Module 4 - E-Commerce & Digital Payments
Module 4 - E-Commerce & Digital Payments
Module 4
E-COMMERCE
Definition of E- Commerce:
• E-Commerce (Electronic Commerce) is all about buying and selling of goods, products,
or services over the internet.
• It can also involve the transaction of money, funds, and data.
• Regular Updates and Patch Management: Ensuring that the e-commerce platform and
all associated software are regularly updated with the latest security patches helps
mitigate vulnerabilities that could be exploited by attackers.
• Data Privacy and Compliance: Adhering to data privacy regulations (such as GDPR,
CCPA) and implementing privacy policies that protect customer data is crucial.
• Customer Education: Educating customers about safe online practices, such as creating
strong passwords, avoiding public Wi-Fi for sensitive transactions, and being cautious
of phishing attempts, can significantly enhance overall e-commerce security.
• Backup and Disaster Recovery: Implementing robust backup and disaster recovery
plans ensures that in case of a security breach or system failure, data can be recovered
without significant loss.
E-Commerce threats:
• Payment Frauds: Fraudulent activities during payment transactions, such as stolen
credit card information or unauthorized transactions, pose a significant threat to e-
commerce platforms and customers.
• SQL Injection: Attackers exploit vulnerabilities in the website's code to insert malicious
SQL queries, allowing them to access or manipulate the database, compromising
sensitive information.
• Man-in-the-Middle (MITM) Attacks: Hackers intercept communication between a user
and an e-commerce website to eavesdrop, steal information, or manipulate data during
the transmission.
• Identity Theft: Cybercriminals may steal user identities from e-commerce platforms to
make fraudulent purchases, access financial accounts, or commit other forms of fraud.
• Phishing Attacks/Spam: Cybercriminals use deceptive emails, messages, or websites
that mimic legitimate sources to trick users into revealing sensitive information like
login credentials, credit card numbers, or personal details or even do a fraudulent
transaction.
• DDoS Attacks: Distributed Denial of Service attacks aim to overwhelm a website's
servers with excessive traffic, causing it to become slow or unavailable, disrupting
business operations and potentially leading to financial losses.
• Data Breaches: These occur when sensitive customer information, such as credit card
details or personal data, is accessed or stolen by unauthorized individuals or
cybercriminals.
• Data Encryption: Encrypt sensitive data, including customer information and payment
details, when stored in databases or during transmission.
• Use Secure Sockets Layer (SSL) Encryption & HTTPS: Encrypt data transmitted
between your website and users' browsers. This prevents interception of sensitive
information like credit card details.
• Implement Firewalls and DDoS Protection: Install firewalls to monitor and control
incoming and outgoing traffic. Use DDoS (Distributed Denial of Service) protection to
prevent service disruption due to attacks.
• Monitor Suspicious Activity: Implement monitoring systems to detect unusual activity
and take necessary actions against them.
• Backup Data Regularly: Keep regular backups of your e-commerce data to ensure you
can recover in case of a security breach or data loss.
Advantages of e-commerce:
• Global Reach: E-commerce allows businesses to reach a global audience without the
need for physical stores in multiple locations.
• 24/7 Availability: Online stores are accessible 24/7, providing customers with the
flexibility to shop at any time that suits them.
• Cost Efficiency: E-commerce reduces the need for physical storefronts and the
associated costs such as rent, utilities, and in-store staff.
• Reduced Transaction Costs: Online transactions often have lower processing and
transaction costs compared to traditional businesses.
• Convenience for Customers: Customers can shop from their homes or using mobile
devices, eliminating the need for physical travel.
• Wider Product Selection: E-commerce enables businesses to offer a broader range of
products without the constraints of physical shelf space.
• Easier Price Comparison: Consumers can easily compare prices, read reviews, and
research products online, facilitating informed decision-making.
• Faster Transactions: Customers need not wait in the queue to do the payment unlike in
a physical shop & instead do online payments soon after the selection of the products.
Stakeholders:
• Customers/Users: Individuals or entities making payments or transactions using digital
payment methods.
• Merchants/Retailers: Businesses or individuals selling goods or services and accepting
digital payments from customers.
• Financial Institutions: Banks, credit unions, and other financial entities that provide the
infrastructure and accounts necessary for digital transactions.
• Payment Service Providers (PSPs): Companies that offer services facilitating digital
payments for merchants, such as Stripe, Square, or Adyen.
• Regulatory Bodies/Government Agencies: Entities responsible for creating and
enforcing rules, regulations, and standards for digital payments to ensure security.
• Technology Providers: Companies developing and maintaining the technology and
software necessary for secure digital payment systems.
• Security Firms: Organizations specializing in ensuring the security of digital payment
systems by providing encryption, fraud detection, and cybersecurity services.
➢ Phishing:
• Scammers send fake messages, emails, or websites to trick people into providing
their personal information, such as login credentials, credit card details, etc.
• Scammers then use this information to access victims’ accounts and steal their
funds.
• Preventive Measures:
o Verify website URLs before entering any personal information.
o Never share personal or financial details via email or unsecured websites.
o Enable two-factor authentication for added security.
➢ Identity Theft:
• Fraudster steals someone’s personal information, such as their name, address,
account details, etc.
• They are used for fraudulent activities, such as opening a new credit card or mobile
payment account.
• Preventive Measures:
o Use strong, unique passwords for each financial account.
o Regularly monitor your credit report for any suspicious activities.
o Be cautious while sharing personal information online.
o Implement robust customer verification processes for all the transactions.
➢ Account Takeover:
• A fraudster gains access to a user’s digital payment account by stealing their login
credentials or obtaining their personal information using phishing scams.
• The attacker then uses the account details to make unauthorized transactions and
transfer funds.
• Preventive Measures:
o Use strong, unique passwords and change them regularly.
o Set maximum limit for a transaction.
o Enable account alerts for any unusual activity (OTP for login).
o Consider using biometric authentication if available.
➢ Card Skimming:
• It involves the illegal copying of a user’s credit/debit card information using a
skimming device when the card is swiped for payment.
• The scammers then use the copied information to make fraudulent transactions.
• Preventive Measures:
o Check for tampering on card readers before using them.
o Use contactless payment methods where possible.
o Regularly monitor your account statements for any unauthorized charges.
➢ Man-in-the-Middle Attacks:
• Attackers intercept communication between two parties in order to alter it.
• Their goal is to steal sensitive information during digital transactions.
• Preventive Measures:
o Use secure and encrypted communication channels (HTTPS).
o Choose known and secure payment gateways.
o Employ end-to-end encryption.
o Keep software and devices updated.