电子商务英文版最新课件ec13_ppt_ch05_accessible

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Table 5.3 Customer and Merchant Perspectives on the Different Dimensions of E-Commerce Security (1 of 2)
Dimension Integrity
Customer’s Perspective
Has information I transmitted or received been altered?
Can I get access to the site?
Merchant’s Perspective
Are messages or confidential data accessible to anyone other than those authorized to view them?
What use, if any, can be made of personal data collected as part of an e-commerce transaction? Is the personal information of customers being used in an unauthorized manner?
• Three key points of vulnerability in e-commerce environment: – Client – Server – Communications pipeline (Internet communications channels)
Figure 5.2 A Typical E-Commerce Transaction
5.2 Identify the key security threats in the e-commerce environment.
5.3 Describe how technology helps secure Internet communications channels and protect networks, servers, and clients.
Cyberwar: MAD 2.0
• Class Discussion – What is the difference between hacking and cyberwar? – Why has cyberwar become potentially more devastating in the past decade? – Is it possible to find a political solution to MAD 2.0? – What damage can be done by cyberweapons like Flame and Snake?
Availability
Customer’s Perspective Can someone other than the intended recipient read my messages?
Can I control the use of information about myself transmitted to an e-commerce merchant?
E-Commerce 2017: Business. Technology. Society.
Thirteenth Edition
Chapter 5
E-Commerce Security and Payment Systems
Learning Objectives
5.1 Understand the scope of e-commerce crime and security problems, the key dimensions of e-commerce security, and the tension between security and other values.
Potentially Unwanted Programs
• Browser parasites – Monitor and change user’s browser
• Adware – Used to call pop-up ads
• Spyware – Tracks user’s keystrokes, e-mails, IMs, etc.
– E-signatures – Multi-factor authentication – Fingerprint identification
Nonrepudiation Authenticity
Can a party to an action with me later deny taking the action?
Who am I dealing with? How can I be assured that the person or entity is who they claim to be?
5.4 Appreciate the importance of policies, procedures, and laws in creating security.
5.5 Identify the major e-commerce payment systems in use today.
5.6 Describe the features and functionality of electronic billing presentment and payment systems.
Is the site operational?
The Tension Between Security and Other Values
• Ease of use – The more security measures added, the more difficult a site is to use, and the slower it becomes
• Low-cost web attack kits • Online credit card fraud • Underground economy marketplace
What Is Good E-Commerce Security?
• To achieve highest degree of security – New technologies – Organizational policies and procedures – Industry standards and government laws
• Cybervandalism: – Disrupting, defacing, destroying website
• Hacktivism
Data Breaches
• When organizations lose control over corporate information to outsiders
Pwenku.baidu.comishing
• Any deceptive, online attempt by a third party to obtain confidential information for financial gain
• Tactics – Social engineering – E-mail scams – Spear phishing
The E-Commerce Security Environment
• Overall size and losses of cybercrime unclear – Reporting issues
• 2016 survey: Average total cost of data breach to U.S. corporations was $4 million
Figure 5.3 Vulnerable Points in an E-Commerce Transaction
Malicious Code
• Exploits and exploit kits • Maladvertising • Drive-by downloads • Viruses • Worms • Ransomware (scareware) • Trojan horses • Backdoors • Bots, botnets
• Class Discussion – What organizational and technological failures led to the data breach at Ashley Madison? – What technical solutions are available to combat data breaches? – Have you or anyone you know experienced a data breach?
• Other factors – Time value of money – Cost of security vs. potential loss – Security often breaks at weakest link
Figure 5.1 The E-Commerce Security Environment
• Used for identity fraud and theft
Hacking, Cybervandalism, and Hacktivism
• Hacking – Hackers vs. crackers – White hats, black hats, grey hats – Tiger teams – Goals: cybervandalism, data breaches
• Public safety and criminal uses of the Internet – Use of technology by criminals to plan crimes or threaten nation-state
Security Threats in the E-Commerce Environment
Merchant’s Perspective Has data on the site been altered without authorization? Is data being received from customers valid? Can a customer deny ordering products?
What is the real identity of the customer?
Table 5.3 Customer and Merchant Perspectives on the Different Dimensions of E-Commerce Security (2 of 2)
Dimension Confidentiality Privacy
Credit Card Fraud/Theft
• Stolen credit card incidences about 0.8% of all online card transactions
• Hacking and looting of corporate servers is primary cause • Central security issue: establishing customer identity
• Nine mega-breaches in 2015 • Leading causes
– Hacking – Employee error/negligence – Accidental e-mail/Internet exposure – Insider theft
Insight on Society: The Ashley Madison Data Breach
相关文档
最新文档