Chapter 5 Electronic Commerce | Security

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Security Controls and Systems in E-Commerce
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
E-commerce business. technology. society. Kenneth C. Laudon
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 5 Security and Encryption
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
PART THREE E-commerce in Action Norton University E-commerce in Action.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Dimensions of E – Commerce Security
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 7: E-Commerce Security and Payment system
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
ACM 511 Introduction to Computer Networks. Computer Networks.
SECURITY IN E-COMMERCE Sheetal Chhabra. Introduction Contents Threats Threats to information security Acts of Human Error or failure Espionage/Trespass.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Computer threats, Attacks and Assets upasana pandit T.E comp.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Electronic Commerce Semester 1 Term 1 Lecture 14.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Electronic Banking & Security Electronic Banking & Security.
E-Commerce Infrastructure. Learning Objectives 1. Understand the major components of EC infrastructure. 2. Understand the importance and scope of security.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
E-FINANCE CHAPTER 7 SECURITY E-finance Log into the future, 2nd Edition, Thousand Oakes, London, Internet Banking and Its potential in TRNC, Zakaria Jado.
Chapter 5 Electronic Commerce | Security Threats - Solution
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Done by… Hanoof Al-Khaldi Information Assurance
Security and Encryption
Network Security (the Internet Security)
E-commerce business. technology. society. Kenneth C. Laudon
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Secure Software Confidentiality Integrity Data Security Authentication
Lecture 5. Security Threats
Chapter 17 Risks, Security and Disaster Recovery
Data & Network Security
Chapter 5 Electronic Commerce | Security Threats - Solution
Hackers and Crackers iJacsn.
Uses Uses of cryptography Lab today on RSA
BY GAWARE S.R. DEPT.OF COMP.SCI
E-commerce business. technology. society. Kenneth C. Laudon
Chapter 5 Electronic Commerce | Security
Lecture 1: Foundation of Network Security
Copyright © 2002 Pearson Education, Inc.
Another perspective on Network Security
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter 5 Electronic Commerce | Encryption
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Chapter 5 Electronic Commerce | Security Source: E-Commerce by K.C Laudon Organize by - Qasim Rafique System Analyst (Hailey College of Commerce | University of the Punjab

What is Security The state of being free from danger or threat. In information technology, security is the protection of information assets through the use of technology, processes, and training. Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall

E-Commerce Security E-commerce security is the protection of e-commerce assets from unauthorized access, use, disclose, alteration, or destruction. Protection of E-Commerce Environment such as : Client Computer (Customer) Communication Pipeline (Internet) Server Computer (Merchant) Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall

Dimension of E-Commerce Security Integrity Non – Repudiation Authenticity Confidentiality Privacy Availability Achieved through Encryption Technique i.e SSL Certificate - means Pages that contain https Protocol Depend on Merchant Credibility & Hardware, Software Infrastructure Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall

Integrity prevention against any one party from denying on an agreement after the fact This is the ability to ensure that information being displayed on a Web site or being transmitted/received over the Internet has not been altered in any way by an unauthorized party. Integrity ensures data remains as is from the sender to the receiver. Example 1: Postman Change the Letter content before delivering the post. Example 2: Customer Place $25 Order Amount on a website but Merchant Received $100 Order Amount. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Non – Repudiation prevention against any one party from denying on an agreement after the fact the ability to ensure that e-commerce participants do not deny their online actions. Example 1:An example of a repudiation incident would be a customer ordering merchandise online and later denying that he or she had done so. Example 2: Postman deliver the Post but Receiver denied . Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall

Authenticity authentication of data source Authenticity is the ability to identify the identity of a person or entity you are transacting with on the Internet. Example 1: One instance of an authenticity security breach is “spoofing,” in which someone uses a fake e-mail address, or poses as someone else. This can also involve redirecting a Web link to a different address. Example 2:One instance of an authenticity security breach in which postman deliver the mail to a wrong address. Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall

Confidentiality protection against unauthorized data disclosure Privacy concerns people or control over information, whereas confidentiality concerns data. Confidentiality: The ability to ensure that messages and data are available only to authorized viewers. One type of confidentiality security breach is “sniffing” in which a program is used to steal proprietary information on a network including e-mail messages, company files, or confidential reports. Example 1: Bank send credit card pin on your address but someone (postman etc) read it. (it is breach of confidentiality) Example 2: During Transaction some one hack your credit card detail from the communication pipeline(Internet) through some sniffing programs(Software’s) and no one (Customer, Merchant) knows it happened. Copyright © 2015Pearson Education, Inc. Publishing as Prentice Hall

Privacy provision of Customer Personal data control and disclosure The ability to control the use of information a customer provides about him or herself to an e-commerce merchant. Example 1: A hacker breaking into an e-commerce site and gaining access to credit card or other customer information. This violates the confidentiality of the data and also the privacy of the people who supplied the data. Example 2: Merchant disclose the personal information (profiles) of customers or sell them for financial gain. Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall

Availability prevention against data delays or removal This is the ability to ensure that an e-commerce site continues to function as intended. Availability ensures you have access and authorized to resources. Example 1 :One availability security breach is a DoS (Denial of Service) attack in which hackers flood a Web site with useless traffic that causes it to shut down, making it impossible for users to access the site. Example 2:If the post office destroys your mail or the postman takes one year to deliver your mail, he has impacted the availability of your mail. Example 3: insufficient Webservers leads to un-availability of website to customers. Copyright © 2015 Pearson Education, Inc. Publishing as Prentice Hall