E-Commerce Security and Fraud Issues and Protections

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Ethics, Privacy and Information Security
Protection of Information Assets I. Joko Dewanto 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Lecture 4 ref: Chapter 10 E-Commerce Fraud and Security Copyright © 2010 Pearson Education, Inc. 1.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Ch.5 It Security, Crime, Compliance, and Continuity
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
THE INFORMATION SECURITY PROBLEM
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Our Digital World Second Edition
Securing Information Systems
Learning Objectives Understand the importance and scope of security of information systems for EC. Describe the major concepts and terminology of EC security.
Chapter 10 E-Commerce Security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Learning Objectives Understand the importance and scope of security of information systems for EC. Describe the major concepts and terminology of EC security.
E-Commerce Fraud احتيال and Security. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.Understand the importance and scope of security.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
7 Information Security.
E-commerceEssentials Kenneth C. Laudon Carol Guercio Traver first edition Copyright © 2014 Pearson Education, Inc.
IS Network and Telecommunications Risks Chapter Six.
Copyright © 2015 Springer Education 1 Lecture 6 ReF: chapter 10 E -C OMMERCE S ECURITY AND F RAUD I SSUES AND P ROTECTIONS.
1.Understand the importance and scope of the security of information systems for EC. 2.Describe the major concepts and terminology of EC security. 3.Learn.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
E-Commerce Security and Fraud Protection. Learning Objectives 1. Understand the importance and scope of security of information systems for EC. 2. Describe.
1.Understand the importance and scope of the security of information systems for EC. 2.Describe the major concepts and terminology of EC security. 3.Learn.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Securing Information Systems
Securing Information Systems
Learning Objectives Understand the importance and scope of security of information systems for EC. Describe the major concepts and terminology of EC security.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Security of E-commerce
Issues and Protections
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
How to Mitigate the Consequences What are the Countermeasures?
Chapter 9 E-Commerce Security and Fraud Protection
電子商務安全 Secure Electronic Commerce
Presentation transcript:

E-Commerce Security and Fraud Issues and Protections Chapter 10 E-Commerce Security and Fraud Issues and Protections

Learning Objectives Understand the importance and scope of security of information systems for EC. Describe the major concepts and terminology of EC security. Understand about the major EC security threats, vulnerabilities, and technical attacks. Understand Internet fraud, phishing, and spam. Describe the information assurance security principles. Identify and assess major technologies and methods for securing EC access and communications.

Learning Objectives Describe the major technologies for protection of EC networks. Describe various types of controls and special defense mechanisms. Describe consumer and seller protection from fraud. Discuss enterprisewide implementation issues for EC security. Understand why it is so difficult to stop computer crimes.

The Information Security Problem What Is EC Security? The Status of Computer Security in the United States Personal Security National Security Security Risks for 2014 and-2015

Major EC Security Management Concerns for 2011

The Information Security Problem Cyberwars and Cyberespionage Across Borders Cyberwarefare Attacking Information Systems Types of Attacks Corporate espionage Political espionage and warfare

The Information Security Problem The Drivers of EC Security Problems The Internet’s Vulnerable Design The Shift to Profit-Induced Crimes The Increased Volume of Wireless Activities and the Number of Mobile Devices The Globalization of the Attackers The *Darknet *Internet Underground Economy The Internet Silk Road *Keystroke logging (keylogging) The Explosion of Social Networking The Dynamic Nature of EC Systems and the Acts of Insiders The Sophistication of the Attacks The Cost of Cyber Crime

Basic E-Commerce Security Issues and Landscape Basic Security Terminology *Business continuity plan *Cybercrime *Cybercriminal *Exposure *Fraud *Malware (malicious software) *Phishing *Risk *Social engineering *Spam *Vulnerability *Zombie

Basic E-Commerce Security Issues and Landscape The EC Security Battleground The attacks, the attackers, and their strategies The assets that are being attacked (the targets) in vulnerable areas The security defense, the defenders, and their methods and strategy

The EC Security Battleground

Basic E-Commerce Security Issues and Landscape The Threats, Attacks, and Attackers Unintentional Threats Human Error Environmental Hazards Malfunctions in the Computer System Intentional Attacks and Crimes The Criminals and Methods *Hacker *Cracker

Basic E-Commerce Security Issues and Landscape The Targets of the Attacks in Vulnerable Areas Vulnerable Areas Are Being Attacked Vulnerability Information Attacking E-Mail Attacking Smartphones and Wireless Systems The Vulnerability of RFID Chips The Vulnerabilities in Business IT and EC Systems Pirated Videos, Music, and Other Copyrighted Material

Basic E-Commerce Security Issues and Landscape EC Security Requirements *Authentication *Authorization Auditing Availability *Nonrepudiation

Basic E-Commerce Security Issues and Landscape The Defense: Defenders, Strategy, and Methods EC Defense Programs and Strategy *EC security strategy *Deterrent methods *Prevention measures *Detection measures *Information assurance (IA) Possible Punishment Defense Methods and Technologies Recovery

Technical Malware Attack Methods: From Viruses to Denial of Service Technical and Nontechnical Attacks: An Overview The Major Technical Attack Methods Malware (Malicious Code): Viruses, Worms, and Trojan Horses * Viruses * Worms

The Major Technical Security Attack Methods

Technical Malware Attack Methods: From Viruses to Denial of Service * Macro virus (macro worm) * Trojan horse Some Recent Security Bugs: Heartbleed and Crytolocker * Denial-of-service (DoS) attack Web Server and Web Page Hijacking * Page hijacking * Botnets Malvertising

How a Computer Virus Can Spread

Nontechnical Methods: From Phishing to Spam and Fraud Social Engineering and Fraud Social Phishing *Phishing *Pharming Fraud and Scams on The Internet Examples of Typical Online Fraud Attacks E-Mail Scams Top 10 Attacks and Remedies *Identity Theft and Identify Fraud Cyber Bank Robberies

Social Engineering: From Phishing to Financial Fraud and Crime

How Phishing Is Accomplished

Nontechnical Methods: From Phishing to Spam and Fraud Spam Attacks *E-mail spam Typical Examples of Spamming *Spyware Social Networking Makes Social Engineering Easy How Hackers Are Attacking Social Networks Spam in Social Networks and in the Web 2.0 Environment *Search engine spam *Splog *Data Breach (Leak)

The Information Assurance Model And Defense Strategy Confidentiality, Integrity, and Availability *Confidentiality *Integrity *Availability Authentication, Authorization, and Nonrepudiation

The Information Assurance Model And Defense Strategy E-Commerce Security Strategy The Phases of Security Defense Prevention and deterrence (preparation) Initial response Detection Containment (contain the damage) Eradication Recovery Correction Awareness and compliance Security Spending Versus Needs Gap

E-Commerce Security Strategy Framework

The Information Assurance Model And Defense Strategy The Defense Side of EC Systems Defending access to computing systems, data flow, and EC transactions Defending EC networks General, administrative, and application controls Protection against social engineering and fraud Disaster preparation, business continuity, and risk management Implementing enterprisewide security programs Conduct a vulnerability assessment and a penetration test Assessing Vulnerabilities and Security Needs *Vulnerability assessment *Penetration test (pen test)

The Defense I: Access Control, Encryption, and PKI Authorization and Authentication Biometric Systems *Biometric authentication *Biometric systems Encryption and the One-Key (Symmetric) System *Encryption *Plaintext *Ciphertext *Encryption algorithm *Key (key value) *Key space *Symmetric (Private) Key Encryption

Symmetric (Private) Key Encryption

The Defense I: Access Control, Encryption, and PKI *Public key infrastructure (PKI) *Public (asymmetric) key encryption *Public key *Private key The PKI Process: Digital Signatures and Certificate Authorities *Digital signatures *Hash function *Message digest *Digital envelope *Certificate authorities (CAs) Secure Socket Layer (SSL) Other Topics and Methods of Defense

Digital Signature

The Defense II: Securing E-Commerce Networks *Firewalls *Packets The Dual Firewall Architecture: The DMZ *Personal Firewalls *Virtual private network (VPN) *Protocol tunneling *Intrusion Detection Systems (IDS) Cloud Computing Prevents DoS Attacks Honeynets and Honeypots *Honeynet *Honeypots E-Mail Security

The Two Firewalls: DMZ Architecture

The Defense III: General Controls, Spam, Pop Ups, Fraud, And Social Engineering Controls *Application controls General, Administrative, and Other Controls Physical Controls Administrative Controls Protecting Against Spam *CAN-SPAM Act

Major Defense Controls

The Defense III: General Controls, Spam, Pop Ups, Fraud, And Social Engineering Controls Protecting Your Computer from Pop-Up Ads Tools for Stopping or at Least Minimizing Pop-Ups Protecting against Other Social Engineering Attacks Protecting against Phishing Protecting against Malvertising Protecting Against Spyware Protecting Against Cyberwars

The Defense III: General Controls, Spam, Pop Ups, Fraud, And Social Engineering Controls Fraud Protection Business Continuity, Disaster Recovery, and Risk Management Risk-Management and Cost-Benefit Analysis

Business Continuity Services and IT Recovery Process

Implementing Enterprisewide E-Commerce Security The Drivers of EC Security Management Senior Management Commitment and Support EC Security Policies and Training Cyber Threat Intelligence (CTI) EC Risk Analysis and Ethical Issues *Business impact analysis (BIA) Ethical Issues

Enterprisewide EC Security and Privacy Model

Implementing Enterprisewide E-Commerce Security Why Is It Difficult to Stop Internet Crime? Making Shopping Inconvenient Lack of Cooperation by Business Partners Shoppers’ Negligence Ignoring EC Security Best Practices Design and Architecture Issues Lack of Due Care in Business Practices *Standard of due care Protecting Mobile Devices, Networks, and Applications Mobile Security Issues The Defense

Managerial Issues What steps should businesses follow in establishing a security plan? Should organizations be concerned with internal security threats? What is the key to establishing strong e-commerce security?

Summary The importance and scope of EC information security. Basic EC security issues. Threats, vulnerabilities, and technical attacks. Internet fraud, phishing, and spam. Information assurance. Securing EC access control and communications.

Summary Technologies for protecting networks. The different controls and special defense mechanisms. Protecting against fraud. Enterprisewide EC security. Why is it so difficult to stop computer crimes?