Week 1 notes
ECT 250 Internet, Commerce, and Society
Chp5; E-Commerce Security and Payment Systems
The E-Commerce Security Enviro
Overall size and losses of cybercrime is unclear bc of reporting issues
2013 survey: Avg annualized cost of cybercrime was $11.56 million/yr
Underground econ marketplace
o
Stolen info stored on underground econ servers
What is Good E-Commerce Security?
To achieve the highest degree of security
o
New techs
o
Organizational policies and procedures
o
Industry standards and government laws
Other factors
o
Time value of money
o
Cost of security vs. potential loss
o
Security often breaks at weakest link
The E-Commerce Security Enviro

Week 1 notes
ECT 250 Internet, Commerce, and Society

Week 1 notes
ECT 250 Internet, Commerce, and Society
The Tension btwn Security and Other Values
Ease of Use
o
The more security measures added, the more difficult a site is to
use, and the slower it becomes
Public safety and criminal uses of the internet
o
Use of tech by criminals to plan crimes or threaten nation-state
Security Threats in the E-Commerce Enviro
3 Key points of vulnerability in the E-Commerce Enviro
1.
Client
2.
Server
3.
Communications pipeline (Internet communications channels)

Week 1 notes
ECT 250 Internet, Commerce, and Society

Week 1 notes
ECT 250 Internet, Commerce, and Society
Most Common Security Threats in the E-Commerce Enviro
Malicious code (malware)—threat at both the client and server level
o
Exploits and exploit kit
o
Drive-by downloads
o
Viruses
o
Worms
o
Ransomware
o
Trojan horses
o
Backdoors
o
Bots, botnets
Potentially unwanted programs (PUPs)
o
Browser parasites

Week 1 notes
ECT 250 Internet, Commerce, and Society
o
Adware
o
Spyware
Phishing
o
Social engineering
o
E-mail scams
o
Spear phishing
o
Identity fraud/theft
Hacking
o
Hackers vs. crackers
o
Types of crackers: White, black, grey hats
o
Hacktivism
Cybervandalism:
o
Disrupting, defacing, destroying Web site
Data breach
o
Losing control of corporate info to outsiders
Credit card fraud/theft
Identity fraud/theft
Spoofing
Pharming
Span (junk) web sites
o
Link farms
Denial of service (DoS) attack
o


You've reached the end of your free preview.
Want to read all 17 pages?
- Fall '09
- Cryptography, Encryption, Public-key cryptography, ECT, Pretty Good Privacy