SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
eCommerce Security & Privacy

                           Hajrë Hyseni, University of Hertfordshire

                                           March 2011


                                             1
Wednesday, 30 March 2011
Security Basics
                            Top security Threats
                              Spams/Threats?
                            Quick discussion
                       eCommerce Security and Conveying
                              Trustworthiness
                                Safe shopping
                                     Q/A


                                      2
Wednesday, 30 March 2011
Customer Security Basics
         •      Customer privacy/integrity/authentication

         •      Digital Signatures and Certificates (Verisign, Thawte) -
                document author is known

         •      SSL Secure Socket Layers - encrypted transactions
                between servers and browsers https://. Created by
                Netscape

         •      PCI, SET and Firewalls - The PCI card (peripheral
                component interconnect card) usually is added for
                protection. SET (Secure Electronic Transaction) -
                developed by Visa and Mastercard

         •      Continuos eCommerce security solution checks!
                                           3
Wednesday, 30 March 2011
Top security THREATS!
         • Vulnerable web apps
         • Sophisticated phishing and pharming - Fake emails and scams
                for money from 'banks'
         • Spam - About 90 percent of all email messages are either spam or
                phishing attempts (Semantic)
         • Social media attacks - exploiting inadequate password security
                and insecure free apps and the security settings for personal and
                sensitive data
         • Fake Investments and job offers
         • Click Ads Scam and survey scam
         • Fake Lottery  Jackpot  Offer and money transfer scam
                                               4
Wednesday, 30 March 2011
Home
                                 Office
                                estimated
                              £1.7bn per
                           annum costing the UK




                                    5
Wednesday, 30 March 2011
“There are over 1 million viruses and
                               malicious codes in circulation.”
                                                      Symantech (2007)




                                             6
Wednesday, 30 March 2011
Spotify
                                    music streaming service




                                  Hackers targeted:
                    In 2009 thousands of customers personal details
                                     were stolen.
                                             7
Wednesday, 30 March 2011
Top security THREATS!
       •      Theft of credit-card details - Perhaps only 5% of e-commerce websites are
              PCI DSS-secure.

       •      Exploiting the latest technology - new technologies, iPhone, iPad and other
              smart devices apps are very vulnerable: One example is the exploitation of IP-
              based telephone systems to perform 'vishing' campaigns. Vishing makes calls
              from a compromised phone system that appears to be a trusted source.

       •      Increased outsourcing - large amounts of sensitive data, including customer
              and employee personal information, are being shared with outside vendors.

       •      Rise in super-portable data - reports on loss of usb devices, laptops,
              portable data holding between 2GB to 500GB

       •      Complacency - increase awareness through training, seminars and other staff
              briefs to follow security policies

                                                    8
Wednesday, 30 March 2011
9
Wednesday, 30 March 2011
9
Wednesday, 30 March 2011
Spam/Threat?




                               10
Wednesday, 30 March 2011
Spam/Threat?




                               11
Wednesday, 30 March 2011
Spam/Threat?




                               12
Wednesday, 30 March 2011
Spam/Threat?




                                 13
Wednesday, 30 March 2011
eCommerce Security and
              Conveying Trustworthiness
           •      Digital Certificates - are encrypted credentials that verify
                  the user's identity for online transactions

           •      Transactions support (paypal, sage, visa)

           •      Privacy in Transactions - TRUSTe Steal

           •      eCommerce Reliability - deliver on promise!




                                             14
Wednesday, 30 March 2011
Tips for safe shopping
          • Buy from a reputable company
          • Do they have a real-world presence? Can you see their
          address and phone number?
          • Is their website secure? Look for ‘https://’ and the padlock
          (before giving any payment details, credit card, or personal
          information
          • Do they have clear privacy and returns policies?
          • Not convinced? Search for the company on the internet and
          check their reputation. Call them!
          • When it comes to handing over your money, choose a safe
          journey such as PayPal or a credit/debit card.
                                            15
Wednesday, 30 March 2011
Tips for safe shopping
          • Conmen are very good at persuading you to do what they
          want
          • Learn to spot the telltale signs
          • They will promise huge rewards: lottery wins, lost inheritances
          etc.
          • A false sense of urgency
          • Odd, superfluous details
          • Requests for upfront payments or private information


                                         16
Wednesday, 30 March 2011
Safe browsing Tools

                           http://www.german-websecurity.com/en/
                                   http://asafesite.com/home/




                                            17
Wednesday, 30 March 2011
18
Wednesday, 30 March 2011
Activity
                 1           Select at least three eCommerce sites

                 2         Perform the following checks:
                           • Digital Certificates
                           • SSL
                           • Privacy in Transactions
                 3           Report back the results in your
                             Research File

                                           19        23 Dec, 2010
Wednesday, 30 March 2011
Security Basics
                            Top security Threats
                              Spams/Threats?
                            Quick discussion
                       eCommerce Security and Conveying
                              Trustworthiness
                                Safe shopping
                                     Q/A


                                      20
Wednesday, 30 March 2011
Q/A




                            21
Wednesday, 30 March 2011

Contenu connexe

En vedette

Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
1st task unit 8 e commerce p2
1st task unit 8 e commerce p21st task unit 8 e commerce p2
1st task unit 8 e commerce p2IronCheese
 
Electronic Payment Method
Electronic Payment MethodElectronic Payment Method
Electronic Payment MethodMehul Boghra
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
Electronic payment system for e-commerce
Electronic payment system for e-commerceElectronic payment system for e-commerce
Electronic payment system for e-commerceAkash Pallod
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesNurul Izzah
 
Security concerns-with-e-commerce
Security concerns-with-e-commerceSecurity concerns-with-e-commerce
Security concerns-with-e-commerceOnkar Sule
 
102 e-business model - 20 cases - v6.8 - update 9 jan 2014
102   e-business model - 20 cases - v6.8 - update 9 jan 2014102   e-business model - 20 cases - v6.8 - update 9 jan 2014
102 e-business model - 20 cases - v6.8 - update 9 jan 2014Dao Hoa
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
The Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business ModelThe Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business ModelIan Miles
 
Parallel Algorithm Models
Parallel Algorithm ModelsParallel Algorithm Models
Parallel Algorithm ModelsMartin Coronel
 

En vedette (17)

Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
1st task unit 8 e commerce p2
1st task unit 8 e commerce p21st task unit 8 e commerce p2
1st task unit 8 e commerce p2
 
E payment_system1_257091537
 E payment_system1_257091537 E payment_system1_257091537
E payment_system1_257091537
 
Electronic Payment Method
Electronic Payment MethodElectronic Payment Method
Electronic Payment Method
 
Unit 5
Unit 5Unit 5
Unit 5
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
E-Payment methods
E-Payment methodsE-Payment methods
E-Payment methods
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 
Electronic payment system for e-commerce
Electronic payment system for e-commerceElectronic payment system for e-commerce
Electronic payment system for e-commerce
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation Issues
 
Security concerns-with-e-commerce
Security concerns-with-e-commerceSecurity concerns-with-e-commerce
Security concerns-with-e-commerce
 
102 e-business model - 20 cases - v6.8 - update 9 jan 2014
102   e-business model - 20 cases - v6.8 - update 9 jan 2014102   e-business model - 20 cases - v6.8 - update 9 jan 2014
102 e-business model - 20 cases - v6.8 - update 9 jan 2014
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
The Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business ModelThe Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business Model
 
Parallel Algorithm Models
Parallel Algorithm ModelsParallel Algorithm Models
Parallel Algorithm Models
 

Plus de University of Hertfordshire

Plus de University of Hertfordshire (20)

Jony Ive Quote
Jony Ive QuoteJony Ive Quote
Jony Ive Quote
 
Design social networking campaign
Design social networking campaignDesign social networking campaign
Design social networking campaign
 
The Business of Innovation
The Business of Innovation The Business of Innovation
The Business of Innovation
 
The power of m commerce
The power of m commerceThe power of m commerce
The power of m commerce
 
Mobile Customer Journey
Mobile Customer Journey Mobile Customer Journey
Mobile Customer Journey
 
Mobile Platforms
Mobile Platforms Mobile Platforms
Mobile Platforms
 
Online Personal Branding
Online Personal Branding Online Personal Branding
Online Personal Branding
 
Drawbacks of Social Networks
Drawbacks of Social NetworksDrawbacks of Social Networks
Drawbacks of Social Networks
 
Innovate using social networks
Innovate using social networksInnovate using social networks
Innovate using social networks
 
Mobile Commerce
Mobile CommerceMobile Commerce
Mobile Commerce
 
Mobile Enabled Features
Mobile Enabled Features Mobile Enabled Features
Mobile Enabled Features
 
Going Digital
Going DigitalGoing Digital
Going Digital
 
eCommerce Marketing Channels
eCommerce Marketing ChannelseCommerce Marketing Channels
eCommerce Marketing Channels
 
iDeas on eCommerce
iDeas on eCommerceiDeas on eCommerce
iDeas on eCommerce
 
eCommerce Components
eCommerce ComponentseCommerce Components
eCommerce Components
 
eCommerce Platforms
eCommerce PlatformseCommerce Platforms
eCommerce Platforms
 
eCommerce Fulfilment Systems
eCommerce Fulfilment SystemseCommerce Fulfilment Systems
eCommerce Fulfilment Systems
 
Be As Good As Asos
Be As Good As AsosBe As Good As Asos
Be As Good As Asos
 
Planning eCommerce Budget
Planning eCommerce BudgetPlanning eCommerce Budget
Planning eCommerce Budget
 
Intro To Mob Biz Tech
Intro To Mob Biz TechIntro To Mob Biz Tech
Intro To Mob Biz Tech
 

eCommerce Security Privacy

  • 1. eCommerce Security & Privacy Hajrë Hyseni, University of Hertfordshire March 2011 1 Wednesday, 30 March 2011
  • 2. Security Basics Top security Threats Spams/Threats? Quick discussion eCommerce Security and Conveying Trustworthiness Safe shopping Q/A 2 Wednesday, 30 March 2011
  • 3. Customer Security Basics • Customer privacy/integrity/authentication • Digital Signatures and Certificates (Verisign, Thawte) - document author is known • SSL Secure Socket Layers - encrypted transactions between servers and browsers https://. Created by Netscape • PCI, SET and Firewalls - The PCI card (peripheral component interconnect card) usually is added for protection. SET (Secure Electronic Transaction) - developed by Visa and Mastercard • Continuos eCommerce security solution checks! 3 Wednesday, 30 March 2011
  • 4. Top security THREATS! • Vulnerable web apps • Sophisticated phishing and pharming - Fake emails and scams for money from 'banks' • Spam - About 90 percent of all email messages are either spam or phishing attempts (Semantic) • Social media attacks - exploiting inadequate password security and insecure free apps and the security settings for personal and sensitive data • Fake Investments and job offers • Click Ads Scam and survey scam • Fake Lottery  Jackpot  Offer and money transfer scam 4 Wednesday, 30 March 2011
  • 5. Home Office estimated £1.7bn per annum costing the UK 5 Wednesday, 30 March 2011
  • 6. “There are over 1 million viruses and malicious codes in circulation.” Symantech (2007) 6 Wednesday, 30 March 2011
  • 7. Spotify music streaming service Hackers targeted: In 2009 thousands of customers personal details were stolen. 7 Wednesday, 30 March 2011
  • 8. Top security THREATS! • Theft of credit-card details - Perhaps only 5% of e-commerce websites are PCI DSS-secure. • Exploiting the latest technology - new technologies, iPhone, iPad and other smart devices apps are very vulnerable: One example is the exploitation of IP- based telephone systems to perform 'vishing' campaigns. Vishing makes calls from a compromised phone system that appears to be a trusted source. • Increased outsourcing - large amounts of sensitive data, including customer and employee personal information, are being shared with outside vendors. • Rise in super-portable data - reports on loss of usb devices, laptops, portable data holding between 2GB to 500GB • Complacency - increase awareness through training, seminars and other staff briefs to follow security policies 8 Wednesday, 30 March 2011
  • 11. Spam/Threat? 10 Wednesday, 30 March 2011
  • 12. Spam/Threat? 11 Wednesday, 30 March 2011
  • 13. Spam/Threat? 12 Wednesday, 30 March 2011
  • 14. Spam/Threat? 13 Wednesday, 30 March 2011
  • 15. eCommerce Security and Conveying Trustworthiness • Digital Certificates - are encrypted credentials that verify the user's identity for online transactions • Transactions support (paypal, sage, visa) • Privacy in Transactions - TRUSTe Steal • eCommerce Reliability - deliver on promise! 14 Wednesday, 30 March 2011
  • 16. Tips for safe shopping • Buy from a reputable company • Do they have a real-world presence? Can you see their address and phone number? • Is their website secure? Look for ‘https://’ and the padlock (before giving any payment details, credit card, or personal information • Do they have clear privacy and returns policies? • Not convinced? Search for the company on the internet and check their reputation. Call them! • When it comes to handing over your money, choose a safe journey such as PayPal or a credit/debit card. 15 Wednesday, 30 March 2011
  • 17. Tips for safe shopping • Conmen are very good at persuading you to do what they want • Learn to spot the telltale signs • They will promise huge rewards: lottery wins, lost inheritances etc. • A false sense of urgency • Odd, superfluous details • Requests for upfront payments or private information 16 Wednesday, 30 March 2011
  • 18. Safe browsing Tools http://www.german-websecurity.com/en/ http://asafesite.com/home/ 17 Wednesday, 30 March 2011
  • 20. Activity 1 Select at least three eCommerce sites 2 Perform the following checks: • Digital Certificates • SSL • Privacy in Transactions 3 Report back the results in your Research File 19 23 Dec, 2010 Wednesday, 30 March 2011
  • 21. Security Basics Top security Threats Spams/Threats? Quick discussion eCommerce Security and Conveying Trustworthiness Safe shopping Q/A 20 Wednesday, 30 March 2011
  • 22. Q/A 21 Wednesday, 30 March 2011