Chapter 9 - E Commerce Security and Payment System
Chapter 9 - E Commerce Security and Payment System
E-commerce
Malicious Environment
code (malware) – threat at both client
and server level
Exploits and exploit kits
Drive-by downloads
Viruses
Worms
Ransomware
Trojan horses
Backdoors
Bots, botnets
Most Common Security Threats (cont.)
Potentially unwanted programs (PUPs)
Browser parasites
Adware
Spyware
Phishing
Social engineering
E-mail scams
Spear phishing
Identity fraud/theft
Most Common Security Threats (cont.)
Hacking
Hackers vs. crackers
Types of hackers: White, black, grey hats
Hacktivism
Cybervandalism:
Disrupting, defacing, destroying Web site
Most Common Security Threats (cont.)
Credit card fraud/theft
Spam (junk) Web sites
Link farms
Protecting networks
Firewalls, proxy servers, IDS, IPS
Anti-virus software
Easiest and least expensive way to prevent
threats to system integrity
Requires daily updates
Management Policies, Business
Procedures, and Public Laws
Worldwide, companies spend more
than $71 billion on security hardware,
software, services
Managing risk includes:
Technology
Effective management policies
Public laws and active enforcement
A Security Plan: Management Policies
Risk assessment
Security policy
Implementation plan
Security organization
Access controls
Authentication procedures, including biometrics
Authorization policies, authorization management
systems
Security audit
Developing an E-commerce Security Plan
Debit cards
32% online payments in 2014 (United States)
QR code
E - wallet
Limitations of online credit card payment
Security, merchant risk
Cost
Social equity
How an Online Credit Transaction Works
Other alternatives:
Amazon Payments
Google Wallet
Bill Me Later
WUPay, Dwolla, Stripe
Mobile Payment Systems
Use of mobile phones as payment devices
established in Europe and Asia
Near field communication (NFC)
Short-range (2”) wireless for sharing data between
devices
Expanding in United States
Apple Pay
PayPal
Square
Google Wallet
Digital Cash and Virtual Currencies
Digital cash
Based on algorithm that generates unique
tokens that can be used in “real” world
Example: Bitcoin
Virtual currencies
Circulate within internal virtual world
Example: Linden Dollars in Second Life,
Facebook Credits
Electronic Billing Presentment and
Payment (EBPP)
Online payment systems for monthly bills
Over 50% of all bill payments
Two competing EBPP business models:
Biller-direct (dominant model)
Consolidator