Chapter 5 Flashcards
Major security risk and their costs/// E-commerce security environment
Internet is a vulnerable network Costs: 1. Cost of the actual crime 2. costs required to recover from cyber attcaks 3.reputation damage 4. reduce trust in online activities 5. loss of ponentional sensitive info
Most costly cybercrimes
malware
web-based attacks
Denial of service
Malicious insiders
Dimensions of e-commerce security
- Integrity
Ability to ensure that the info over a website has not been altered in any way - Nonrepudiation
Ability people don deny online actions - Authencity
Ability to identify the identity of a person who we are making business with - Confidentiality
Ability to ensure that data is available only to those who are authorized to view it. - Privacy
The ability to control the use of infrmation about one self - Availability
ability to ensure that e-commerce site continue to function
3 points of vulnerability ///
Most common of most damaging threats of security
client//server// communication pipeline
////////////////////////////////////////////////////////////////////////
1. Malicious code Include threats as viruses, worms, ransonware, trojan horses * Exploit kit * malvertising Only adevertising that use malicious code * drive by download * backdoor * bots * Botnet
2. Potentially Unwanted Programs Program that installs itself on a Computer usually without the users consent * Adware *Browser parasite *Cryptojacking *Spyware
- Phising
Social engineering - BEC (business email compromise)
5. hacker cracker Cyvervandalism Hactivism 6. Data breach Credential stuffing
- Credit card fraud/theft
- Indentity Fraud
- Spoofing, Pharming, and Spam (junk) websites
- Sniffer and man in the middle
- Denial of service (DOS) and distributed Denial of service (DDOS)
- Mobile Platform security issues
CLOUD security issues
INTERNET OF THINGS SECURITY ISSUES
Technology solutions
Encryption
Cipher text.
Text encrypted only can be read by the sender and receiver
substitution cipher
Transposition cipher
Symmetric Key cryptographic
Public key cryptographic
Hash function
Digital Signature
Digital envelope
Digital certificates and Public key infrastructure
Pretty good privacy
Secure channels of communication
Secure sockets layer (SSL)
Transport layer security (TLS)
HTTPS
Session Key
Virtual Private network (VPN)
Firewalls
Proxy servers
Major payment methods
xxxx