Module 2 Data Analytics Using Python
Module 2 Data Analytics Using Python
E-commerce attacks can come in many forms that can disrupt your ecommerce platform and
your customers’ accounts and data. Earning the trust of your customers requires a consistent
awareness of the evolving types of fraud and cyberattacks to help you ensure solutions are in
place across your sales funnel.
1. Financial fraud
Financial fraud takes several forms. It involves hackers gaining access to your customer's
personal information or payment information, then selling that information on the black
market. It also involves fraudsters using stolen credit card information to make illegitimate
purchases from your e-commerce store.
2. Phishing
Your customers are the target in a phishing scam, where a fraudster sends messages or emails
pretending to be you with the goal of obtaining their private information. These messages
may contain logos, URLs, and other information that appears to be legitimate, but it won't be
you sending it. They'll ask customers to verify their account by logging in and then use the
information to steal personal data.
3. Spamming
4. Malware
Malware refers to malicious programs such as spyware, viruses, trojan horses, and
ransomware. Hackers install it on your computer system and spread it to your customers and
administrators, where it might swipe sensitive data on their systems and from your website.
5. Bad bots
People are generally aware that bots are all over the Internet, obtaining information about our
habits and behaviours. Your competition, however, could use bots to gather information
about your inventory and prices. They then use that information to change their prices. Or
hackers can send malicious bots to e-commerce checkout pages to buy large amounts of a
product and scalp it for up to 10 times the list price.
Distributed denial of service attacks happens when your servers receive an overwhelming
amount of requests from various IP addresses—usually untraceable—that cause your server
to crash. That means your e-commerce store isn't available to visitors, which disrupts your
sales.
7. Fake return and refund fraud
Fraudsters can obtain money from you by committing fake returns and refund fraud in many
ways. Some use a stolen credit card to purchase merchandise, then claim that the card is
closed and request a refund to another card. Others use counterfeit receipts to request refunds
for items they haven't purchased.
8. Man-in-the-middle attacks
With technology evolving, so are hackers' schemes. Man-in-the-middle attacks allow the
hacker to listen in on the communications of e-commerce website users. These users are
tricked into using a public wireless network, enabling hackers to access their devices and see
their browsing history. They can also access credit card information, passwords, and
usernames.
An address verification system compares the customer's billing address against the credit card
issuer's information on file. If the addresses don't match, the system prevents the transaction
from going through.
Stronger passwords
Many e-commerce businesses don't require their users to provide strong passwords, making
client accounts easy to hack. Implement a system that requires your customers to use strong
passwords with letters, numbers, and symbols to make their accounts difficult to hack into.
While you're at it, make sure you and your administration have secure passwords, and ensure
user access is restricted to those who need it. When employees are terminated, revoke all
system access immediately.
Payment gateways
Rather than being responsible for storing and securing your clients' information, use a third
party such as PayPal or Stripe to handle payment transactions separately from your website.
This keeps your customers' information safer and makes you less attractive to hackers.
HTTPS
Many e-commerce businesses still use HTTP protocols, which are vulnerable to attacks.
HTTPS is more secure and protects sensitive information. Before switching to HTTPS, you'll
need an up-to-date SSL certification from your hosting company. It's worth it to give your
customers peace of mind and protect their information—and your business.
E payment system.
Card payments – Card payments are done via cards e.g. credit cards, debit
cards, smart cards, stored valued cards, etc. In this mode, an electronic payment
accepting device initiates the online payment transfer via card
Credit/ Debit card – An e payment method where the card is required for
making payments through an electronic device.
Smart card – Also known as a chip card, a smart card, a card with a
microprocessor chip is needed to transfer payments.
Stored value card – These types of cards have some amount of money stored
beforehand and are needed to make funds transfer. These are prepaid cards like
gift cards, etc.
Direct debit – Direct debit transfers funds from a customer’s account with the
help of a third party
E-cash – It is a form where the money is stored in the customer’s device, which
is used for making transfers.
It is a virtual wallet, in the form of an app that sits on a mobile device. Mobile
wallet stores card information on a mobile device.
The user-friendly nature of mobile wallets makes them easier to use. It offers a
seamless payment experience making customers less dependent on cash.
Each part of the code contains information. This information can be merchant’s
details, transaction details, etc. To make payments, one has to scan the QR code
with a mobile device.
The customer needs to tap or hover the payment device or a card near the
payment terminal, earning it a name, ‘tap and go’.
These payments are replacing the need to enter the PIN for making transactions
making these payments more accessible and easy to use.
Payments are done via Wearable devices – Wearable devices are rapidly
becoming popular among customers.
These devices are connected to the customer’s bank account and are used to
make online payments.
An example of a wearable used for making an online payment is a smartwatch.
Working of e payment
If the recipient can't open the document with the signer's public key, that
indicates there's a problem with the document or the signature. This is how
digital signatures are authenticated.
Digital certificates, also called public key certificates, are used to verify that the
public key belongs to the issuer. Digital certificates contain the public key,
information about its owner, expiration dates and the digital signature of the
certificate's issuer. Digital certificates are issued by trusted third-party
certificate authorities (CAs), such as DocuSign or GlobalSign, for example. The
party sending the document and the person signing it must agree to use a given
CA.
Digital signature technology requires all parties trust that the person who creates
the signature image has kept the private key secret. If someone else has access
to the private signing key, that party could create fraudulent digital signatures in
the name of the private key holder.
The reason for encrypting the hash instead of the entire message or document is
because a hash function can convert an arbitrary input into a fixed-length value,
which is usually much shorter. This saves time, as hashing is much faster than
signing.
The value of a hash is unique to the hashed data. Any change in the data -- even
a modification to a single character -- results in a different value. This attribute
enables others to use the signer's public key to decrypt the hash to validate the
integrity of the data.
If the decrypted hash matches a second computed hash of the same data, it
proves that the data hasn't changed since it was signed. But, if the two hashes
don't match, the data has either been tampered with in some way and is
compromised or the signature was created with a private key that doesn't
correspond to the public key presented by the signer. This signals an issue with
authentication.
The two types of PKC algorithms are RSA, which is an acronym named after
this algorithm's inventors: Rivest, Shamir and Adelman, and Digital Signature
Algorithm (DSA). PKC encryption evolved to meet the growing secure
communication demands of multiple sectors and industries, such as the military.
Public key cryptography involves a pair of keys known as a public key and a
private key (a public key pair), which are associated with an entity that needs to
authenticate its identity electronically or to sign or encrypt data. Each public
key is published and the corresponding private key is kept secret. Data that is
encrypted with the public key can be decrypted only with the corresponding
private key.
RSA public key pairs can be any size. Typical sizes today are 1024 and 2048
bits.
Figure 1 shows you a simplified view of how public key cryptography works.
Figure 1. Public-key encryption