SlideShare a Scribd company logo
1 of 51
E-commerce 2013
Kenneth C. Laudon
Carol Guercio Traver
business. technology. society.
ninth edition
Copyright © 2013 Pearson Education, Inc.
Chapter 5
E-commerce Security and
Payment Systems
Copyright © 2013 Pearson Education, Inc.
Class Discussion
Cyberwar: MAD 2.0
■ What is the difference between hacking and
cyberwar?
■ Why has cyberwar become more potentially
devastating in the past decade?
■ Why has Google been the target of so many
cyberattacks?
■ Is it possible to find a political solution to
MAD 2.0?
Copyright © 2013 Pearson Education, Inc. Slide 5-*
The E-commerce Security
Environment
■ Overall size and losses of cybercrime
unclear
❖Reporting issues
■ 2011 CSI survey: 46% of respondent
firms detected breach in last year
■ Underground economy marketplace:
❖Stolen information stored on underground
economy servers
Copyright © 2013 Pearson Education, Inc. Slide 5-*
What Is Good E-commerce Security?
■ To achieve highest degree of security
❖New technologies
❖Organizational policies and procedures
❖Industry standards and government laws
■ Other factors
❖Time value of money
❖Cost of security vs. potential loss
❖Security often breaks at weakest link
Copyright © 2013 Pearson Education, Inc. Slide 5-*
The E-commerce Security Environment
Figure 5.1, Page 266
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Table 5.3, Page 267
Copyright © 2013 Pearson Education, Inc. Slide 5-*
The Tension Between Security and
Other Values
■ Ease of use
❖The more security measures added, the more
difficult a site is to use, and the slower it
becomes
■ Public safety and criminal uses of the
Internet
❖Use of technology by criminals to plan crimes or
threaten nation-state
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Security Threats in the
E-commerce Environment
■ Three key points of vulnerability in
e-commerce environment:
1. Client
2. Server
3. Communications pipeline (Internet
communications channels)
Copyright © 2013 Pearson Education, Inc. Slide 5-*
A Typical E-commerce Transaction
Figure 5.2, Page 269
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Vulnerable Points in an E-commerce
Transaction
Figure 5.3, Page 270
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Most Common Security Threats in the
E-commerce Environment
■ Malicious code
❖Viruses
❖Worms
❖Trojan horses
❖Drive-by downloads
❖Backdoors
❖Bots, botnets
❖Threats at both client and server levels
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Most Common Security Threats (cont.)
■ Potentially unwanted programs (PUPs)
❖Browser parasites
❖Adware
❖Spyware
■ Phishing
❖E-mail scams
❖Social engineering
❖Identity theft
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Most Common Security Threats (cont.)
■ Hacking
❖Hackers vs. crackers
❖Types of hackers: White, black, grey hats
❖Hacktivism
■ Cybervandalism:
❖Disrupting, defacing, destroying Web site
■ Data breach
❖Losing control over corporate information to
outsiders
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Most Common Security Threats (cont.)
■ Credit card fraud/theft
❖ Hackers target merchant servers; use data to establish
credit under false identity
■ Spoofing (Pharming)
■ Spam (junk) Web sites
■ Denial of service (DoS) attack
❖ Hackers flood site with useless traffic to overwhelm
network
■ Distributed denial of service (DDoS) attack
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Insight on Business: Class Discussion
Sony: Press the Reset Button
■ What organization and technical failures
led to the April 2011 data breach on the
PlayStation Network?
■ Can Sony be criticized for waiting 3 days
to inform the FBI?
■ Have you or anyone you know
experienced data theft?
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Most Common Security Threats (cont.)
■ Sniffing
❖ Eavesdropping program that monitors information
traveling over a network
■ Insider attacks
■ Poorly designed server and client software
■ Social network security issues
■ Mobile platform security issues
❖ Same risks as any Internet device
■ Cloud security issues
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Insight on Technology: Class Discussion
Think Your Smartphone Is Secure?
■ What types of threats do smartphones face?
■ Are there any particular vulnerabilities to this
type of device?
■ What did Nicolas Seriot’s “Spyphone” prove?
■ Are apps more or less likely to be subject to
threats than traditional PC software
programs?
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Technology Solutions
■ Protecting Internet communications
❖Encryption
■ Securing channels of communication
❖SSL, VPNs
■ Protecting networks
❖Firewalls
■ Protecting servers and clients
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Tools Available to Achieve Site Security
Figure 5.5, Page 288
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Encryption
■ Encryption
❖ Transforms data into cipher text readable only by
sender and receiver
❖ Secures stored information and information
transmission
❖ Provides 4 of 6 key dimensions of e-commerce security:
■ Message integrity
■ Nonrepudiation
■ Authentication
■ Confidentiality
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Symmetric Key Encryption
■ Sender and receiver use same digital key to encrypt
and decrypt message
■ Requires different set of keys for each transaction
■ Strength of encryption
❖ Length of binary key used to encrypt data
■ Advanced Encryption Standard (AES)
❖ Most widely used symmetric key encryption
❖ Uses 128-, 192-, and 256-bit encryption keys
■ Other standards use keys with up to 2,048 bits
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Public Key Encryption
■ Uses two mathematically related digital keys
❖ Public key (widely disseminated)
❖ Private key (kept secret by owner)
■ Both keys used to encrypt and decrypt message
■ Once key used to encrypt message, same key
cannot be used to decrypt message
■ Sender uses recipient’s public key to encrypt
message; recipient uses private key to decrypt it
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Public Key Cryptography: A Simple Case
Figure 5.6, Page 291
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Public Key Encryption using Digital
Signatures and Hash Digests
■ Hash function:
❖ Mathematical algorithm that produces fixed-length number called
message or hash digest
■ Hash digest of message sent to recipient along with
message to verify integrity
■ Hash digest and message encrypted with recipient’s
public key
■ Entire cipher text then encrypted with recipient’s
private key—creating digital signature—for
authenticity, nonrepudiation
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Public Key Cryptography with Digital
Signatures
Figure 5.7, Page 293
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Digital Envelopes
■ Address weaknesses of:
❖ Public key encryption
■ Computationally slow, decreased transmission speed, increased
processing time
❖ Symmetric key encryption
■ Insecure transmission lines
■ Uses symmetric key encryption to encrypt
document
■ Uses public key encryption to encrypt and
send symmetric key
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Creating a Digital Envelope
Figure 5.8, Page 294
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Digital Certificates and
Public Key Infrastructure (PKI)
■ Digital certificate includes:
❖ Name of subject/company
❖ Subject’s public key
❖ Digital certificate serial number
❖ Expiration date, issuance date
❖ Digital signature of CA
■ Public Key Infrastructure (PKI):
❖ CAs and digital certificate procedures
❖ PGP
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Digital Certificates and Certification
Authorities
Figure 5.9, Page 295
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Limits to Encryption Solutions
■ Doesn’t protect storage of private key
❖PKI not effective against insiders, employees
❖Protection of private keys by individuals may be
haphazard
■ No guarantee that verifying computer of
merchant is secure
■ CAs are unregulated, self-selecting
organizations
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Insight on Society: Class Discussion
Web Dogs and Anonymity: Identity 2.0
■ What are some of the benefits of continuing
the anonymity of the Internet?
■ What are the disadvantages of an identity
system?
■ Are there advantages to an identity system
beyond security?
■ Who should control a central identity
system?
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Securing Channels of Communication
■ Secure Sockets Layer (SSL) and
Transport Layer Security (TLS)
❖Establishes a secure, negotiated client-server
session in which URL of requested document,
along with contents, is encrypted
■ Virtual Private Network (VPN):
❖Allows remote users to securely access internal
network via the Internet
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Secure Negotiated Sessions Using SSL/TLS
Figure 5.10, Page 300
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Protecting Networks
■ Firewall
❖Hardware or software
❖Uses security policy to filter packets
❖Two main methods:
■ Packet filters
■ Application gateways
■ Proxy servers (proxies)
❖Software servers that handle all
communications originating from or being sent
to the Internet
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Firewalls and Proxy Servers
Figure 5.11, Page 303
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Protecting Servers and Clients
■ Operating system security
enhancements
❖Upgrades, patches
■ Anti-virus software:
❖Easiest and least expensive way to prevent
threats to system integrity
❖Requires daily updates
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Management Policies, Business
Procedures, and Public Laws
■ Worldwide, companies spend $60
billion on security hardware, software,
services
■ Managing risk includes
❖Technology
❖Effective management policies
❖Public laws and active enforcement
Copyright © 2013 Pearson Education, Inc. Slide 5-*
A Security Plan: Management Policies
■ Risk assessment
■ Security policy
■ Implementation plan
❖ Security organization
❖ Access controls
❖ Authentication procedures, including biometrics
❖ Authorization policies, authorization management
systems
■ Security audit
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Developing an E-commerce Security Plan
Figure 5.12, Page 305
Copyright © 2013 Pearson Education, Inc. Slide 5-*
The Role of Laws and Public Policy
■ Laws that give authorities tools for identifying,
tracing, prosecuting cybercriminals:
❖ National Information Infrastructure Protection Act of 1996
❖ USA Patriot Act
❖ Homeland Security Act
■ Private and private-public cooperation
❖ CERT Coordination Center
❖ US-CERT
■ Government policies and controls on encryption
software
❖ OECD, G7/G8, Council of Europe, Wassener Arrangement
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Types of Payment Systems
■ Cash
❖ Most common form of payment
❖ Instantly convertible into other forms of value
❖ No float
■ Checking transfer
❖ Second most common payment form in United States
■ Credit card
❖ Credit card associations
❖ Issuing banks
❖ Processing centers
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Types of Payment Systems (cont.)
■ Stored value
❖Funds deposited into account, from which funds
are paid out or withdrawn as needed
❖Debit cards, gift certificates
❖Peer-to-peer payment systems
■ Accumulating balance
❖Accounts that accumulate expenditures and to
which consumers make period payments
❖Utility, phone, American Express accounts
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Payment System Stakeholders
■ Consumers
❖ Low-risk, low-cost, refutable, convenience, reliability
■ Merchants
❖ Low-risk, low-cost, irrefutable, secure, reliable
■ Financial intermediaries
❖ Secure, low-risk, maximizing profit
■ Government regulators
❖ Security, trust, protecting participants and enforcing
reporting
Copyright © 2013 Pearson Education, Inc. Slide 5-*
E-commerce Payment Systems
■ Credit cards
❖44% of online payments in 2012 (U.S.)
■ Debit cards
❖28% online payments in 2012 (U.S.)
■ Limitations of online credit card
payment
❖Security, merchant risk
❖Cost
❖Social equity
Copyright © 2013 Pearson Education, Inc. Slide 5-*
How an Online Credit Transaction Works
Figure 5.14, Page 315
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Alternative Online Payment Systems
■ Online stored value systems:
❖Based on value stored in a consumer’s bank,
checking, or credit card account
❖e.g., PayPal
■ Other alternatives:
❖Amazon Payments
❖Google Checkout
❖Bill Me Later
❖WUPay, Dwolla, Stripe
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Mobile Payment Systems
■ Use of mobile phones as payment devices
established in Europe, Japan, South Korea
■ Near field communication (NFC)
❖ Short-range (2”) wireless for sharing data between
devices
■ Expanding in United States
❖ Google Wallet
■ Mobile app designed to work with NFC chips
❖ PayPal
❖ Square
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Digital Cash and Virtual Currencies
■ Digital cash
❖Based on algorithm that generates unique
tokens that can be used in “real” world
❖e.g., Bitcoin
■ Virtual currencies
❖Circulate within internal virtual world
❖e.g., Linden Dollars in Second Life, Facebook
Credits
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Electronic Billing Presentment and
Payment (EBPP)
■ Online payment systems for monthly bills
■ 50% of all bill payments
■ Two competing EBPP business models:
❖ Biller-direct (dominant model)
❖ Consolidator
■ Both models are supported by EBPP
infrastructure providers
Copyright © 2013 Pearson Education, Inc. Slide 5-*
Copyright © 2013 Pearson Education, Inc. Slide 5-*

More Related Content

What's hot

CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISINGCHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
Shadina Shah
 
Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)
Ismail Zackariya
 
E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
 
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptsE commerce Marketing and Advertising concepts
E commerce Marketing and Advertising concepts
tintingregorio
 
E Business+Models Ppt
E Business+Models PptE Business+Models Ppt
E Business+Models Ppt
md kaiser
 
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
monchai sopitka
 

What's hot (20)

Chapter 9
Chapter 9Chapter 9
Chapter 9
 
E-commerce Chapter No.1
E-commerce Chapter No.1E-commerce Chapter No.1
E-commerce Chapter No.1
 
E-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, LocalE-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, Local
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISINGCHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
 
Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
 
Laudon mis14 ch02
Laudon mis14 ch02Laudon mis14 ch02
Laudon mis14 ch02
 
Chapter8
Chapter8Chapter8
Chapter8
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
 
Chapter 2 competing with it
Chapter 2 competing with itChapter 2 competing with it
Chapter 2 competing with it
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptsE commerce Marketing and Advertising concepts
E commerce Marketing and Advertising concepts
 
E Business+Models Ppt
E Business+Models PptE Business+Models Ppt
E Business+Models Ppt
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 

Viewers also liked

Chapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerceChapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerce
suman86
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
Munish Singla
 
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides
monchai sopitka
 

Viewers also liked (19)

Chapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerceChapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerce
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Ch05
Ch05Ch05
Ch05
 
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 14  fraud and accountant - james a. hall book chapter 3Lecture 14  fraud and accountant - james a. hall book chapter 3
Lecture 14 fraud and accountant - james a. hall book chapter 3
 
Lecture 9 accouting records -transaction processing- james a. hall book chap...
Lecture 9  accouting records -transaction processing- james a. hall book chap...Lecture 9  accouting records -transaction processing- james a. hall book chap...
Lecture 9 accouting records -transaction processing- james a. hall book chap...
 
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
 
Lecture 2 the information system by an accountant's prospective- ais an over...
Lecture 2  the information system by an accountant's prospective- ais an over...Lecture 2  the information system by an accountant's prospective- ais an over...
Lecture 2 the information system by an accountant's prospective- ais an over...
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
 
Online security & encryption
Online security & encryptionOnline security & encryption
Online security & encryption
 

Similar to Chapter 5

Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
George Delikouras
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
PriyalPatel158383
 
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast IFIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
ChereCheek752
 

Similar to Chapter 5 (20)

Chapter 5 E marketing.pptx
Chapter 5 E marketing.pptxChapter 5 E marketing.pptx
Chapter 5 E marketing.pptx
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
 
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
 
E-commerce security.ppt
E-commerce security.pptE-commerce security.ppt
E-commerce security.ppt
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Cscu module 04 data encryption
Cscu module 04 data encryptionCscu module 04 data encryption
Cscu module 04 data encryption
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
 
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSOThe Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast IFIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
 

More from Nada G.Youssef

More from Nada G.Youssef (20)

Ù…ŰŹÙ„Ű© 1
Ù…ŰŹÙ„Ű© 1Ù…ŰŹÙ„Ű© 1
Ù…ŰŹÙ„Ű© 1
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 

Recently uploaded

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Recently uploaded (20)

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
BAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Eluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort Service
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 

Chapter 5

  • 1. E-commerce 2013 Kenneth C. Laudon Carol Guercio Traver business. technology. society. ninth edition Copyright © 2013 Pearson Education, Inc.
  • 2. Chapter 5 E-commerce Security and Payment Systems Copyright © 2013 Pearson Education, Inc.
  • 3. Class Discussion Cyberwar: MAD 2.0 ■ What is the difference between hacking and cyberwar? ■ Why has cyberwar become more potentially devastating in the past decade? ■ Why has Google been the target of so many cyberattacks? ■ Is it possible to find a political solution to MAD 2.0? Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 4. The E-commerce Security Environment ■ Overall size and losses of cybercrime unclear ❖Reporting issues ■ 2011 CSI survey: 46% of respondent firms detected breach in last year ■ Underground economy marketplace: ❖Stolen information stored on underground economy servers Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 5. What Is Good E-commerce Security? ■ To achieve highest degree of security ❖New technologies ❖Organizational policies and procedures ❖Industry standards and government laws ■ Other factors ❖Time value of money ❖Cost of security vs. potential loss ❖Security often breaks at weakest link Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 6. The E-commerce Security Environment Figure 5.1, Page 266 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 7. Table 5.3, Page 267 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 8. The Tension Between Security and Other Values ■ Ease of use ❖The more security measures added, the more difficult a site is to use, and the slower it becomes ■ Public safety and criminal uses of the Internet ❖Use of technology by criminals to plan crimes or threaten nation-state Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 9. Security Threats in the E-commerce Environment ■ Three key points of vulnerability in e-commerce environment: 1. Client 2. Server 3. Communications pipeline (Internet communications channels) Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 10. A Typical E-commerce Transaction Figure 5.2, Page 269 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 11. Vulnerable Points in an E-commerce Transaction Figure 5.3, Page 270 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 12. Most Common Security Threats in the E-commerce Environment ■ Malicious code ❖Viruses ❖Worms ❖Trojan horses ❖Drive-by downloads ❖Backdoors ❖Bots, botnets ❖Threats at both client and server levels Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 13. Most Common Security Threats (cont.) ■ Potentially unwanted programs (PUPs) ❖Browser parasites ❖Adware ❖Spyware ■ Phishing ❖E-mail scams ❖Social engineering ❖Identity theft Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 14. Most Common Security Threats (cont.) ■ Hacking ❖Hackers vs. crackers ❖Types of hackers: White, black, grey hats ❖Hacktivism ■ Cybervandalism: ❖Disrupting, defacing, destroying Web site ■ Data breach ❖Losing control over corporate information to outsiders Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 15. Most Common Security Threats (cont.) ■ Credit card fraud/theft ❖ Hackers target merchant servers; use data to establish credit under false identity ■ Spoofing (Pharming) ■ Spam (junk) Web sites ■ Denial of service (DoS) attack ❖ Hackers flood site with useless traffic to overwhelm network ■ Distributed denial of service (DDoS) attack Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 16. Insight on Business: Class Discussion Sony: Press the Reset Button ■ What organization and technical failures led to the April 2011 data breach on the PlayStation Network? ■ Can Sony be criticized for waiting 3 days to inform the FBI? ■ Have you or anyone you know experienced data theft? Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 17. Most Common Security Threats (cont.) ■ Sniffing ❖ Eavesdropping program that monitors information traveling over a network ■ Insider attacks ■ Poorly designed server and client software ■ Social network security issues ■ Mobile platform security issues ❖ Same risks as any Internet device ■ Cloud security issues Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 18. Insight on Technology: Class Discussion Think Your Smartphone Is Secure? ■ What types of threats do smartphones face? ■ Are there any particular vulnerabilities to this type of device? ■ What did Nicolas Seriot’s “Spyphone” prove? ■ Are apps more or less likely to be subject to threats than traditional PC software programs? Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 19. Technology Solutions ■ Protecting Internet communications ❖Encryption ■ Securing channels of communication ❖SSL, VPNs ■ Protecting networks ❖Firewalls ■ Protecting servers and clients Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 20. Tools Available to Achieve Site Security Figure 5.5, Page 288 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 21. Encryption ■ Encryption ❖ Transforms data into cipher text readable only by sender and receiver ❖ Secures stored information and information transmission ❖ Provides 4 of 6 key dimensions of e-commerce security: ■ Message integrity ■ Nonrepudiation ■ Authentication ■ Confidentiality Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 22. Symmetric Key Encryption ■ Sender and receiver use same digital key to encrypt and decrypt message ■ Requires different set of keys for each transaction ■ Strength of encryption ❖ Length of binary key used to encrypt data ■ Advanced Encryption Standard (AES) ❖ Most widely used symmetric key encryption ❖ Uses 128-, 192-, and 256-bit encryption keys ■ Other standards use keys with up to 2,048 bits Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 23. Public Key Encryption ■ Uses two mathematically related digital keys ❖ Public key (widely disseminated) ❖ Private key (kept secret by owner) ■ Both keys used to encrypt and decrypt message ■ Once key used to encrypt message, same key cannot be used to decrypt message ■ Sender uses recipient’s public key to encrypt message; recipient uses private key to decrypt it Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 24. Public Key Cryptography: A Simple Case Figure 5.6, Page 291 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 25. Public Key Encryption using Digital Signatures and Hash Digests ■ Hash function: ❖ Mathematical algorithm that produces fixed-length number called message or hash digest ■ Hash digest of message sent to recipient along with message to verify integrity ■ Hash digest and message encrypted with recipient’s public key ■ Entire cipher text then encrypted with recipient’s private key—creating digital signature—for authenticity, nonrepudiation Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 26. Public Key Cryptography with Digital Signatures Figure 5.7, Page 293 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 27. Digital Envelopes ■ Address weaknesses of: ❖ Public key encryption ■ Computationally slow, decreased transmission speed, increased processing time ❖ Symmetric key encryption ■ Insecure transmission lines ■ Uses symmetric key encryption to encrypt document ■ Uses public key encryption to encrypt and send symmetric key Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 28. Creating a Digital Envelope Figure 5.8, Page 294 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 29. Digital Certificates and Public Key Infrastructure (PKI) ■ Digital certificate includes: ❖ Name of subject/company ❖ Subject’s public key ❖ Digital certificate serial number ❖ Expiration date, issuance date ❖ Digital signature of CA ■ Public Key Infrastructure (PKI): ❖ CAs and digital certificate procedures ❖ PGP Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 30. Digital Certificates and Certification Authorities Figure 5.9, Page 295 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 31. Limits to Encryption Solutions ■ Doesn’t protect storage of private key ❖PKI not effective against insiders, employees ❖Protection of private keys by individuals may be haphazard ■ No guarantee that verifying computer of merchant is secure ■ CAs are unregulated, self-selecting organizations Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 32. Insight on Society: Class Discussion Web Dogs and Anonymity: Identity 2.0 ■ What are some of the benefits of continuing the anonymity of the Internet? ■ What are the disadvantages of an identity system? ■ Are there advantages to an identity system beyond security? ■ Who should control a central identity system? Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 33. Securing Channels of Communication ■ Secure Sockets Layer (SSL) and Transport Layer Security (TLS) ❖Establishes a secure, negotiated client-server session in which URL of requested document, along with contents, is encrypted ■ Virtual Private Network (VPN): ❖Allows remote users to securely access internal network via the Internet Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 34. Secure Negotiated Sessions Using SSL/TLS Figure 5.10, Page 300 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 35. Protecting Networks ■ Firewall ❖Hardware or software ❖Uses security policy to filter packets ❖Two main methods: ■ Packet filters ■ Application gateways ■ Proxy servers (proxies) ❖Software servers that handle all communications originating from or being sent to the Internet Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 36. Firewalls and Proxy Servers Figure 5.11, Page 303 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 37. Protecting Servers and Clients ■ Operating system security enhancements ❖Upgrades, patches ■ Anti-virus software: ❖Easiest and least expensive way to prevent threats to system integrity ❖Requires daily updates Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 38. Management Policies, Business Procedures, and Public Laws ■ Worldwide, companies spend $60 billion on security hardware, software, services ■ Managing risk includes ❖Technology ❖Effective management policies ❖Public laws and active enforcement Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 39. A Security Plan: Management Policies ■ Risk assessment ■ Security policy ■ Implementation plan ❖ Security organization ❖ Access controls ❖ Authentication procedures, including biometrics ❖ Authorization policies, authorization management systems ■ Security audit Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 40. Developing an E-commerce Security Plan Figure 5.12, Page 305 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 41. The Role of Laws and Public Policy ■ Laws that give authorities tools for identifying, tracing, prosecuting cybercriminals: ❖ National Information Infrastructure Protection Act of 1996 ❖ USA Patriot Act ❖ Homeland Security Act ■ Private and private-public cooperation ❖ CERT Coordination Center ❖ US-CERT ■ Government policies and controls on encryption software ❖ OECD, G7/G8, Council of Europe, Wassener Arrangement Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 42. Types of Payment Systems ■ Cash ❖ Most common form of payment ❖ Instantly convertible into other forms of value ❖ No float ■ Checking transfer ❖ Second most common payment form in United States ■ Credit card ❖ Credit card associations ❖ Issuing banks ❖ Processing centers Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 43. Types of Payment Systems (cont.) ■ Stored value ❖Funds deposited into account, from which funds are paid out or withdrawn as needed ❖Debit cards, gift certificates ❖Peer-to-peer payment systems ■ Accumulating balance ❖Accounts that accumulate expenditures and to which consumers make period payments ❖Utility, phone, American Express accounts Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 44. Payment System Stakeholders ■ Consumers ❖ Low-risk, low-cost, refutable, convenience, reliability ■ Merchants ❖ Low-risk, low-cost, irrefutable, secure, reliable ■ Financial intermediaries ❖ Secure, low-risk, maximizing profit ■ Government regulators ❖ Security, trust, protecting participants and enforcing reporting Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 45. E-commerce Payment Systems ■ Credit cards ❖44% of online payments in 2012 (U.S.) ■ Debit cards ❖28% online payments in 2012 (U.S.) ■ Limitations of online credit card payment ❖Security, merchant risk ❖Cost ❖Social equity Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 46. How an Online Credit Transaction Works Figure 5.14, Page 315 Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 47. Alternative Online Payment Systems ■ Online stored value systems: ❖Based on value stored in a consumer’s bank, checking, or credit card account ❖e.g., PayPal ■ Other alternatives: ❖Amazon Payments ❖Google Checkout ❖Bill Me Later ❖WUPay, Dwolla, Stripe Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 48. Mobile Payment Systems ■ Use of mobile phones as payment devices established in Europe, Japan, South Korea ■ Near field communication (NFC) ❖ Short-range (2”) wireless for sharing data between devices ■ Expanding in United States ❖ Google Wallet ■ Mobile app designed to work with NFC chips ❖ PayPal ❖ Square Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 49. Digital Cash and Virtual Currencies ■ Digital cash ❖Based on algorithm that generates unique tokens that can be used in “real” world ❖e.g., Bitcoin ■ Virtual currencies ❖Circulate within internal virtual world ❖e.g., Linden Dollars in Second Life, Facebook Credits Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 50. Electronic Billing Presentment and Payment (EBPP) ■ Online payment systems for monthly bills ■ 50% of all bill payments ■ Two competing EBPP business models: ❖ Biller-direct (dominant model) ❖ Consolidator ■ Both models are supported by EBPP infrastructure providers Copyright © 2013 Pearson Education, Inc. Slide 5-*
  • 51. Copyright © 2013 Pearson Education, Inc. Slide 5-*