#5- MGT447 Ch-05 E-commerce Security and Payment SystemsLaudon 9e Updated 2023-24 working(1) (3).ppt

Full Transcript

The E-commerce Security Environment Overall size and losses of cybercrime unclear  Reporting issues 2011 CSI survey: 46% of respondent firms detected breach in last year Underground economy marketplace:  Stolen information stored on underground...

The E-commerce Security Environment Overall size and losses of cybercrime unclear  Reporting issues 2011 CSI survey: 46% of respondent firms detected breach in last year Underground economy marketplace:  Stolen information stored on underground economy servers Copyright © 2013 Pearson Education, Inc. Slide 5-1 What Is Good E-commerce Security? To achieve highest degree of security  New technologies  Organizational policies and procedures  Industry standards and government laws Other factors  Time value of money  Cost of security vs. potential loss  Security often breaks at weakest link Copyright © 2013 Pearson Education, Inc. Slide 5-2 The E-commerce Security Environment Figure 5.1, Page 266 Copyright © 2013 Pearson Education, Inc. Slide 5-3 The Tension Between Security and Ease ofOther use Values  The more security measures added, the more difficult a site is to use, and the slower it becomes Public safety and criminal uses of the Internet  Use of technology by criminals to plan crimes or threaten nation-state Copyright © 2013 Pearson Education, Inc. Slide 5-4 Security Threats in the E-commerce Environment Three key points of vulnerability in e-commerce environment: 1. Client 2. Server 3. Communications pipeline (Internet communications channels) Copyright © 2013 Pearson Education, Inc. Slide 5-5 Most Common Security Threats in the E-commerce Malicious codeEnvironment  Viruses  Worms  Trojan horses  Drive-by downloads  Backdoors  Bots, botnets  Threats at both client and server levels Copyright © 2013 Pearson Education, Inc. Slide 5-6 Most Common Security Potentially Threats (cont.) unwanted programs (PUPs)  Browser parasites  Adware  Spyware Phishing  E-mail scams  Social engineering  Identity theft Copyright © 2013 Pearson Education, Inc. Slide 5-7 Most Common Security Hacking Threats (cont.)  Hackers vs. crackers  Types of hackers: White, black, grey hats  Hacktivism Cybervandalism:  Disrupting, defacing, destroying Web site Data breach  Losing control over corporate information to outsiders Copyright © 2013 Pearson Education, Inc. Slide 5-8 Most Common Security Threats Credit card (cont.) fraud/theft  Hackers target merchant servers; use data to establish credit under false identity Spoofing (Pharming) Spam (junk) Web sites Denial of service (DoS) attack  Hackers flood site with useless traffic to overwhelm network Distributed denial of service (DDoS) attack Copyright © 2013 Pearson Education, Inc. Slide 5-9 Most Common Security Sniffing Threats (cont.)  Eavesdropping program that monitors information traveling over a network Insider attacks Poorly designed server and client software Social network security issues Mobile platform security issues  Same risks as any Internet device Cloud security issues Copyright © 2013 Pearson Education, Inc. Slide 5-10 Technology Solutions Protecting Internet communications  Encryption Securing channels of communication  SSL, VPNs Protecting networks  Firewalls Protecting servers and clients Copyright © 2013 Pearson Education, Inc. Slide 5-11 Encryption Encryption  Transforms data into cipher text readable only by sender and receiver  Secures stored information and information transmission  Provides 4 of 6 key dimensions of e-commerce security: Message integrity Nonrepudiation Authentication Confidentiality Copyright © 2013 Pearson Education, Inc. Slide 5-12 Symmetric Key Encryption Sender and receiver use same digital key to encrypt and decrypt message Requires different set of keys for each transaction Strength of encryption  Length of binary key used to encrypt data Advanced Encryption Standard (AES)  Most widely used symmetric key encryption  Uses 128-, 192-, and 256-bit encryption keys Other standards use keys with up to 2,048 bits Copyright © 2013 Pearson Education, Inc. Slide 5-13 Public Key Encryption Uses two mathematically related digital keys  Public key (widely disseminated)  Private key (kept secret by owner) Both keys used to encrypt and decrypt message Once key used to encrypt message, same key cannot be used to decrypt message Sender uses recipient’s public key to encrypt message; recipient uses private key to decrypt it Copyright © 2013 Pearson Education, Inc. Slide 5-14 Public Key Encryption using Digital Signatures and Hash Hash function: Digests  Mathematical algorithm that produces fixed-length number called message or hash digest Hash digest of message sent to recipient along with message to verify integrity Hash digest and message encrypted with recipient’s public key Entire cipher text then encrypted with recipient’s private key—creating digital signature—for authenticity, nonrepudiation Copyright © 2013 Pearson Education, Inc. Slide 5-15 Digital Envelopes Address weaknesses of:  Public key encryption Computationally slow, decreased transmission speed, increased processing time  Symmetric key encryption Insecure transmission lines Uses symmetric key encryption to encrypt document Uses public key encryption to encrypt and send symmetric key Copyright © 2013 Pearson Education, Inc. Slide 5-16 Digital Certificates and Public Key Infrastructure (PKI)includes: Digital certificate  Name of subject/company  Subject’s public key  Digital certificate serial number  Expiration date, issuance date  Digital signature of CA Public Key Infrastructure (PKI):  CAs and digital certificate procedures  PGP Copyright © 2013 Pearson Education, Inc. Slide 5-17 Limits to Encryption Solutions Doesn’t protect storage of private key  PKI not effective against insiders, employees  Protection of private keys by individuals may be haphazard No guarantee that verifying computer of merchant is secure CAs are unregulated, self- selecting organizations Copyright © 2013 Pearson Education, Inc. Slide 5-18 Securing Channels of Secure Communication Sockets Layer (SSL) and Transport Layer Security (TLS)  Establishes a secure, negotiated client- server session in which URL of requested document, along with contents, is encrypted Virtual Private Network (VPN):  Allows remote users to securely access internal network via the Internet Copyright © 2013 Pearson Education, Inc. Slide 5-19 Protecting Networks Firewall  Hardware or software  Uses security policy to filter packets  Two main methods: Packet filters Application gateways Proxy servers (proxies)  Software servers that handle all communications originating from or being sent to the Internet Copyright © 2013 Pearson Education, Inc. Slide 5-20 Protecting Servers and Operating Clients system security enhancements  Upgrades, patches Anti-virus software:  Easiestand least expensive way to prevent threats to system integrity  Requires daily updates Copyright © 2013 Pearson Education, Inc. Slide 5-21 Management Policies, Business Procedures, and Public Worldwide, Laws spend companies $60 billion on security hardware, software, services Managing risk includes  Technology  Effectivemanagement policies  Public laws and active enforcement Copyright © 2013 Pearson Education, Inc. Slide 5-22 A Security Plan: Risk Management Policies assessment Security policy Implementation plan  Securityorganization  Access controls  Authentication procedures, including biometrics  Authorization policies, authorization management systems Security audit Copyright © 2013 Pearson Education, Inc. Slide 5-23 The Role of Laws and Public Policy tools for Laws that give authorities identifying, tracing, prosecuting cybercriminals:  National Information Infrastructure Protection Act of 1996  USA Patriot Act  Homeland Security Act Private and private-public cooperation  CERT Coordination Center  US-CERT Government policies and controls on encryption software  OECD, G7/G8, Council of Europe, Wassener Arrangement Copyright © 2013 Pearson Education, Inc. Slide 5-24 Types of Payment Systems Cash  Most common form of payment  Instantly convertible into other forms of value  No float Checking transfer  Second most common payment form in United States Credit card  Credit card associations  Issuing banks  Processing centers Copyright © 2013 Pearson Education, Inc. Slide 5-25 Types of Payment Systems Stored (cont.) value  Funds deposited into account, from which funds are paid out or withdrawn as needed  Debit cards, gift certificates  Peer-to-peer payment systems Accumulating balance  Accounts that accumulate expenditures and to which consumers make period payments  Utility, phone, American Express accounts Copyright © 2013 Pearson Education, Inc. Slide 5-26 Payment System Stakeholders Consumers  Low-risk, low-cost, refutable, convenience, reliability Merchants  Low-risk, low-cost, irrefutable, secure, reliable Financial intermediaries  Secure, low-risk, maximizing profit Government regulators  Security, trust, protecting participants and enforcing reporting Copyright © 2013 Pearson Education, Inc. Slide 5-27 E-commerce Payment Credit cards Systems  44% of online payments in 2012 (U.S.) Debit cards  28% online payments in 2012 (U.S.) Limitations of online credit card payment  Security, merchant risk  Cost  Social equity Copyright © 2013 Pearson Education, Inc. Slide 5-28 Alternative Online Payment Systems Online stored value systems:  Based on value stored in a consumer’s bank, checking, or credit card account  e.g., PayPal Other alternatives:  Amazon Payments  Google Checkout  Bill Me Later  WUPay, Dwolla, Stripe Copyright © 2013 Pearson Education, Inc. Slide 5-29 Mobile Payment Systems Use of mobile phones as payment devices established in Europe, Japan, South Korea Near field communication (NFC)  Short-range (2”) wireless for sharing data between devices Expanding in United States  Google Wallet Mobile app designed to work with NFC chips  PayPal  Square Copyright © 2013 Pearson Education, Inc. Slide 5-30 Digital Cash and Virtual Digital Currencies cash  Based on algorithm that generates unique tokens that can be used in “real” world  e.g., Bitcoin Virtual currencies  Circulate within internal virtual world  e.g., Linden Dollars in Second Life, Facebook Credits Copyright © 2013 Pearson Education, Inc. Slide 5-31 Electronic Billing Presentment and Payment (EBPP) Online payment systems for monthly bills 50% of all bill payments Two competing EBPP business models:  Biller-direct (dominant model)  Consolidator Both models are supported by EBPP infrastructure providers Copyright © 2013 Pearson Education, Inc. Slide 5-32

Use Quizgecko on...
Browser
Browser