In this chapter, the learning objectives are: Understand the scope of e-commerce crime and security problems, describe the key dimensions of e-commerce security, understand the tension between security and other values, identify the key security threats in the e-commerce environment.
Trang 1CSC 330 E-Commerce
Teacher
Ahmed Mumtaz Mustehsan
GM-IT CIIT Islamabad
Virtual Campus, CIIT
COMSATS Institute of Information Technology
T1-Lecture-9
Trang 3Understand the scope of e-commerce crime and
security problems
Describe the key dimensions of e-commerce security
Understand the tension between security and other
values
Identify the key security threats in the e-commerce
environment
Trang 4Online Robbery - Introduction
In comparison to robbing a bank, internet banking can
be robbed remotely and more safely
Stealing a music / video CD from shop is harder than downloading from illegal websites
If you take internet as a global market place; Many
fake websites exists online to trap users by putting
some attractive contents and extra ordinary deals and offers, making the remote users to provide their credit card information etc
One can not break into physical home easily and
breach the privacy but if the password of social
networking account is hacked then the privacy is
compromised
Trang 5Cyber Attack - Introduction
Denial of Service Attack (DOS):
When one computer sends or flood the high number of data packets to a targeted computer resulting in chocking the resources ( communication path, processor etc.)
Distributed Denial of Service Attack (DDOS)
when many computers attack on single websites, or
online system from many locations in a single time
resulting in overwhelming the system and creating
congestion and many other impairments and making the system or website unavailable for legitimate users
Trang 6Cyber Attack - Introduction
Botnet:
Artificially intelligent or robot computers can work
together A group of such computers (even in millions) capable of being managed remotely by single person
attack on some online system or website
Example:
In 2007 1 million computers were used in an organized attack on govt of Estonia’s important servers
Trang 7http://www.cs3inc.com/pk_whatisddos.html
Trang 8CYBER Warfare Reference for study
Russia – Estonia Cyber war
Trang 9Your PC may be part of Botnet
Botnets are responsible for over 80% of the spam sent
to the computer users
Some computer users download those spam files
because of having less knowledge
Some computers become infected because of
unavailability of antivirus software
Some computers are compromised by means of using pirated software
10 % of the world’s billion-plus computers on internet are capable of being captured by stealth malware
programs which are installed by clicking malicious links and downloading hidden files
Trang 10The E-commerce Security Environment
Overall size and losses of cybercrime unclear
Reporting issues
2008 CSI survey:
49% respondent firms detected security breach in last year
Of those that shared numbers, average loss $288,000
Underground economy marketplace
Stolen information stored on underground economy
servers
Credit cards, bank information, personal identity etc etc are sold at these servers
Trang 11Rates of different stolen objects at
Underground e market
Trang 12
1-Types of Attacks Against Computer Systems
Trang 13What Is Good E-commerce Security?
To achieve highest degree of security
Use of New technologies
Organizational policies and procedures
Industry standards and government laws
Other factors to be looked in:
Time value of Information
Cost of security vs potential loss
Security often breaks at weakest link
Trang 14
1-The E-commerce Security Environment
Trang 15Ideal E Commerce Environment
Capable of making secure commercial transaction
Achieving highest degree of security
Adopting new technologies
Giving awareness to users about online safety
Defining and understanding industrial standards
Implementing governments laws
Prosecuting the violators of laws
Trang 16
1-Dimensions of E-commerce Security
Trang 17Typical Transection facilitated by Technologies
Trang 18
1-The Tension Between Security and Other Values
Security vs ease of use
◦The more security measures added, the more difficult
a site is to use, and the slower it becomes
Security vs desire of individuals to act anonymously
◦Use of technology by criminals to plan crimes or
threaten nation-state
Trang 19Security Threats in the E-commerce
Trang 201-A Typical E-commerce Transaction
Trang 21Vulnerable Points in an E-commerce
Environment
1-SOURCE: Boncella, 2000.
Trang 22Most Common Security Threats
Malicious code
Viruses
◦virus is a computer program that has the ability to
replicate or make copies of itself, and spread to other files
Trang 23Most Common Security Threats in the
Trang 25◦ Monitors everything that you do and sends out reports to
If you have ever loaded ICQ on your PC you have Spyware
If you have ever loaded KAZAA on your PC you have Spyware
If you have ever loaded Quicken or TurboTax you have Spyware
Trang 26
1-Most Common Security Threats
◦Use information to commit fraudulent acts (access
checking accounts), steal identity
Hacking and cyber-vandalism
unauthorized access to a computer system
Trang 27Most Common Security Threats
community to demote a hacker with criminal intent
destroying Web site
grey hats are hackers who believe they are pursuing
some greater good by breaking in and revealing system flaws
Trang 28
1-Most Common Security Threats
Credit card fraud/theft
Fear of stolen credit card information deters online purchases
Hackers target merchant servers; use data to establish credit under false identity
Online companies at higher risk than offline
misrepresenting self by using fake e-mail address or other form of identification
spoofing a Web site also called Pharming:
Redirecting a Web link to a new, fake Web site
Spam/junk Web sites
Splogs
Trang 29Snoop and Sniff
Trang 30
1-Most Common Security Threats
Denial of service (DoS) attack
Hackers flood site with useless traffic to overwhelm
network
Distributed denial of service (DDoS) attack
Hackers use multiple computers to attack target
network
Sniffing
Eavesdropping program that monitors information
traveling over a network
Insider jobs
Single largest financial threat
Poorly designed server and client software
Trang 31The Virus: Computer Enemy Number One
Most serious attack on a client computer or a server in
an Internet environment is the virus
A virus is a malicious code that replicates itself and can
be used to disrupt the information infrastructure
Viruses commonly compromise system integrity,
circumvent security capabilities, and cause adverse
operation by taking advantage of the information system
of the network
Trang 32
Macro virus exploits the macro
commands in software applications such
as Microsoft Word
Trang 33Levels of Virus Damage
Trang 34
1-Steps for Antivirus Strategy
Establish a set of simple enforceable rules for others to follow
Educate and train users on how to check for viruses on a disk
Inform users of the existing and potential
threats to the company’s systems and the
sensitivity of information they contain
Periodically update the latest antivirus software
Trang 35Getting Rid of Viruses
Get a good Virus Projection Software
Free (not Recommended)
Trang 36Do not give users administrator privileges
Configure an mail gateway to block all executable mail attachments
e-Ensure desktop antivirus software signatures are up to date - http://www.grisoft.com
Trang 37End of: T1-Lecture-9
E Commerce Security Environment
Chapter-04
Part-I Thank You