E-Commerce Unit III
E-Commerce Unit III
Security is an essential part of any transaction that takes place over the internet.
Customers will lose his/her faith in e-business if its security is compromised.
Following are the essential requirements for safe e-payments/transactions −
Confidentiality − Information should not be accessible to an unauthorized
person. It should not be intercepted during the transmission.
Integrity − Information should not be altered during its transmission over
the network.
Availability − Information should be available wherever and whenever
required within a time limit specified.
Authenticity − There should be a mechanism to authenticate a user before
giving him/her an access to the required information.
Non-Repudiability − It is the protection against the denial of order or
denial of payment. Once a sender sends a message, the sender should not
be able to deny sending the message. Similarly, the recipient of message
should not be able to deny the receipt.
Encryption − Information should be encrypted and decrypted only by an
authorized user.
Auditability − Data should be recorded in such a way that it can be audited
for integrity requirements.
It is the most commonly used protocol and is widely used across the industry. It
meets following security requirements −
Authentication
Encryption
Integrity
Non-reputability
"https://" is to be used for HTTP urls with SSL, where as "http:/" is to be used
for HTTP urls without SSL.
E-commerce is all about selling or buying goods and services from Internet and
paying through this medium. This transaction happens between clients to
business, B2B, client to client and as in between there is money transaction we
should be cautious when using and also while setting up e-commerce sites.
Here is a list of some well-known e-Commerce platforms and how their security
configuration works.
Magento
You can get further details of this platform on the following link
– https://magento.com
This platform is one of the best as it is developed by eBay and it can be easily
get integrated with a PayPal gateway. It has both free and paid versions to
choose from. The vulnerabilities are patched too fast.
1. Online Security
There is a whole range of security threats out there to beware of, including
To defend against these threats, make sure that you update your platform’s
2. System Reliability
The Internet service provider (ISP) server could crash, your online payment
system could show errors and the ecommerce plugin could have bugs.
Except keeping all operating systems and APIs updated, these are just some
4. Customer Disputes
A customer might not have received their order, their credit card was charged
twice, or the product their received didn’t fit the online description.
customer service and to rectify all possible mistakes that were made.
could use stolen credit data from other customers in your system.
No matter how good your online security measures are, always watch out for
property.
7. SEO
Google or other platforms could do a complete makeover of their algorithm at
8. Taxation
You might not be including the appropriate sales tax in your sales, or you are
not paying fair shipping and/or import taxes depending on your shipping
destination.
chain costs and not being able to resell the items at their original price.
Bigcommerce
You can get further details of this platform on the following link
– https://www.bigcommerce.com
It has over 115 e-commerce templates, unlimited product uploads and a mobile
view as well. It effects integration with Amazon and eBay, and it also can be
integrated with most of the payment gateways. From the security point of view,
it is very secure because it is PCI compliant.
As you know, in order to navigate and purchase goods, services online the
retails should always be authenticated through Digital certificates, from the
security point of view this parameter is not negotiable.
Some of the secure online stores which have multi-seller platforms are −
Amazon.com
Ebay.com
Aliexpress.com
It is important to mention that in these platforms there are scammers too. So in
this case before buying from any seller you should see the reviews from the
other buyers and what is their reputation, which are generally marked by stars.
(i) The act regulates use of computers, computer systems, computer networks
and also data and information in electronic format.
(ii) The act lists down among other things, following as offences:
Act of cyber terrorism i.e. accessing a protected system with the intention of
threatening the unity, integrity, sovereignty or security of country.
Online Piracy
This may happen out of ignorance of the law. In other cases, it may accidentally
happen.
The very nature of stealing can lead to lawsuits. Or worse, your website is
bound for suspension and poor SERPs ranking.
Be original!
Create your own content. Hire content writers, photographers, and other content
creators to create something new for you.
Of course, it doesn't hurt to document all of your transactions to show you are
the authorized organization.
You can also leverage Debutify's Shop Protectors. The Add-On Shop Protect
secures your product description, images, articles, and other content from
thieves.
Here's more. The log data can slow down your system. And you won't even be
able to keep track of all of them.
You see, storing identifiable personal details of users is illegal. It's a matter of
privacy concerns for the General Data Protection Regulation (GDPR).
Sadly, many organizations hold heaps of users' personal details for profit. They
are endangering the privacy of their customers, which can create a huge
problem for the business itself.
3. Web Tracking
Online companies track individuals' movement on their web activities with log
files.
They will use the data for installing software that can pluck relevant information
from files in-house.
The tracking software and the special files called cookies can monitor your
customer's stored tracking history.
The computer will know everything about your visitation to web pages and
history.
In fact, a certain data miner application combines the internet browsing history
of your users.
To combat web trackers, computer end-users can also protect their data by
erasing browser cache and cookies.
There are also specially designed programs that combat other malicious
programs.
Let me explain.
4. Cyber-Squatting
This refers to registering an existing domain name with the intent of selling it
for a higher price.
The people who do this are called cyber squatters. They usually target well-
known organizations.
The person or firm registers and purchases an organization's domain. Then, they
will extort the original trademark's owner. The payment occurs when they get
the price they ask for.
5. Web Spoofing
With a fake website, they can reveal the credit card numbers of your customers.
They can also gain access to personal details belonging to customers, such as
bank account details.
6. Email Spamming
Spamming means when attackers send users a bogus email that contains viruses
or malware. Malicious programs delivered quietly can steal information on your
computer.
It can also include clickable links that defraud them. This activity is
called phishing.
You might think that you can patch all the holes in your business.
7. Counterfeit Products
You try your hardest to give the best quality products to your customers.
So be vigilant!
When you are an online retailer or use third-party suppliers, you may be open to
this risk.
You don't necessarily know where your product will be coming from. You can
become a victim of fake products.
Verify with your manufacturer. Ask for the product's serial number and
visual identifiers.
8. Unreliable Customer Service
When customers have issues or questions about your product or service, they
will contact you.
And as a standup business, you commit yourself to providing the best customer
service.
With their refusal, they hope that the customer will just give up on their issue.
That means it will be too late for them to request a chargeback from their credit
card company.
To have a more ethical approach to your operations, take a look at these ethical
guidelines to boost customer trust:
Transparency. With transparency, you let your customers know what
data you are collecting and what you will use it for. Display your data
policy to be more trustworthy.
Cyber Stalking
In Cyber Stalking, a cyber criminal uses the internet to consistently threaten
somebody. This crime is often perpetrated through email, social media, and the
other online medium. Cyber Stalking can even occur in conjunction with the
additional ancient type of stalking, wherever the bad person harasses the
victim offline.
There’s no unified legal approach to cyber Stalking, however, several
governments have moved toward creating these practices punishable by law.
Social media, blogs, image sharing sites and lots of different ordinarily used
online sharing activities offer cyber Stalkers with a wealth of data that helps
them arrange their harassment. It includes actions like false accusations, fraud,
information destruction, threats to life and manipulation through threats of
exposure. It has stalkers take the assistance of e-mails and other forms of
message applications, messages announce to an online website or a discussion
cluster, typically even the social media to send unwanted messages, and harass
a specific person with unwanted attention. Cyber Stalking is typically cited as
internet stalking, e-stalking or online stalking.
Types of Cyber Stalking:
Webcam Hijacking:
Internet stalkers would attempt to trick you into downloading and putting in
a malware-infected file that may grant them access to your webcam. the
method is therefore sneaky that it’s probably you wouldn’t suspect anything
strange.
Observing location check-ins on social media:
In case you’re adding location check-ins to your Facebook posts, you’re
making it overly simple for an internet stalker to follow you by just looking
through your social media profiles.
Catfishing:
Catfishing happens via social media sites, for example, Facebook, when
internet stalkers make counterfeit user-profiles and approach their victims as
a companion of a companion.
Protective Measures:
Develop the habit of logging out of the PC when not in use.
Remove any future events you’re close to attending from the social
networks if they’re recorded on online approaching events and calendars.
Set strong and distinctive passwords for your online accounts.
Cyber Stalkers can exploit the low security of public Wi-Fi networks to
snoop on your online activity. Therefore, avoid sending personal emails or
sharing your sensitive info when connected to an unsecured public Wi-Fi.
Make use of the privacy settings provided by the social networking sites and
keep all info restricted to the nearest of friends.
Do a daily search on the internet to search out what information is
accessible regarding you for the public to check.
Quick Navigation
With these fundamentals in mind, you can better identify and combat different
types of fraud that may affect your ecommerce business. Let’s get started.
The best way to combat fraud is to identify why fraud is occurring in the first
place, and then develop strategies to prevent and protect against these attacks, in
order to secure your ecommerce site. To start, you’ll want to identify the type of
fraud that is occurring on your platform, and then address it directly.
While there are countless schemes that fraudsters can use, we want to highlight
some of the most common types of ecommerce fraud. These strategies have
been used successfully against both small and large ecommerce websites.
Recognizing them now can help you avoid becoming a victim.
Card testing fraud is when someone gains access to one or more stolen credit
card numbers, through theft or by purchasing card data on the dark web. Even
though they have the credit card numbers, they do not know (1) whether the
card numbers can be used to successfully complete a transaction or (2) the limit
associated with that credit card.
Fraudsters visit an ecommerce website, making small test purchases, often using
scripts or bots to test multiple credit card numbers quickly. These initial
purchases are extremely small, as the entire purpose is to see whether the credit
card can be used to complete transactions. Once they know that a credit card
number works, they will begin making much more expensive purchases.
Ultimately, the initial small purchase testing tactic often goes undiscovered.
Merchants and impacted customers tend to realize that they have been victims
of card testing fraud when larger purchases are made. By that point, they may
have been able to make several significant purchases using stolen credit card
information.
2. Friendly Fraud
Friendly fraud (also called chargeback fraud) is when someone purchases an
item or service online and then requests a chargeback from the payment
processor, claiming the transaction was invalid. The credit card companies or
bank returns the transaction value to the customer, which must still be paid by
the retailer.
Whatever the case may be, chargeback fraud occurs when they contact their
credit card issuer to dispute a charge that they actually intended to make. Use
a chargeback management software tool that will reduce fraud loss and help you
manage disputes.
3. Refund Fraud
Refund fraud is when someone uses a stolen credit card to make a purchase on
an ecommerce website. The fraudster then contacts the ecommerce business and
requests a reimbursement due to an accidental overpayment. They request a
refund of the excess amount, but then state that the money will need to be sent
via an alternative method since their credit card is closed. Ultimately, this
means that the original credit card charge is not refunded and the ecommerce
business is responsible to the card owner for the full amount.
With refund fraud, the ecommerce merchant is stuck in the middle. The
fraudster may appear to be making a legitimate claim on the surface, but in
reality, they are trying to steal money from your business.
Once they have gained access to a user’s account, they can engage in fraudulent
activity. For instance, they can change the details of a user’s account, make
purchases on ecommerce stores, can withdraw funds, and can even gain access
to other accounts for this user.
Account takeover fraud is a serious form of identity theft, costing victims and
your reputation as a retailer. Customers that feel that their data may be
vulnerable on your website or ecommerce store are less likely to checkout and
will consider competitors that offer stronger security measures.
5. Interception Fraud
Interception fraud is when fraudsters place orders on your ecommerce website
where the billing address and shipping address match the information linked to
a stolen credit card. Once the order is placed, their goal is to intercept the
package and take the goods for themselves.
This can be done in several ways. First, they may ask a customer service
representative at your company to change the address on the order before it is
shipped. By doing this, they aim to receive the goods while the actual payment
is made by the victim. They may also contact the shipper (whether it is FedEx,
UPS, or another courier) to reroute the package to an address of their choosing.
If they live close to the victim, they may even wait for the physical delivery of
the package, sign for the package, and take it for themselves.
6. Triangulation Fraud
Triangulation fraud requires three different types of actors: the person doing the
fraud, a shopper, and an ecommerce store. The fraudster sets up a storefront (on
Amazon, Shopify or another platform) that sells high-demand goods at
competitive prices.
While the customers of the fraudster’s store may be receiving real goods for an
unbelievable price, the victims are (1) those whose credit cards have been stolen
and (2) your ecommerce website. Your ecommerce store ships real items to the
fraudster after they use stolen credit card information to place these orders.
Skimming goes digital
While attacks targeting ATMs have been around for virtually as long as the
ATMs themselves, security awareness and the capabilities of technology have
led to an evolution of these attacks from being predominantly physical to
increasingly digital in nature. The COVID pandemic—coupled with a steady
shift from in-store and card present (CP) transactions, to online and card-not-
present (CNP) transactions—has also required cybercriminals to change their
tactics.
Financial institutions, retailers, and ATM manufacturers have found ways to
protect their assets against traditional physical attacks. While threat actors are
still interested in stealthy skimmers and shimmers—small, physical devices
that threat actors insert onto and into ATM card slots to swipe payment card
data and PIN codes—many are moving away from cash transactions and onto e-
skimming.
What is e-skimming?
Also known as digital skimming, web skimming, online skimming, formjacking
malware, or a magecart attack, e-skimming is a major cybersecurity concern for
financial institutions and their vendors, including retailers, plus any other
company that processes payment information on their behalf, such as an
entertainment or travel company.
E-skimmers drive customers to a domain controlled by a fraudster that looks
and feels like a legitimate checkout page, and then utilize e-skimming to steal
data during a purchase. The impact of an e-skimming attack includes the breach
of sensitive customer information, loss of profits due to a drop in customer trust,
and issues with regulator and privacy compliance that may affect your
organization’s ability to do business.
A digital version of shimmers and skimmers, e-skimmers are lines of malicious
code that a threat actor injects into a website, which steals data from HTML
fields, including credit card data and other credentials.
How e-skimming code is introduced
Malicious e-skimming code can be introduced in several ways:
Through the exploitation of a vulnerability in an ecommerce website’s
payment platform
By using phishing emails to enter a victim’s network or a brute force attack
of administrative credentials
Attacking a third-party or supply chain entity and hiding skimming code
in the JavaScript that is loaded by the third-party onto the victim’s site
Cross-site scripting to discreetly redirect victims to a malicious domain that
can capture their PII during payment processing
Recommended reading: ‘Inside Magecart’ Exposes the Operation Behind the
Web’s Biggest E-Commerce Scourge
E-Skimming Response
If your organization falls victim to an e-skimming attack, it is important to have
a plan in place that lets your security teams take action swiftly and stop it from
furthering its damage.
Identify the source of the skimming code and use this information to
determine its access point (third-party, network, etc.)
Save a copy of the malicious code or domain to give to law enforcement
Change credentials that may have been stolen and exploited during the
attack
Report the attack to law enforcement and the IC3 for documentation
What is a copyright?
According to Copyright.gov, the website of the United States copyright office,
copyright is “a form of protection grounded in the U.S. Constitution and granted
by law for original works of authorship fixed in a tangible medium of
expression.” Copyright covers both published and unpublished works. Unlike a
patent, which protects inventions and discoveries, copyright protects works of
original authorship.
In its most basic sense, copyright means “the right to copy” an original creation,
and only the owner of the copyright can set limits on how the copyrighted work
is used or exhibited. Copyright should not be confused with “copywrite,” which
applies to the process of writing promotional material.
DMCA Compliance
The Digital Millenium Copyright Act became a copyright law in 1998. Part of
the act criminalizes the use or distribution of technology which attempts to
circumvent copyright controls. Another part limits the liability of Online
Service Providers in the event of copyright infringement involving someone
they provide service for. MightyMerchant has posted a DMCA compliance
statement which we adhere to. In the event that one of our clients experiences
their copyrighted material being used improperly, we would do our best to assist
and advise on a course of action.
Submitting a registration
To register a work online, three things must be submitted to the Copyright
Office together in the same envelope: a completed and signed application, a
copy of the material to be copyrighted, and the filing fee. Different materials
require different forms as the following list shows:
• Form TX—literary material
• Form VA—pictorial and graphic works
• Form PA—audiovisual material, including any sounds, music, or lyrics
• Form SR—sound recordings
• Form SE—a single issue of a serial
• Form SE/Group—a group of issues of a serial, including daily newsletters
• Form GR/CP—a group of contributions to a periodical. (This form must be
used in conjunction with Form TX, PA, or VA.)
As of this writing the filing fee using a paper application was $45, and $35 for
an electronic filing.
Scraper sites
Sites that utilize content entirely taken from other websites are called scraper
sites. These sites almost entirely exist as revenue sources from advertising.
Typically, AdSense ads are added to the site along with very little or no real
content. The hope is that without finding anything of real value, visitors will
click on an ad or affiliate link to earn the site money.
These sites typically pull in excerpts from sites which rank highly for keywords
they have targeted. Particularly vulnerable are sites or blogs utilizing RSS feeds,
which scraper technology can easily exploit. This is not to suggest that using
RSS feeds on your site is a bad idea or unsafe, because for the most part these
scraper sites are harmless and easy to ignore, but it does add another layer to
what you should be aware of.
Scraper sites may display excerpts of blog posts with a link back to the original
blog. While many scraper sites attribute the content to the original owner, you
may find duplicates of your blog posts in your own, exact words attributed to
“admin,” or “unknown.” This type of unauthorized use is a violation of
copyright laws, if you choose to pursue it. Often, these sites pop up and
disappear quickly, and pursuing them may be a waste of time as they often don't
respond to letters or emails. Ignoring these sites may be the best strategy, unless
you want to give it a try and see if they respond to you.
Music sharing
The music industry’s opposition to copying CDs numerous times, or online file
sharing of music has received much press in recent years. Numerous
infringement cases have been brought against people for using file-sharing
services like Napster to easily share copyrighted songs and music.
In the ‘olden days,’ illegally traded music was called bootleg recordings, and
they usually circulated in the form of cassette tapes. The musicians didn’t like
bootlegs then and they don’t like it now. If you are a musician or sell audio
recordings, this issue is clearly a prime one to watch.
Misappropriation of text
This may be the most common misuse of content online. It’s so easy to cut and
paste someone else’s text and use it as your own. Often an article may be stolen
and not attributed to you and circulated with someone else’s name on it. Or
perhaps your product description appears on someone else’s website who
happens to sell the same product as you. Sometime, people may just lift a line or
two of text from a landing page. This type of content usage can be very hard to
spot because you may have no way of knowing who’s using your content unless
you go looking for it.
Graphics
Sometimes, graphics may be stolen from one site and placed on another as free
graphics or ‘adoptables.’ Then other people visit the site and assume that the
person distributing the images has the right to them, and takes the image for
their own use. Then other people may do the same thing. Often, this is out of
ignorance of the nature of copyright law and the incorrect assumption that
everything on the Internet is ‘fair game.’
One of our clients experienced the unauthorized usage of photographs of
products from her website, which were placed on another website that sold the
same products. In the next newsletter, part 2 of this article series will look at
how she noticed the infringement, what steps she took, and also some free tools
you can use to monitor your own content usage.
*Please note that I am not a lawyer, and this article should be considered as
general information only and should not substitute for legal counsel from a
qualified lawyer.
Online Gambling
Author: Mr. Sonu Kumar, ICFAI Law School, Dehradun
It is often shown in movies that to earn money actors bet on a cricket team or a
player at the peril of losing some possession or cash. Also, winning and losing
is decided even by a shot. Nowadays, people in order to avoid penalties given
for offline gambling resort to various means of online gambling. The same can
be seen in our daily lives.
MEANING:
Online gambling can be defined as being involved in betting on casinos or
sports over the internet. Well, it is also known as Internet Gambling or e-
gambling. Usually, credit cards are used to place the bet, and win or losses are
enjoyed thereby.
HISTORY:
Just like everything has a beginning, gambling has it’s origin too. Some traces
of betting, a form of gambling can be seen in the chapters of Mahabharata
where the Kauravas through illicit means and cheating made Pandavas lose their
Kingdom and their wife, Draupadi’s dignity which led the foundation of the
greatest war called Mahabharata. Even the betting amusements that date back to
2300 BC or 1500 BC are also found in many places, especially in China and
Greece.
Also, dice were used by the rulers to decide how the domain would be
partitioned. The same was done by rulers, named Olaf with a ruler of Sweden.
When gambling started taking its deep root in society and the government
banned gambling at physical places, then the loopy of gambling started coming
with the concept of Online Gambling. It begins in the year 1994 after the
complete commercialization of the Internet. It also started with the Caribbean
nation of Barbuda and Antigua after the enactment of the Free Trade and
Processing Act when it granted licenses to companies willing to engage in
online gambling services.
1. Poker:
It is one of the famous online gambling types. You can play Poker with players
belonging to different nations. You can play tournaments or actual cash game if
you are looking for winning money.
Horses:
Online Gambling on horses is somewhat new. Earlier, it was done physically.
But now, you can get to bet on the horses faster and accurately.
Slots:
It is used in the Casinos. People play slots with an amount that suits them per
spin and afterward spin and hit the lines. If hitting works then it gives you a
tremendous amount of money.
Blackjack:
You will get the same feel of playing blackjack online as you feel in the casino.
You need to beat the dealer without being busted. That’s all.
Roulette:
This game is all about luck and playing online does not make a difference. The
online game works in the same manner as just offline Roulette. You bet, the
wheel spins, and the ball stop at a random number.
Threats to Children.
Inappropriate Content
The Internet is chock-full of “inappropriate content.” Your children may try
searching for such content, or they may stumble upon it accidentally.
Regardless, it’s very easy to find if the websites containing the content are not
blocked. Invest in parental control software such as Norton Family to block
websites you don’t want kids to browse. Another option is to use a child-
friendly browser that automatically blocks websites unsuitable for kiddies. It
also helps to keep a close eye on your kids while they’re online, or check their
recent search histories so you have an idea of what sites they’re visiting. Placing
your computer in a room the whole family uses regularly is also a good idea.
Cyberbullying
Just as predators no longer have to leave their homes to interact with children,
bullies no longer have to be face to face with their victims. Cyberbullying
through social media sites is unfortunately prevalent in today’s world, and
causes just as much damage as any other form of bullying. This is arguably one
of the most challenging threats to deal with, though a solution is to prevent your
children from creating social media profiles in the first place. Let them know
they can create theirs when they’re older. If you don’t want to do this, remind
your children that they can always come to you if they’re being bullied, whether
online or not. You won’t be able to do much unless you know it’s happening in
the first place.
Online Scams
While older adults are often thought of as the main targets of online scams,
children are very vulnerable to them as well. Common scams include emails
claiming you’ve won large sums of money and requesting payments to receive
said “winnings,” websites offering something for a low price but never
explaining what it is exactly; and essentially anything that’s extremely cheap or
free.
Education is key in preventing online scam issues, so be sure to let your
children know what the signs are. Also emphasize that they should never, ever
purchase something online without checking with you, and discourage them
from clicking on suspect links. The more they know, the better—you don’t want
them accidentally infecting the family computer with a virus or otherwise
costing you a large chunk of change.
Remember, you’re the parent, and you control how much your kids use the
Internet. They don’t have to have smartphones—flip phones for emergencies
and calling their friends is more than enough. They don’t have to have social
media profiles either—there are plenty of Internet-based activities that can wait
until they’re older. Now’s the time for children to play outside and behave...as
kids!