SlideShare une entreprise Scribd logo
1  sur  14
NetstarterTechTalkApril 10th 2014
 General E-Business Security Issues
 Security Questions
 Threats andAttacks
 E-Commerce Security
 In the past decade there have been two major
developments;
- Computerization: almost every aspect of
business as well as human life is “computerized”.
- Networking & Internet: the entire world is now a
network of networks, connecting millions of
computers, devices and sharing petabytes of data
every second.
 Any E-Business needs to be concerned about network
security.
 The Internet is a “public” network consisting of
thousands of interconnected private computer
networks.
 Private computer network systems are exposed to
threats from anywhere on the public network.
 Businesses must protect against the unknown.
 New methods of attacking networks andWeb sites,
and new network security holes, are being constantly
discovered or invented.
 An E-Business cannot expect to achieve perfect
security for its network andWeb site.
 How is the data protected once it is delivered
to the E-Business?
 How are credit card transactions
authenticated and authorized?
 The biggest potential security problem in an
E-Business is of human, rather than
electronic, origin.
 The weakest link in any security system is the
people using it.
 According to PriceWaterhouseCooper
 Hacking cost United States companies $1.5 trillion
in 2000
 WorldTrade Center insurable loss
 $50 billion
 One year of hacking equals 30Trade Center
attacks.
 Mainly there is two types of attacks
 Technical attacks
▪ An attack perpetrated using software and systems
knowledge or expertise.
 Non technical attacks
▪ An attack that uses chicanery to trick people into
revealing sensitive information or performing actions
that compromise the security of a network.
 Technical attacks
 Hacking
▪ Denial of Service attack
▪ Packet Sniffing
▪ Spoofing
▪ Keystroke Monitoring
▪ Viruses / Malware
▪ Cracking
▪ Zero-day incidents
▪ Botnets (hijacked computers).
▪ Web site defacement.
 Non technical attacks
 Social Engineering
 Today’s most ecommerce solutions are pre-
build customizable solutions provided by
varied range of organizations. Most of these
solutions has built in reliable security
features.
 Customizations to these applications should
be done in accordance with solution provider
guide lines and standard coding methods.
 Tools such as passwords, firewalls, intrusion detection
systems, and virus scanning software should be used
to protect an E-Business’s network andWeb site.
 Transaction Security and Data Protection
 Use a predefined key to encrypt and decrypt the data
during transmission
 Use the secure sockets layer (SSL) protocol to protect data
transmitted over the Internet.
 Move sensitive customer information such as credit card
numbers offline or encrypting the information if it is to be
stored online.
 Remove all files and data from storage devices including disk drives
and tapes before getting rid of the devices.
 Shred all hard-copy documents containing sensitive information
before trashing them.
 Security is only as strong as the weakest link.
 Security Audits and Penetration Testing
 Can provide an overall assessment of the firm’s current exposure and
vulnerabilities.
 This is an outsourced item.
 Consultant will provide a comprehensive recommendation to address
list of vulnerabilities.
 E-Commerce will continue to grow and the
threats to it too will evolve. In order to safe
guard privacy and trust on E-Commerce its
critical organizations actively plan and
implement strategies prevent security
breaches.This will value added to the
business.
ThankYou

Contenu connexe

Tendances

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Tendances (20)

NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Electronic Money (E-Money) & Security
Electronic Money (E-Money) & SecurityElectronic Money (E-Money) & Security
Electronic Money (E-Money) & Security
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Ransomware
Ransomware Ransomware
Ransomware
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ransomware
RansomwareRansomware
Ransomware
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Password Attack
Password Attack Password Attack
Password Attack
 
Ch11 Basic Cryptography
Ch11 Basic CryptographyCh11 Basic Cryptography
Ch11 Basic Cryptography
 

En vedette

E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
 
Vademecom presentation full_save
Vademecom presentation full_saveVademecom presentation full_save
Vademecom presentation full_save
Woomeet
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
Xophia Montawal
 

En vedette (20)

E commerce security
E commerce securityE commerce security
E commerce security
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
E commerce
E commerceE commerce
E commerce
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Web semantique et e-commerce : la vague va déferler !
Web semantique et e-commerce : la vague va déferler !Web semantique et e-commerce : la vague va déferler !
Web semantique et e-commerce : la vague va déferler !
 
Sécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerceSécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerce
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Vademecom presentation full_save
Vademecom presentation full_saveVademecom presentation full_save
Vademecom presentation full_save
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
E commerce en tunisie YES DE DO
E commerce en tunisie YES DE DO E commerce en tunisie YES DE DO
E commerce en tunisie YES DE DO
 
E commerce - solutions techniques
E commerce - solutions techniquesE commerce - solutions techniques
E commerce - solutions techniques
 
Luxe & e-Commerce quelle Expérience Utilisateur? par Frederic Veidig (UX Full...
Luxe & e-Commerce quelle Expérience Utilisateur? par Frederic Veidig (UX Full...Luxe & e-Commerce quelle Expérience Utilisateur? par Frederic Veidig (UX Full...
Luxe & e-Commerce quelle Expérience Utilisateur? par Frederic Veidig (UX Full...
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
 

Similaire à E-commerce & Security

Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
caca1009
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 

Similaire à E-commerce & Security (20)

Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
cyber security
cyber security cyber security
cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Task 3
Task 3Task 3
Task 3
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Data security
 Data security  Data security
Data security
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

E-commerce & Security

  • 2.  General E-Business Security Issues  Security Questions  Threats andAttacks  E-Commerce Security
  • 3.  In the past decade there have been two major developments; - Computerization: almost every aspect of business as well as human life is “computerized”. - Networking & Internet: the entire world is now a network of networks, connecting millions of computers, devices and sharing petabytes of data every second.
  • 4.  Any E-Business needs to be concerned about network security.  The Internet is a “public” network consisting of thousands of interconnected private computer networks.  Private computer network systems are exposed to threats from anywhere on the public network.  Businesses must protect against the unknown.  New methods of attacking networks andWeb sites, and new network security holes, are being constantly discovered or invented.  An E-Business cannot expect to achieve perfect security for its network andWeb site.
  • 5.  How is the data protected once it is delivered to the E-Business?  How are credit card transactions authenticated and authorized?  The biggest potential security problem in an E-Business is of human, rather than electronic, origin.  The weakest link in any security system is the people using it.
  • 6.  According to PriceWaterhouseCooper  Hacking cost United States companies $1.5 trillion in 2000  WorldTrade Center insurable loss  $50 billion  One year of hacking equals 30Trade Center attacks.
  • 7.  Mainly there is two types of attacks  Technical attacks ▪ An attack perpetrated using software and systems knowledge or expertise.  Non technical attacks ▪ An attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network.
  • 8.  Technical attacks  Hacking ▪ Denial of Service attack ▪ Packet Sniffing ▪ Spoofing ▪ Keystroke Monitoring ▪ Viruses / Malware ▪ Cracking ▪ Zero-day incidents ▪ Botnets (hijacked computers). ▪ Web site defacement.  Non technical attacks  Social Engineering
  • 9.  Today’s most ecommerce solutions are pre- build customizable solutions provided by varied range of organizations. Most of these solutions has built in reliable security features.  Customizations to these applications should be done in accordance with solution provider guide lines and standard coding methods.
  • 10.  Tools such as passwords, firewalls, intrusion detection systems, and virus scanning software should be used to protect an E-Business’s network andWeb site.  Transaction Security and Data Protection  Use a predefined key to encrypt and decrypt the data during transmission  Use the secure sockets layer (SSL) protocol to protect data transmitted over the Internet.  Move sensitive customer information such as credit card numbers offline or encrypting the information if it is to be stored online.
  • 11.
  • 12.  Remove all files and data from storage devices including disk drives and tapes before getting rid of the devices.  Shred all hard-copy documents containing sensitive information before trashing them.  Security is only as strong as the weakest link.  Security Audits and Penetration Testing  Can provide an overall assessment of the firm’s current exposure and vulnerabilities.  This is an outsourced item.  Consultant will provide a comprehensive recommendation to address list of vulnerabilities.
  • 13.  E-Commerce will continue to grow and the threats to it too will evolve. In order to safe guard privacy and trust on E-Commerce its critical organizations actively plan and implement strategies prevent security breaches.This will value added to the business.

Notes de l'éditeur

  1. Ecommerce & Security