CHP5 - Week 1 notes ECT 250 Internet Commerce and Society Chp5 E-Commerce Security and Payment Systems The E-Commerce Security Enviro Overall size and

CHP5 - Week 1 notes ECT 250 Internet Commerce and Society...

This preview shows page 1 - 7 out of 17 pages.

Week 1 notes ECT 250 Internet, Commerce, and Society Chp5; E-Commerce Security and Payment Systems The E-Commerce Security Enviro Overall size and losses of cybercrime is unclear bc of reporting issues 2013 survey: Avg annualized cost of cybercrime was $11.56 million/yr Underground econ marketplace o Stolen info stored on underground econ servers What is Good E-Commerce Security? To achieve the highest degree of security o New techs o Organizational policies and procedures o Industry standards and government laws Other factors o Time value of money o Cost of security vs. potential loss o Security often breaks at weakest link The E-Commerce Security Enviro
Image of page 1
Week 1 notes ECT 250 Internet, Commerce, and Society
Image of page 2
Week 1 notes ECT 250 Internet, Commerce, and Society The Tension btwn Security and Other Values Ease of Use o The more security measures added, the more difficult a site is to use, and the slower it becomes Public safety and criminal uses of the internet o Use of tech by criminals to plan crimes or threaten nation-state Security Threats in the E-Commerce Enviro 3 Key points of vulnerability in the E-Commerce Enviro 1. Client 2. Server 3. Communications pipeline (Internet communications channels)
Image of page 3
Week 1 notes ECT 250 Internet, Commerce, and Society
Image of page 4
Week 1 notes ECT 250 Internet, Commerce, and Society Most Common Security Threats in the E-Commerce Enviro Malicious code (malware)—threat at both the client and server level o Exploits and exploit kit o Drive-by downloads o Viruses o Worms o Ransomware o Trojan horses o Backdoors o Bots, botnets Potentially unwanted programs (PUPs) o Browser parasites
Image of page 5
Week 1 notes ECT 250 Internet, Commerce, and Society o Adware o Spyware Phishing o Social engineering o E-mail scams o Spear phishing o Identity fraud/theft Hacking o Hackers vs. crackers o Types of crackers: White, black, grey hats o Hacktivism Cybervandalism: o Disrupting, defacing, destroying Web site Data breach o Losing control of corporate info to outsiders Credit card fraud/theft Identity fraud/theft Spoofing Pharming Span (junk) web sites o Link farms Denial of service (DoS) attack o
Image of page 6
Image of page 7

You've reached the end of your free preview.

Want to read all 17 pages?

  • Fall '09
  • Cryptography, Encryption, Public-key cryptography, ECT, Pretty Good Privacy

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture