cab-notes
cab-notes
CAB notes
MODULE 5
SECURITY THREATS IN INTERNET AND E-COMMERCE.
1.computer virus
A computer virus is a kind of malicious computer program, which when executed,
replicates itself and inserts its own code. When the replication is done, this code
infects the other files and program present on your system.
These computer viruses are present in various types and each of them can infect a
device in a different manner.
2.computer worm
A computer worm is a subset of the Trojan horse malware that can propagate or
self-replicate from one computer to another without human activation after
breaching a system. Typically, a worm spreads across a network through your
Internet or LAN (Local Area Network) connection.
3.Trojan horse
(In Greek mythology) a hollow wooden statue of a horse in which the Greeks are
said to have concealed themselves in order to enter the city of Troy. A Trojan
horse or Trojan is a type of malware that is often disguised as legitimate software.
Trojans can be employed by cyber-thieves and hackers trying to gain access to
users' systems. Users are typically tricked by some form of social engineering into
loading and executing Trojans on their systems.
4.Phishing
5.Hacking
Types of Hacking
We can segregate hacking into different categories, based on what is being hacked.
Here is a set of examples −
• Website Hacking − Hacking a website means taking unauthorized control
over a web server and its associated software such as databases and other
interfaces.
6.Spyware
• Spyware is loosely defined as malicious software designed to enter your
computer device, gather data about you, and forward it to a third-party
without your consent. Spyware can also refer to legitimate software that
monitors your data for commercial purposes like advertising. However,
malicious spyware is explicitly used to profit from stolen data.
• Whether legitimate or based in fraud, spyware’s surveillance activity leaves
you open to data breaches and misuse of your private data. Spyware also
affects network and device performance, slowing down daily user activities.
7.Malware
Malware is intrusive software that is designed to damage and destroy
computers and computer systems. Malware is a contraction for “malicious
software.” Examples of common malware includes viruses, worms, Trojan
viruses, spyware, adware, and ransomware.
8.Spam
9.INTERNET HOAX
SECURITY MEASURES
1.Antivirus Program
Software that is created specifically to help detect, prevent and remove malware
(malicious software).Antivirus is a kind of software used to prevent, scan, detect
and delete viruses from a computer. Once installed, most antivirus software runs
automatically in the background to provide real-time protection against virus
attacks.Comprehensive virus protection programs help protect your files and
hardware from malware such as worms, Trojan horses and spyware, and may also
offer additional protection such as customizable firewalls and website blocking.
2.Firewalls
A firewall is a computer network security system that restricts internet traffic in to,
out of, or within a private network.This software or dedicated hardware-software
unit functions by selectively blocking or allowing data packets. It is typically
intended to help prevent malicious activity and to prevent anyone—inside or
outside a private network—from engaging in unauthorized web activities.Firewalls
can be viewed as gated borders or gateways that manage the travel of permitted
and prohibited web activity in a private network. The term comes from the concept
of physical walls being barriers to slow the spread of fire until emergency services
can extinguish it.
3.Encryption
Cryptography
everyone the intended receiver can only decode it because he alone knows the
private key.
6.BIOMETRICS
• Iris and Retina:Patterns found in the eye are unique and can be used for both
identification and recognition. Devices to analyze retina are expensive and
hence it is less common. Diseases like cataract may alter iris patterns
• Voice Recognition: The pitch, voice modulation, and tone, among other
things are measured. Security is medium, due to the similarity in voice of
people, hence used mostly for verification. The accuracy can be hindered due
to the presence of noise, or due to aging or illness.
• DNA: DNA is unique and persistent throughout lifetime. Thus security is high
and can be used for both identification and verification
• Signature: Signature is one of the most commonly used biometrics. They
are used to verify checks by matching the signature of the check against the
signature present in the database. Signature tablets and special pens are
used to compare the signatures. Duration required to write the signature
can also be used to increase accuracy. Signatures are mostly used for
verification.
• Keystroke Dynamics: This technique measures the behavior of a person
when typing on a keyboard. Some of the characteristics take into account
are:
• Typing speed.
• Frequency of errors
• Duration of key depressions
7.DIGITAL SIGNATURES
8.DIGITAL CERTIFICATES
MODULE 4
E-commerce
E-commerce (electronic commerce) is the activity of electronically buying or
selling of products on online services or over the Internet. Electronic commerce
draws on technologies such as mobile commerce, electronic funds transfer, supply
chain management, Internet marketing, online transaction processing, electronic
data interchange (EDI), inventory management systems, and automated data
collection systems.
Business - to - Business
A website following the B2B business model sells its products to an intermediate
buyer who then sells the product to the final customer. As an example, a
wholesaler places an order from a company's website and after receiving the
consignment, sells the endproduct to the final customer who comes to buy the
product at one of its retail outlets.
Business - to - Consumer
A website following the B2C business model sells its products directly to a
customer. A customer can view the products shown on the website. The customer
can choose a product and order the same. The website will then send a notification
to the business organization via email and the organization will dispatch the
product/goods to the customer.
Consumer - to - Consumer
A website following the C2C business model helps consumers to sell their assets
like residential property, cars, motorcycles, etc., or rent a room by publishing their
information on the website. Website may or may not charge the consumer for its
services. Another consumer may opt to buy the product of the first customer by
viewing the post/advertisement on the website.
Consumer - to - Business
Business - to - Government
B2G model is a variant of B2B model. Such websites are used by governments to
trade and exchange information with various business organizations. Such websites
are accredited by the government and provide a medium to businesses to submit
application forms to the government.
Government - to - Business
Government - to - Citizen
certificates. The main objective of G2C websites is to reduce the average time for
fulfilling citizen’s requests for various government services.
Internet. A multiple application card can support services like health care, travel
and financial data access.
The benefits of smart cards for the consumer are the following:-
1. Security – unauthorized access is prevented by a lock function
2. Convenience
3. Flexibility
4. Control
5. International use
6. Interest free loan
5. Debit Cards
It is a popular method of making payment. Banks issue debit cards to their
customers who have maintained an account in the balance with sufficient credit
balance. Each time the customer makes a purchase, an equal amount of the
purchase is debited in his account. The transaction works much like a credit card
transaction. For Eg. A customer gives an ATM card to the seller for the purchase.
The merchant read the card through a transaction terminal and the customer enters
his personal identification number. Then the terminal route the transaction through
the ATM networks back to the customer’s bank for authorization against
customer’s deposit account. The funds, are approved, are transferred from the
customer’s bank to the sellers bank.
6. Electronic Purse
Electronic Purse is a card with a microchip that can be used instead of cash and
coins for everything from vending machines to public transportation. The
Electronic Purse would consist of micro- chip embedded in a credit card, debit
card, or stand alone card to store value electronically. The card would replace cash
and coins for small ticket purchases such as gasoline stations, pay phones,
road/bridge tolls, video games, school cafeterias, fast food restaurants, convenience
stores, and cash lanes at supermarkets. Cardholders can “reload” the microchip and
control the amount of value stored in the card’s memory. The Electronic Purse
provides cardholders with the security and convenience of carrying less cash and
coins, eliminating the need for exact change. Electronic purse is a term applied to a
number of formats, each with different applications. At the moment, smart card
based systems are used as a direct replacement for money that the user would have
in his pocket and software based systems are used for online purchases. The e-
purse is an electronic / cash less payment option for making small purchases within
the campus.
To load an electronic purse, the user must be able to operate an ATM or card
loading machine. Usually this requires the user to be able to read a visual display,
but methods for alleviating this problem have been developed. To use the
electronic purse, the user hands the card to the shop assistant who inserts the card
in a terminal and keys in the amount of the transaction. This is displayed visually
to the customer. Once again, the person must be able to read a display screen. The
customer confirms that the amount is correct, and the money is transferred from
the card to the terminal. In some systems the customer need to key in their PIN
[Personal Identification Number] before the transaction can be completed.
Security issues on Electronic Payment System
Data in computers are more liable to destruction, fraud, error and misuse. Since
payment information is so valuable its security is all the more important than other
kinds of tangible assets in the organizational context.
Security refers to the policies, procedures and technical measures and to prevent
unauthorized access, alteration, theft or physical damage to information systems.
The basic objective of information security is the protection of interests of those
involved in online business. All electronic information processing systems are
vulnerable to denial of service attacks where the attacker employs any one of a
variety of methods to prevent a client using a service a provider offers. Such
attacks can have the effect of closing down a business. Some of the attacks were as
follows:-
Development of a method of obtaining the goods or services without making the
appropriate payment
Compromise of clients’ financial details credit card number, etc, which may
result in the unauthorized transfer of funds and or political embarrassment by their
publication.
Illicit modification of the electronic goods offered by the merchant or of the
descriptions of the other goods or services on the merchant server
Other methods permitting the unauthorized transfer of funds.
mobile POS
A mobile POS system (mPOS) is a portable hardware and software system that
processes sales. An mPOS is nearly the same as a traditional POS system, except
that it doesn’t have to be anchored to one checkout counter.
With a mobile POS system, you can install POS software onto a tablet or
smartphone and serve customers wherever they are. Because your checkout moves
wherever you need it, your shop doesn’t even necessarily need a checkout counter.
A virtual point of sale (VPOS) is a system that allows a merchant to accept credit
card payments without installing any hardware or software. Instead, the merchant
logs in to the provider's website in order to process payments using the web
interface, typically by manually entering the customer's payment credentials.
USSD
USSD-based mobile banking can be used for fund transfers, checking account
balance, generating bank statement, among other uses. The main objective of the
innovative *99# payments service is to allow financial inclusion of the
underbanked and economically weaker sections of the society, and integrate them
into mainstream banking. In an effort to make this service accessible to all, the
service is available in 12 languages, including English and other Indian languages
such as Hindi, Tamil, Bengali, and Kannada, to name a few.USSD is a technology
platform through which information can be transmitted through a GSM network on
a basic phone. This service will be available on all mobile phones with SMS
facility. To use USSD mobile banking, users will have to simply dial *99# and use
the interactive menu. There are many banks in India that are currently providing
the *99# service.
NUUP
National Unified USSD Platform (NUUP) is a USSD based mobile banking
service provided by National Payment Cooperation of India (NPCI) that brings
together all the Banks and Telecom Service Providers in India. Unstructured
Supplementary Service Data (USSD) is a transmission protocol used by Global
System for Mobile Communications (GSM) cellular telephones to communicate
with the Telecom Service Providers (TSP). NUUP service does not require any
mobile internet connection or software to be downloaded on the mobile.
NUUP service can be availed by dialing *99#
AEPS
AEPS’s full form in banking is the Aadhaar enabled payment system. AEPS
banking is the new age of banking transactions which allows online interoperable
financial inclusion transactions through the business correspondence of any bank
using Aadhaar authentication. ‘In easy language, AEPS banking services is the best
cashless transaction service now a day which allows all bank customers to use
basic banking activities using Aadhaar card and fingerprint authentication. To use
AEPS services, the customer’s Aadhaar card must be linked with an Individual
bank account. If a customer’s Aadhaar card does not link with a bank account,
he/she cannot use AEPS banking services.
There are many objectives of AEPS banking but here we discuss the main
objectives which make it more popular and favourable in the market.
UPI