Download presentation
Presentation is loading. Please wait.
Published byRyan Euell Modified over 9 years ago
1
CYBER CRIMES IN E-BUSINESS
2
What is E-Business E-business (electronic business), is the conduct of business on the Internet, not only buying and selling but also servicing customers and collaborating with business partners.
3
EXAMPLE OF E-BUSINESS Types B2C (Amazon) B2B (Freemarkets) C2B (Priceline) C2C (eBay, eBid, Napster) B2E (Mellon)
4
Forms of e-business e-Banking services e-Shopping (E-books and E-music) e-Food e-Hotel e-Ticket e-Learning
5
Why we Adapt E-business Only takes 3 minutes to find and order a book! 1. Start Internet 2. Search 3. Checkout
6
+ve & -ve aspects Pros Shop 24 hours a day Less traveling Quick access to information Increased product choices Greater price information Participate in reviews Fast delivery Electronic communities Cons Lack of security Fraud Cannot touch items Selection is difficult Potential breakdown of human relationships
7
How people become victims….
8
A Typical E-commerce Transaction
9
Vulnerable Points in an E-commerce Environment SOURCE: Boncella, 2000.
10
who are the criminals & what are their motives
11
Recognising Your Attacker Attacker External Intruder Internal Intruder Sophisticated Crackers Cookbook Crackers Dissatisfied Current employee Skilled Former employee
12
criminals and their motives Internal and external attackers share similar motivations: greed Wickedness Revenge misguided intellectual challenge of creating havoc within large systems.
13
who are the criminals and what are their motives Attackers Share Motivations No matter who will be responsible for it, a deliberate cyber attack can: destroy an asset (in which case, it retains no value), corrupt an asset (reducing its value), deny access to an asset (which still exists, but is unattainable), or result in the theft of an asset (which retains inherent value, but its possession changes).
14
Assets that could be lost through electronic crime include: banking and financial transactions data information related to a business’ competitive position command and control system data for satellite systems and aircraft intellectual property (processes, methods, trade secrets, proprietary data, and other intangible assets) litigation-sensitive documents personal identification data (whose loss can lead to “identity theft” or stalking)
15
TOOLS AND TECHNIQUES Used in cyber crime
16
Tools of the intruders trade Anonymous re-mailers: Machines on the Internet configured to receive and re-send traffic by replacing the original source address of the sender with the address of the anonymous remailer machine. Used by intruders to mask their identities. Internet packet filters or “sniffers:” Software that allows intruders to capture network traffic. Nukers: Software tools used by intruders to destroy system log trails. Password crackers: Software that allows intruders to “break” encrypted password files stolen from a victim’s network server.
17
Tools of the intruders trade Scanners: Automated software that helps intruders identify services running on network machines that might be exploited. Spoofers: Software tools that allow intruders to pretend to be as other users. Steganography: A method of encrypting and hiding data in graphics or audio files. Used by intruders to spy, steal, or traffic in information via electronic dead drops, for example, in Web pages. Trojan programs: A legitimate program altered by the injection of unauthorised code into that program causing it to perform unknown (and hidden) functions to the legitimate user/system owner. Intruders use them to create undocumented “backdoors” into network systems.
18
SECURITY THREATS IN E-BUSINESS
19
Malicious code Hacking and cyber vandalism Credit card fraud Denial of Service Attacks Sniffing Insider Jobs
20
How to prevent Cyber crime
21
Update OS Antivirus protection Anti-spam and Trojan protection Good legal policies Preventing E-business crimes
22
Using the computer at workplace – between efficiency and privacy Include the Policy on how to use Internet at workplace as a part of the labour contract Training the employees on usage of Internet and software Training the employees on how they should treat confidential information and the essential passwords Preventing E-business crimes
23
Don't accept orders unless full address and phone number present Be wary of different "bill to" and "ship to" addresses Be careful with orders from free email services Be wary of orders that are larger than typical amount Pay extra attention to international orders When in doubt, call the customer to confirm the order Use software or services to fight fraud When you’ve found fraud, contact your merchant bank immediately
24
Survey of 2010
25
http://www.ic3.gov/media/annualreport/2010_ic3report.pdf Internet Crime Report 2010
26
TOP 10 CRIMES
27
Where sholuld we report www.nr3c.gov.pk/contact.html
28
How to register complaints Simply write down your application (in English or in Urdu), narrate your complete problem, provide as much evidences, details as you can and send it to FIA National Response Center for Cyber Crimes(NR3C). Address this application to, To Director Cyber Crimes, FIA Heaquarters, Islamabad Write down your problem, with complete details… and in the end mention your name, contact numbers and addresses. Fax: 051-9266435 Email: helpdesk@nr3c.gov.pk
30
Conclusion establish clear, focused, integrated security policies provide employees with appropriate awareness and technical training hire capable, trained workers and support them in establishing and maintaining an integrated response to attacks Silent awareness of electronic threats and risks throughout the organisation pursue the perpetrators of e-crimes against the organisation to the fullest extent of the law
31
references http://en.wikipedia.org http://www.ic3.gov/media/annualreport/2010_ic3report.pdf http://www.nr3c.gov.pk/ http://www.defence.pk/forums/current-events-social- issues/102896-pakistan-cyber-crime.html http://www.fbi.gov/scams-safety/e-scams
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.