Spoofing, Pharming, and Spam (Junk) Web Sites Denial of Service (DoS) and Distributed Denial of Service (dDoS) Attacks Sniffing Insider Attacks Poorly Designed Software Social Network Security Issues Mobile Platform Security Issues Insight on Technology: Think Your Smartphone Is Secure? Cloud Security Issues 4.3 Technology Solutions Protecting Internet Communications Encryption Securing Channels of Communication Protecting Networks Protecting Servers and Clients 4.4 Management Policies, Business Procedures, and Public Laws A Security Plan: Management Policies
The Role of Laws and Public Policy 4.5 E-commerce Payment Systems Online Credit Card Transactions Alternative Online Payment Systems Mobile Payment Systems: Your Smartphone Wallet Digital Cash and Virtual Currencies 4.6 Electronic Billing Presentment and Payment Insight on Society: Bitcoin Market Size and Growth EBPP Business Models 4.7 Case Study: The Mobile Payment Marketplace: Goat Rodeo 4.8 Review Key Concepts Questions Projects References Figures Figure 4.1 The E-commerce Security Environment, p. 242 Figure 4.2 A Typical E-commerce Transaction, p. 246 Figure 4.3 Vulnerable Points in an E-commerce Transaction, p. 2603 Figure 4.4 An Example of a Nigerian Letter E-mail Scam, p. 252 Figure 4.5 Tools Available to Achieve Site Security, p. 267 Figure 4.6 Public Key Cryptography: A Simple Case, p. 271 Figure 4.7 Public Key Cryptography with Digital Signatures, p. 272 Figure 4.8 Public Key Cryptography: Creating a Digital Envelope, p. 273 Figure 4.9 Digital Certificates and Certification Authorities, p. 274 Figure 4.10 Secure Negotiated Sessions Using SSL/TLS, p. 277 Figure 4.11 Firewalls and Proxy Servers, p. 280 Figure 4.12 Developing an E-commerce Security Plan, p. 283 Figure 4.13 Alternative Payment Methods Used by Consumers in the United States, p. 289 Figure 4.14 How an Online Credit Card Transaction Works, p. 290 Figure 4.15 Major Players in the EBPP Marketspace, p. 298 Tables Table 4.1 What’s New in E-commerce Security 2014–2015, p. 238 Table 4.2 The Cyber Black Market for Stolen Data, p. 241 Table 4.3 Customer and Merchant Perspectives on the Different Dimensions of E-commerce Security, p. 244 Table 4.4 Notable Examples of Malicious Code, p. 251 Table 4.5 E-commerce Security Legislation and Regulation, p. 286
Table 4.6 Government Efforts to Regulate and Control Encryption, p. 287 Table 4.7 Major Trends in E-commerce Payments 2014–2015, p. 288 Teaching Suggestions This chapter first summarizes the security threats and solutions that managers of e-com- merce sites need to be aware of, and then reviews the different payment systems available on the Web. The key point students should take away from this chapter, with respect to security, is that security is a complex, multi-layered phenomenon that involves a diverse set of risks and a balanced approach. It requires three main elements: special technology, organizational rules and procedures, and laws and industry standards. A good place to start a lecture is with Figure 4.1, which illustrates the interaction and supportive nature of these three elements. No single “magic bullet” solution exists for Internet security any more than for
You've reached the end of your free preview.
Want to read all 17 pages?
- Fall '16
- Public-key cryptography, Pretty Good Privacy