System Anlaysis
System Anlaysis
Discussion Questions
• What practices can provide effective e-commerce security?
• What are the different layers of an e-commerce security
environment?
• Describe Customer and Merchant Perspectives on the different
perspectives of E-commerce security
• What values normally conflict with security?
• What are the common Security threats in the E-commerce
Environment?
• How can the threats be mitigated?
• What are the three main components of managing risks in e-
commerce?
• What are the components of a security plan in e-commerce?
• What are the different e-commerce payment systems?
The E-commerce Security Environment
1. Client
2. Server
3. Communications pipeline
• Black hat hacker, also known as a cracker, someone who uses his computer knowledge in
criminal activities in order to obtain personal benefits
• A white hat hacker does it with no criminal intention in mind. Companies around the
world, who want to test their systems, contract white hat hackers
• A grey hat hacker is someone who is in between these two concepts. He may use his
skills for legal or illegal acts, but not for personal gains. Grey hat hackers use their skills
in
order to prove themselves that they can accomplish a determined feat, but never do it in
order to make money out of it.
Slide 5-13
Most Common Security Threats
• Credit card fraud/theft
– Fear of stolen credit card information deters online purchases
– Hackers target merchant servers; use data to establish credit under
false identity
– Online companies at higher risk than offline
• Spoofing: misrepresenting self by using fake e-mail address
• Pharming: spoofing a Website
– Redirecting a Web link to a new, fake Web site
• Spam/junk Web sites
Most Common Security Threats
• Denial of service (DoS) attack
– Hackers flood site with useless traffic to overwhelm network
• Distributed denial of service (DDoS) attack
– Hackers use multiple computers to attack target network
• Sniffing
– Eavesdropping program that monitors information traveling over a
network
• Insider jobs
– Single largest financial threat
Slide 5-16
Tools Available to
Achieve Site
Security
Slide 5-18
Symmetric Key Encryption
• Sender and receiver use same digital key to
encrypt and decrypt message
• Requires different set of keys for each transaction
• Strength of encryption
– Length of binary key used to encrypt data
• Advanced Encryption Standard (AES)
– Most widely used symmetric key encryption
• S-HTTP:
– Provides a secure message-oriented communications
protocol designed for use in conjunction with HTTP
• Anti-virus software
– Easiest and least expensive way to prevent threats
to system integrity
– Requires daily updates
• Risk assessment
• Security policy
• Implementation plan
– Security organization
– Access controls
– Authentication procedures, including biometrics
– Authorization policies, authorization management systems
• Security audit
Copyright © 2010 Pearson Education, Inc. Slide 5-31
Developing an E-commerce Security Plan
• Stored Value
– Funds deposited into account, from which funds are paid
out or withdrawn as needed, e.g., debit cards, gift
certificates
– Peer-to-peer payment systems
• Accumulating Balance
– Accounts that accumulate expenditures and to which
consumers make periodical payments
– E.g., utility, post paid phone, etc
• Credit cards
– 55% of online payments in 2009
• Debit cards
– 28% of online payments in 2009
• Limitations of online credit card payment
– Security
– Cost
– Social equity
• Digital cash
– Value storage and exchange using tokens
– Most early examples have disappeared; protocols and practices too complex
– Mobile money growing
• Digital checking:
– Extends functionality of existing checking accounts for use
online
Copyright © 2010 Pearson Education, Inc. Slide 5-40
Wireless Payment Systems