieve Site Security
Figure 5.5, Page 276
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-13
- 14. Encryption
Encryption
Transforms data into cipher text readable only by sender
and receiver
Secures stored information and information transmission
Provides 4 of 6 key dimensions of e-commerce security:
Message integrity
Nonrepudiation
Authentication
Confidentiality
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-14
- 15. Securing Channels of Communication
Secure Sockets Layer (SSL)
Establishes secure, negotiated client–server
session
Virtual Private Network (VPN)
Allows remote users to securely access internal
network via the Internet
Wireless (Wi-Fi) networks
WPA2
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-15
- 16. Protecting Networks
Firewall
Hardware or software
Uses security policy to filter packets
Two main methods:
Packet filters
Application gateways
Proxy servers (proxies)
Software servers that handle all communications from or
sent to the Internet
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-16
- 17. Firewalls and Proxy Servers
Figure 5.11, Page 289
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-17
- 18. Protecting Servers and Clients
Operating system security
enhancements
Upgrades, patches
Anti-virus software
Easiest and least expensive way to prevent threats
to system integrity
Requires daily updates
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-18