Chapter Five Note
Chapter Five Note
Chapter Five Note
LEARNING OBJECTIVES
1. Understand the scope of e-commerce crime and security problems, the key dimensions of e-
commerce security, and the tension between security and other values.
2. Identify the key security threats in the e-commerce environment.
3. Describe how technology helps secure Internet communications channels and protect
networks, servers, and clients.
4. Appreciate the importance of policies, procedures, and laws in creating security.
5. Identify the major e-commerce payment systems in use today.
6. Describe the features and functionality of electronic billing presentment and payment systems.
I. UNDERSTAND THE SCOPE OF E-COMMERCE CRIME AND SECURITY
PROBLEMS, THE KEY DIMENSIONS OF E-COMMERCE SECURITY, AND
THE TENSION BETWEEN SECURITY AND OTHER VALUES.
For most law-abiding citizens, the Internet holds the promise of a huge and convenient global
marketplace, providing access to people, goods, services, and businesses worldwide, all at a bargain
price.
Cybercrime is becoming a more significant problem for both organizations and consumers. Bot
networks, DDoS attacks, Trojans, phishing, ransomware, data theft, identity fraud, credit card fraud,
and spyware are just some of the threats that are making daily headlines. Social networks also have
had security breaches.
What is a secure commercial transaction? Anytime you go into a marketplace you take risks, including
the loss of privacy (information about what you purchased). Your prime risk as a consumer is that you
do not get what you paid for. As a merchant in the market, your risk is that you don’t get paid for
what you sell. E-commerce merchants and consumers face many of the same risks as participants in
To achieve the highest degree of security possible, various technologies are available and should be
used. But these technologies by themselves do not solve the problem. Organizational policies and
procedures are required to ensure the technologies are not subverted. Finally, industry standards
and government laws are required to enforce payment mechanisms, as well as to investigate and
prosecute violators of laws designed to protect the transfer of property in commercial transactions.
1. Integrity refers to the ability to ensure that information being displayed on a website, or
transmitted or received over the Internet, has not been altered in any way by an unauthorized
party.
2. Nonrepudiation refers to the ability to ensure that e-commerce participants do not deny (i.e.,
repudiate) their online actions.
3. Authenticity refers to the ability to identify the identity of a person or entity with whom you
are dealing on the Internet.
4. Confidentiality refers to the ability to ensure that messages and data are available only to those
who are authorized to view them. Confidentiality is sometimes confused with privacy.
5. Privacy refers to the ability to control the use of information a customer provides about
himself or herself to an e-commerce merchant.
6. Availability refers to the ability to ensure that an e-commerce site continues to function as
intended.
There are inevitable tensions between security and ease of use. In general, the more security measures
added to an e-commerce site, the more difficult it is to use and the slower the site becomes.
From a technology perspective, there are three key points of vulnerability when dealing
with e-commerce:
1. The client,
2. The server, and
3. The communications pipeline
Malicious Code
Malicious code (sometimes referred to as “malware”) includes a variety of threats such as viruses,
worms, ransomware, Trojan horses, and bots. Some malicious code, sometimes referred to as an
exploit, is designed to take advantage of software vulnerabilities in a computer’s operating system,
web browser, applications, or other software components.
• Exploit kits are collections of exploits bundled together and rented or sold as a commercial
product, often with slick user interfaces and in-depth analytics functionality.
• A drive-by download is malware that comes with a downloaded file that a user intentionally
or un A virus is a computer program that has the ability to replicate or make copies of itself,
and spread to other files. intentionally requests.
• Viruses are often combined with a worm. Instead of just spreading from file to file, a worm
is designed to spread from computer to computer.
• Ransomware is a type of malware (often a worm) that locks your computer or files to stop
you from accessing them.
• A Trojan horse appears to be benign, but then does something other than expected.
• A backdoor is a feature of viruses, worms, and Trojans that allows an attacker to remotely
access a compromised computer.
Encryption is the process of transforming plain text or data into cipher text that cannot be read by
anyone other than the sender and the receiver.
The purpose of encryption is (a) to secure stored information and (b) to secure information
transmission. Encryption can provide four of the six key dimensions of e-commerce security
referred to
1. Message integrity—provides assurance that the message has not been altered.
2. Nonrepudiation—prevents the user from denying he or she sent the message.
3. Authentication—provides verification of the identity of the person (or computer) sending
the message.
4. Confidentiality—gives assurance that the message was not read by others.
A key (or cipher) is any method for transforming plain text to cipher text.
Substitution cipher every occurrence of a given letter is replaced systematically by another letter
Transposition cipher the ordering of the letters in each word is changed in some systematic way
Ust. Mohamed Salad
+252617076666
mohasalad@just.edu.so
Symmetric key cryptography (secret key cryptography) both the sender and the receiver use the
same key to encrypt and decrypt the message.
Data Encryption Standard (DES) developed by the National Security Agency (NSA) and IBM.
Uses a 56-bit encryption key Advanced Encryption Standard (AES) the most widely used symmetric
key algorithm, offering 128-, 192-, and 256-bit keys public key cryptography two mathematically
related digital keys are used: a public key and a private key.
The private key is kept secret by the owner, and the public key is widely disseminated. Both keys
can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a
message, that same key cannot be used to unencrypt the message
Security audit involves the routine review of access logs (identifying how outsiders are using the
site as well as how insiders are accessing the site’s assets)
The public policy environment today is very different from the early days of e-commerce.
• The net result is that the Internet is no longer an ungoverned, unsupervised, self-controlled
technology juggernaut.
• Voluntary and private efforts have played a very large role in identifying criminal hackers and
assisting law enforcement.
• Since 1995, as e-commerce has grown in significance, national and local law enforcement
activities have expanded greatly.
• New laws have been passed that grant national, state, and local authority’s new tools and
mechanisms for identifying, tracing, and prosecuting cybercriminals.
Chief among them is PayPal. PayPal (purchased by eBay in 2002 and then spun-off as an
independent company again in 2015). PayPal is an example of an online stored value payment
system, which permits consumers to make online payments to merchants and other individuals
Mobile payment systems are the fastest growing component of alternative payments.
1. Universal proximity wallets: such as Apple Pay, Google Pay, and Samsung Pay, that can
be used at a variety of merchants for point-of-sale transactions if the merchant supports that
service (e.g., has an Apple merchant app and can accept such payments), are the most-well
known and common type.
2. Branded store proximity wallets: are mobile apps that can be used only at a single
merchant. For instance, Walmart, Tesco, and Starbucks all have very successful mobile wallet
apps.
3. P2P apps: such as Venmo and Square Cash, are used for payments among individuals who
have the same app.
Quick Response (QR) code technology: uses a mobile app to generate a two dimensional code
that merchant scans and enables payment amount to be deducted from customer’s mobile wallet.
Why Blockchain?
Because, traditionally, organizations maintained their own transaction processing systems on their
own databases, and used this record of transactions to keep track of orders, payments, production
and shared database (called a peer-to-peer or P2P computer network) rather than a single
Electronic billing presentment and payment (EBPP) systems are systems that enable the
online delivery and payment of monthly bills. EBPP services allow consumers to view bills
electronically using either their desktop PC or mobile device and pay them through electronic funds
transfers from bank or credit card accounts.
1. Online banking,
2. Biller-direct,
3. Mobile, and
4. Consolidator.