Download presentation
Presentation is loading. Please wait.
2
What is e-Commerce Security?
Anytime you go into a marketplace you take risks, including the loss of privacy (information about what you purchased). Your prime risk as a consumer is that you do not get what you paid for. As a merchant in the market, your risk is that you don’t get paid for what you sell. Typically e-commerce security is protection of three key points of vulnerability ? i. Client Computer ii. Communication pipeline iii. Server Computer
3
THE E-COMMERCE SECURITY ENVIRONMENT
4
Dimensions of E-Commerce Security
There are six key dimensions to e-commerce security: INTEGRITY NON-REPUDIATION AUTHENTICITY CONFIDENTIALITY PRIVACY AVAILABILITY
5
Integrity prevention against unauthorized data modification
Integrity refers to the ability to ensure that information being displayed on a Web site, or transmitted or received over the Internet, has not been altered in any way by an unauthorized party. Example :If someone added an extra bill to the envelope, which contained your credit card bill, he has violated the integrity of the mail.
6
Nonrepudiation participants do not deny (i. e
Nonrepudiation participants do not deny (i.e., repudiate) their online actions Nonrepudiation refers to the ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions. Example 1: An example of a repudiation incident would be a customer ordering merchandise online and later denying that he or she had done so.
7
Authenticity to ensure both identities (sender and receiver)
Authenticity refers to the ability to identify the identity of a person or entity with whom you are dealing on the Internet. How does the customer know that the Web site operator is who it claims to be? How can the merchant be assured that the customer is really who she says she is? Someone who claims to be someone he is not is “spoofing” or misrepresenting himself. Example: One instance of an authenticity security breach is “spoofing,” in which someone uses a fake address, or poses as someone else. This can also involve redirecting a Web link to a different address. Example: One instance of an authenticity security breach in which postman deliver the mail to a wrong address.
8
Confidentiality protection against unauthorized data disclosure
Confidentiality refers to the ability to ensure that messages and data are available only to those who are authorized to view them. Example: One type of confidentiality security breach is “sniffing” in which a program is used to steal proprietary information on a network including messages, company files, or confidential reports. Example: Bank send credit card pin on your address but someone (postman etc.) read it. (it is breach of confidentiality)
9
Privacy provision of data control and disclosure
The ability to control the use of information a customer provides about him or herself to an e-commerce merchant. Example: a privacy security breach is a hacker breaking into an e-commerce site and gaining access to credit card or other customer information. This violates the confidentiality of the data and also the privacy of the people who supplied the data. Example: a privacy security breach is a Merchant sell or misuse the profiles of customers.
10
Availability prevention against data delays or removal
This is the ability to ensure that an e-commerce site continues to function as intended. Example 1 :One availability security breach is a DoS (Denial of Service) attack in which hackers flood a Web site with useless traffic that causes it to shut down, making it impossible for users to access the site. Example 2:If the post office destroys your mail or the postman takes one month to deliver your mail, he has impacted the availability of your mail.
11
CUSTOMER AND MERCHANT PERSPECTIVES ON THE DIFFERENT DIMENSIONS OF E-COMMERCE SECURITY
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.