Chapter 9. EC Security
Chapter 9. EC Security
Phishing
Social engineering
E-mail scams
Spear phishing
Identity fraud/theft
Most Common Security Threats (cont.)
Hacking
Hackers vs. crackers
Types of hackers: White, black, grey hats
Hacktivism
Cybervandalism:
Disrupting, defacing, destroying Web site
Most Common Security Threats (cont.)
Credit card fraud/theft
Spam (junk) Web sites
Link farms
Protecting networks
Firewalls, proxy servers, IDS, IPS
Anti-virus software
Easiest and least expensive way to prevent
threats to system integrity
Requires daily updates
Management Policies, Business
Procedures, and Public Laws
Worldwide, companies spend more
than $71 billion on security hardware,
software, services
Managing risk includes:
Technology
Effective management policies
Public laws and active enforcement
A Security Plan: Management Policies
Risk assessment
Security policy
Implementation plan
Security organization
Access controls
Authentication procedures, including biometrics
Authorization policies, authorization management
systems
Security audit
Developing an E-commerce Security Plan
Root CA VN
Slide 5-34