E Commerce Security and Payment System
E Commerce Security and Payment System
E-commerce security is multi-layered, and must take into account new technology, policies and
procedures, and laws and industry standards. The diagram has Data in center. There are four concentric
ovals. From the inner-most oval to the outer-most one, the ovals are labeled as follows, Technology
Solutions, Organizational Policies and Procedures, and Laws and Industry Standards.
Example of nonrepudiation:
For merchant’s perspective, customer may deny that he has ordered product. Customer may also deny
that he has received the product.
For customer’s perspective the company may not fulfil the promised quality requirement. Or the
organization may claim that they did not receive money.
– Client (Customers)
In a typical e-commerce transaction, the customer uses a credit card and the existing credit payment
system.
The flow diagram depicts a typical e-commerce transaction. The steps involved in the transaction are as
follows. An Online consumer contacts an Online store through an Internet service provider. The online
store uses a Merchant website and Merchant web server which connects with a Database server which
connects with a Warehouse. The Customer credit card bank transacts with the Merchant bank through
the Merchant website and Merchant Web servers. All of the above transactions and connections are
two-way. Last, the Warehouse uses a Shipping service to ship the product to the Online consumer.
Vulnerable points in the process include web beacons (By using web beacon, third party can monitor the
activity of the users) in the Online consumer’s system, Wi-Fi listening wiretaps in the connection
between the consumer and Internet service provider, Customer list hacks in the online store’s system,
SQL injection attacks on the database server, DOS attacks, card theft, or hacking at the customer credit
card bank’s end, and security breaches at the point where the Customer credit card bank, Merchant
bank, and the Merchant web servers and Merchant website connect, and when the order is shipped to
the Online consumer.
SQL Injection:
SQL injection is a code injection technique that might destroy your database. SQL injection is one of the
most common web hacking techniques. SQL injection usually occurs when you ask a user for input, like
their username/user id, and instead of a name/id, the user gives you an SQL statement that you will
unknowingly run on your database.
Malicious Code:
An exploit is an object - such as a piece of code or string of commands- that takes advantage of a
vulnerability in a program to force it to behave unexpectedly.
An exploit kit is a tool used for automatically managing and deploying exploits against a target
computer. Exploit kits allow attackers to deliver malware without having advanced knowledge of the
exploits being used.
Malvertising:
Malvertising — or malicious advertising — is a relatively new cyberattack technique that injects
malicious code within digital ads. Difficult to detect by both internet users and publishers, these infected
ads are usually served to consumers through legitimate advertising networks.
Drive by downloads:
A drive-by download refers to the unintentional download of a virus or malicious software (malware)
onto your computer or mobile device. A drive-by download will usually take advantage of (or “exploit”)
a browser, app, or operating system that is out of date and has a security flaw.
Viruses:
Worms:
Ransomware
Holds a computer system, or the data it contains, hostage against its user by demanding a ransom.
Trozan Horse:
Software that appears to perform a desirable function for the user prior to run or install, but (perhaps in
addition to the expected function) steals information or harms the system
Backdoors:
Bots, botnets
The term botnet is actually short for “robot network”, which refers to a group of robot devices
(computers, mobile phones, IoT devices) that are now under the control of an attacking party. Typically
the devices in a botnet have been infected by malware, and the attacker controlling the botnet is called
a “bot herder”.
The devices under the control of a bot herder are called “zombie” devices, although sometimes they are
also called “bot devices” or just “bots
Botnet attack may contribute to various attacks like DDos attack, Spam attack, Data Breach, Monitoring,
Spreading the Botnet
Phishing:
• Any deceptive, online attempt by a third party to obtain confidential information for financial
gain
• Tactics
– Social engineering
– Spear phishing
Phishing attack is a social engineering attack involving trickery. It is mainly designed to gain access to
systems or steal data.
For example developing a webpage which looks like a home page of facebook and then share the link
through email or sms and ask the recipient to click on the link. When the recipients click on the link and
share his user name or password then his security information can be obtained by them.
Clicking on link in phishing email also downloads malware which makes the computer slower. Collecting
Bkash pin through phn call or sms is also a part of phishing.
Hackers:
Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones,
tablets, and even entire networks. Hackers are motivated by personal gain, to make a statement, or just
because they can.
Hackers vs Crackers:
The black hat hacker is mainly a cracker who have no legal access to system and steal information for
their personal gain using illegal tools.
The difference is, they don’t want to rob people nor want to help people in particular. Rather, they enjoy
experimenting with systems to find loopholes, crack defenses, and generally find a fun hacking
experience.
Tiger Teams:
In security work, a tiger team is a group that tests an organization's ability to protect its assets by
attempting to defeat its physical or information security. In this context, the tiger team is often a
permanent team as security is typically an ongoing priority
Cybervandalism:
Destructive cyberattacks without any obvious profit or ideological motive. Cyber vandals can deface
websites, disrupt a company's services, or delete databases.
Hacktivism:
Hacktivism occurs when political or social activists use computer technology to make a statement
supporting one of their causes.
Hacktivists' methods may include data theft, distributed denial of service (DDoS) attacks, website
defacement, or the use of social media to spread awareness about a cause.
DOS and DDOS attack:
A denial-of-service (DoS) attack is a tactic for overloading a machine or network to make it unavailable.
Attackers achieve this by sending more traffic than the target can handle, causing it to fail—making it
unable to provide service to its normal users.
Examples of targets might include email, online banking, websites, or any other service relying on a
targeted network or computer.
A distributed denial-of-service (DDoS) is a type of DoS attack where the traffic used to overwhelm the
target is coming from many distributed sources. This method means the attack can't be stopped just by
blocking the source of traffic.
DDoS smokescreening
DDoS attacks are the worst nightmare for an IT team. The sudden flood of internet traffic that they bring
can bring a system tumbling down. Even more so if your business primarily deals online – it could
absolutely cripple a business, potentially even putting you out of business.
But DDoS attacks could also be used to disguise data theft, as happened with Carephone Warehouse
two years ago. Hackers conducted an attack on Carphone Warehouse’s websites (including
onephoneshop.com and mobiles.co.uk) with junk traffic as a smokescreen, before breaking into systems
and stealing the personal details of 2.4m customers. In addition, up to 90,000 subscribers may have had
their card details stolen.
SQL Injection attack:
SQL injection (SQLi) is a cyberattack that injects malicious SQL code into an application,
allowing the attacker to view or modify a database.
SQL injection usually occurs when you ask a user for input, like their username/userid, and
instead of a name/id, the user gives you an SQL statement that you will unknowingly run on
your database.
Vishing:
Vishing, also known as voice phishing, is a cybercrime whereby attackers use the phone to steal personal
information from their targets. In a vishing attack, cybercriminals use social engineering tactics to
persuade victims to provide personal information, typically with the goal of accessing financial accounts.
For example, in Bangladesh, some criminals try to steal pin code of Bkash account by pretending to be
an authorized employee of Bkash.
Smishing:
Smishing -- or SMS (Short Message Service) phishing -- is a social engineering tactic cybercriminals use to
trick people into divulging sensitive information over text messages.
SMS Spoofing:
SMS spoofing occurs when a hacker sends an SMS message from an unrecognizable number. The
message may appear to be from someone you know, or it could come from a company or organization
you trust. These attacks aim to trick you into replying or clicking on a link that will download malware
onto your phone or computer.
It is a technology which uses the SMS, available on most mobile phones and PDA, to set who the
message appears to come from by replacing the originating mobile number (Sender ID) with
alphanumeric text. Spoofing has both legitimate uses (setting the company name from which the
message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such
as impersonating another person, company and product).
Madware:
It is a combination of the words mobile and adware. Adware is unwelcome software that infiltrates a
computer and serves up annoying advertising materials. By extension, mobile adware is intrusive
advertising on a smartphone or tablet.
Solutions:
The diagram depicts the different tools available to achieve e-commerce security. The diagram shows
Security Management in the center and the following points surrounding it. Firewalls, Encryption,
Network Security Protocols, Virtual Private Networks, Authentication Procedures, Proxy Servers, Anti-
Virus Software, Automated Software Updates, Intrusion Detection and Prevention.
Encryption:
Encryption is a process to change the form of any message in order to protect it from reading by anyone.
In Symmetric-key encryption the message is encrypted by using a key and the same key is used to
decrypt the message which makes it easy to use but less secure. It also requires a safe method to
transfer the key from one party to another
• Once key used to encrypt message, same key cannot be used to decrypt message
• Sender uses recipient’s public key to encrypt message; recipient uses private key to decrypt it
In the simplest use of public key cryptography, the sender encrypts a message using the recipient’s
public key, and then sends it over the Internet. The only person who can decrypt this message is the
recipient, using his or her private key. However, this simple case does not ensure integrity or an
authentic message.
The image illustrates a simple use of public key cryptography and the important steps in using public and
private keys. The steps are as follows. First, the sender creates an original digital message, to buy X Y Z
at the rate of 100 dollars. Second, the sender obtains the recipient’s public key and applies it to the
message. Third, this message gets encrypted in cipher text, depicted as 1 0 1 0 1 1 0 1 1 1 0 0 0 1. Fourth,
the message is sent over the Internet. And fifth, the message is received by the recipient, who uses his
or her private key to decrypt the message..
Public Key Cryptography Using Digital Signatures and Hash Digests
• Sender applies a mathematical algorithm (hash function) to a message and then encrypts the
message and hash result with recipient’s public key
• Sender then encrypts the message and hash result with sender’s private key-creating digital
signature-for authenticity, nonrepudiation
• Recipient first uses sender’s public key to authenticate message and then the recipient’s private
key to decrypt the hash result and message
A more realistic use of public key cryptography uses hash functions and digital signatures to both ensure
the confidentiality of the message and authenticate the sender. The only person who could have sent
the above message is the owner or the sender using his/her private key. This authenticates the message.
The hash function ensures the message was not altered in transit. As before, the only person who can
decipher the message is the recipient, using his/her private key.
The image illustrates the steps of public key cryptography with digital signatures. The steps are as
follows. First, the sender creates an original digital message, to buy X Y Z at the rate of 52 dollars.
Second, the sender applies a hash function, which produces a hash digest. Third, the sender encrypts the
message and has digest using the recipient's public key. Fourth, the sender encrypts the result, using the
sender's private key, or digital signature. Fifth, the message, now in the form of double-encrypted
signed cipher text is sent via the Internet. Sixth, the message then reaches the receiver, who uses the
sender's public key to get authenticated cipher text. Seventh, the receiver then uses his or her private
key to decrypt the hash function and original message.
Digital Envelope:
• A digital envelope is a secure electronic data container that is used to protect a message
through encryption and data authentication.
• Address weaknesses of:
A digital envelope can be created to transmit a symmetric key that will permit the recipient to decrypt
the message and be assured the message was not intercepted in transit.
THe flow diagram depicts the steps involved in creating a digital envelope in case of public key
cryptography. The flow diagram depicts the following steps. 1. The sender creates the original message,
Diplomatic Report. 2. It is encrypted using a symmetric session key. 3. The symmetric session key is
encrypted using the recipient’s public key. 4. These form a digital envelope, which is sent over the
Internet as a message encrypted in cipher text. 5. The message is then decrypted using the recipient’s
private key and the symmetric session key. And 6. The message, Diplomatic Report, reaches the
receiver.
Digital certificate:
It includes:
– Name of subject/company
– Digital signature of CA
It includes
– PGP
A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These
digital certificates are data files used to cryptographically link an entity with a public key. Web browsers
use them to authenticate content sent from web servers, ensuring trust in content delivered online.
PGP:
PGP is short for Pretty Good Privacy, a security program that enables users to communicate securely by
decrypting and encrypting messages, authenticating messages through digital signatures, and encrypting
files. It was one of the first freely available forms of public-key cryptography software.
The PKI includes certification authorities that issue, verify, and guarantee digital certificates that are
used in e-commerce to assure the identity of transaction partners.
The process diagram illustrates digital certificates and certification authorities. The following steps are
shown in the diagram. 1. An Institution or Individual subject requests a certificate over the Internet from
a Certification Authority or C A. 2. The C A provides a certificate to the institution or individual subject. 3.
The institution or individual then shares the certificate with a Transaction partner, such as an online
merchant or customer. The certificate has the following data. Digital certificate serial number. Version.
Issuer name. Issuance slash expiration date. Subject name. Subject public key. C A signature. Other
information.
Certificates play a key role in using SSL/TLS to establish a secure communications channel.
The process diagram illustrates secure negotiated sessions using S S L and T L S. The following steps are
involved in the process. 1. Client browser requests a secure session with a merchant server via the
internet. 2. Merchant server grants the secure session. 3. Session I D and methods of encryption are
negotiated. 4. Client certificate and merchant certificate are exchanged. Identity of both parties is
established. 5. Client generates session key and uses server public key to create digital envelope. 6.
Digital envelope is sent to the server, which then decrypts it using a private key. 7. Encrypted
transmission using client-generated session key begins.
• Firewall
▪ Packet filters
▪ Application gateways
– Next-generation firewalls
– Software servers that handle all communications from or sent to the Internet
The primary function of a firewall is to deny access by remote client computers to local computers. The
primary purpose of a proxy server is to provide controlled access from local computers to remote
computers.
The set of flow diagrams illustrates how firewalls and proxy servers provide protection for networks. A
linear flow diagram for a firewall shows, from left to right, a laptop, desktop, and a mobile phone
connected to a firewall with two-way arrows. The firewall connects with a remote client on the Internet
through a web server. A remote server is present on the side of the remote client.
A linear flow diagram for proxy server shows, from left to right, a laptop, desktop, and a mobile phone
connected two-way with an internal network. The internal network is connected two-way with a proxy
server. The proxy server connects to a remote client on the Internet through an external network. A
remote server is present on the side of the remote client.
An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and
issues alerts when such activity is discovered. It is a software application that scans a network or a
system for the harmful activity or policy breaching.
IDS functions:
An intrusion prevention system (IPS) is a network security tool (which can be a hardware device or
software) that continuously monitors a network for malicious activity and takes action to prevent it,
including reporting, blocking, or dropping it, when it does occur.
A Security Plan: Management Policies:
• Risk assessment
• Security policy
• Implementation plan
– Security organization
– Access controls
• Security audit
The circular diagram lists the steps involved in developing an e-commerce security plan. The steps are
listed as follows. 1. Perform a risk assessment. 2. Develop a security policy. 3. Develop an
implementation plan. 4. Create a security organization. 5. Perform a security audit.
• In U.S., credit and debit cards are primary online payment methods
– Cost
– Social equity
Online Credit Card system on the internet
• Cardholder
• Merchant
• Card issuer
• Acquirer
• Card brand
• The merchant asks for approval from the brand company and once authorized transaction is
paid by credit and merchant keeps the sales slip
• Merchant sends the slip to acquiring bank for collection and pays a fee for the service
• The brand asks the issuer bank to clear the said amount
• The issuing bank send monthly statement to the card holder for the outstanding balance
The process diagram depicts how an online credit card transaction works. The process is as follows. 1.
Consumer makes purchase. 2. SSL or TLS provides secure connection through Internet to merchant
server. 3. Merchant software from the merchant server contacts clearinghouse through a secure line. 4.
Clearinghouse verifies account and balance with consumer’s card issuing bank. 5. The issuing bank
credits merchant account in the merchant bank. 6. All the above connections between the various
players are two-way. 7. The issuing bank issues a monthly statement with debit for purchase to the
consumer.
Blockchain:
Blockchain is a decentralized and distributed digital ledger technology that enables
secure and transparent transactions and data storage. It is a system in which records,
called blocks, are linked together in a chronological and immutable manner.
A process diagram shows six steps illustrating how blockchain works. 1. An order is submitted by a user
or customer. 2. To verify the user, the transaction is broadcast to a P2P network of computers. 3. The
transaction is validated by others in the network. 4. The block is added to the chain of transactions for
this user. 5. Production, Warehouse, Logistics add additional blocks. 6. The order is fulfilled.
Cryptocurrencies
• Use blockchain technology and cryptography to create a purely digital medium of exchange
– Some governments have banned Bitcoin, although it is gaining acceptance in the U.S.
• Initial coin offerings (I C Os) being used by some startups to raise capital