Mba I Sem: E-Business Fundamentals Unit V
Mba I Sem: E-Business Fundamentals Unit V
Effective information security policy must have the following six objectives :
• confidentiality;
• integrity;
• availability;
• legitimate use (identification, authentication, and authorization);
• auditing or traceability;
• non-repudiation
Security Threats
• The Risk of Fraud: An electronic payment system has a huge risk of fraud.
The computing devices use an identity of the person for authorizing a
payment such as passwords and security questions. These authentications are
not full proof in determining the identity of a person.
• The Risk of Tax Evasion: The Internal Revenue Service law requires that
every business declare their financial transactions and provide paper records
so that tax compliance can be verified. The problem with electronic systems
is that they don't provide cleanly into this paradigm.
Security Threats
• Direct Access Attacks: Direct access attack is an attack in which an intruder gains physical
access to the computer to perform an unauthorized activity and installing various types of
software to compromise security. These types of software loaded with worms and
download a huge amount of sensitive data from the target victims.
Security Threats
Online Transaction
• Online transaction can be made by the customer to do shopping and pay their bills
over the internet. It is as easy as for the customer, also easy for the customer to hack
into our system and steal our sensitive information. Some important ways to steal
our confidential information during an online transaction are-
• By downloading software which scans our keystroke and steals our password and
card details.
• By redirecting a customer to a fake website which looks like original and steals our
sensitive information.
• By using public Wi-Fi
Security Threats
Site Security Solutions: To secure services and network at sites location, the
following factors must be considered:
• The “deny all” model in which all the services are turn off and then
selectively, services are enabled on case by case basis as required.
• The “allow all” model in which all the services are turn on usually with the
default at the host level; and allowing all protocols to travel across network
boundaries.
TECHNOLOGY SOLUTION FOR E-
COMMERCE SECURITY
Client Server Security Solutions Various client- server network security methods
are stated as follows:
• Security through Obscurity: Security through Obscurity method is particularly
used by small group or organization that can be made secure as long as nobody
outside its management group is allowed to find out anything about its
operational details and users are provided information on a need –to know basis.
• Password Schemes: Vital information can be protected by using passwords. It is
widely used in network security. In password schemes, generally eight character
length mixed case alphanumeric characters are chosen as password. The majority
of hackers access client computers because of easy passwords.
TECHNOLOGY SOLUTION FOR E-
COMMERCE SECURITY