《E-commerce 2014》电子商务(PPT讲稿)Chapter 5 E-commerce Security and Payment Systems

置印验固盒画增铺息还金副恩配 Chapter 5 E-commerce Security and Payment Systems Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 5 E-commerce Security and Payment Systems Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Class discussion Cyberwar: MAD 2.0 What is the difference between hacking and cyberwar? Why has cyberwar become more potentially devastating in the past decade? Why has google been the target of so many cyberattacks? a Is it possible to find a political solution to MAD 2.0? Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide5-3
Class Discussion Cyberwar: MAD 2.0 ◼ What is the difference between hacking and cyberwar? ◼ Why has cyberwar become more potentially devastating in the past decade? ◼ Why has Google been the target of so many cyberattacks? ◼ Is it possible to find a political solution to MAD 2.0? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-3

The E-commerce Security Environment Data Technology Solutions Organizational policies and Procedures Laws and Industr Standards Figure 5.1, page 252 Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
The E-commerce Security Environment Figure 5.1, Page 252 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4

Dimensions of e-commerce security a Integrity ensures that info sent and received has not been altered by unauthorized party a Nonrepudiation ability to ensure that participants do not deny (repudiate their online actions a authenticity ability to identify the person' s identity with whom you are dealing with over the internet a Confidentiality authorized to be seen by those who should view it a Privacy ability to control who sees your info Availability e-commerce site functions as intended Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
Dimensions of E-commerce Security ◼ Integrity ensures that info sent and received has not been altered by unauthorized party ◼ Nonrepudiation ability to ensure that participants do not deny (repudiate) their online actions ◼ Authenticity ability to identify the person’s identity with whom you are dealing with over the internet ◼ Confidentiality authorized to be seen by those who should view it ◼ Privacy ability to control who sees your info ◼ Availability e-commerce site functions as intended Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5

TABLE 5.3 CUSTOMER AND MERCHANT PERSPECTIVES ON THE DIFFERENT DIMENSIONS OF E-COMMERCE SECURITY CUSTOMER' S MERCHANT S DIMENSION PERSPECTIVE PERSPECTIVE Integrity Has intormation I transmitted or Has data on the site been altered received been altered? without authorization? Is data being received from customers valid Nonrepudiation Can a party to an action with me Can a customer deny ordering later deny taking the action? products? Authenticity Who am I dealing with? How can I be What is the real identity of the assured that the person or entity is customer? who they claim to be? Confidentiality Can someone other than the Are messages or confidential data intended recipient read accessible to anyone other than messages those authorized to view them? Privacy Can I control the use of intormation What use, if any, can be made of about myself transmitted to an personal data collected as part of an e-commerce merchant? e-commerce transaction? Is the personal information of customers being used in an unauthorized manner? Availability Can i get access to the site? Is the site operational? Table 5.3, Page 254 Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6
Table 5.3, Page 254 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6

The Tension Between Security and other values ■ Ease of use The more security measures added, the more difficult a site is to use, and the slower it becomes Security costs money and too much of it can reduce profitability a Public safety and criminal uses of the Internet 6 Use of technology by criminals to plan crimes or threaten nation -state Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide5-7
The Tension Between Security and Other Values ◼ Ease of use ❖The more security measures added, the more difficult a site is to use, and the slower it becomes ❖Security costs money and too much of it can reduce profitability ◼ Public safety and criminal uses of the Internet ❖Use of technology by criminals to plan crimes or threaten nation-state Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-7

Security Threats in E-commerce Environment Three key points of vulnerability in e-commerce environmenta 1. Client 2. Server 3. Communications pipeline ( nternet communications channels) Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-8
Security Threats in E-commerce Environment ◼Three key points of vulnerability in e-commerce environment: 1. Client 2. Server 3. Communications pipeline (Internet communications channels) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-8

A Typical E-commerce Transaction Customer Merchant credit card bank 血,,→·血 bank Intemet service provider Warehouse Online store Merchant Web servers Database serve Merchant Web site Shipping Online consumer Figure 5.2, page 256 Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-9
A Typical E-commerce Transaction Figure 5.2, Page 256 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-9

Vulnerable points in an E-commerce Transaction Security breach Customer credit card 变 Merchant DOS attack Card theft Internet service provider Hacked SQL injection Customer list hack Online store Database server erchant Web servers Merchant Web site AWi-Fi listening wire tap Web beacons Online consumer Figure 5.3, Page 257 Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide5-10
Vulnerable Points in an E-commerce Transaction Figure 5.3, Page 257 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-10

Most Common Security Threats in the E-commerce Environment Malicious code(malware, exploits) g drive-by downloads malware that comes with a downloaded file the user intentionally or unintentionallyrequest ☆ Viruses Worms spread from computer to comp without human intervention Ransomware(scareware]used to solicit money from users by locking up your browser or files and displaying fake notices from fbi or irs etc oo Trojan horses appear benign but is a way to introduce viruses into a computer system Threats at both client and server levels Slide 5-11
Most Common Security Threats in the E-commerce Environment ◼ Malicious code (malware, exploits) ❖ Drive-by downloads malware that comes with a downloaded file the user intentionally or unintentionally request ❖ Viruses ❖ Worms spread from computer to comp without human intervention ❖ Ransomware (scareware) used to solicit money from users by locking up your browser or files and displaying fake notices from FBI or IRS etc ❖ Trojan horses appear benign but is a way to introduce viruses into a computer system ❖ Threats at both client and server levels Slide 5-11
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《WEB技术开发》教学资源(PPT讲稿)HTML AND CSS.ppt
- 《E-commerce 2014》电子商务(PPT讲稿)Chapter 12 B2B E-commerce:Supply Chain Management and Collaborative Commerce.ppt
- 清华大学出版社:《WEB技术开发》课程教学资源(PPT课件)第1章 WEB开发技术概述.ppt
- 《E-commerce 2014》电子商务(PPT讲稿)Chapter 9 Online Retail and Services.ppt
- 浙江大学:虚拟现实中基于图像的建模和绘制(报告PPT).ppt
- 生物信息数据分析技能培训:计算机基础技能培训(linux基础知识).pptx
- 大型综合程序范例解析(PPT讲稿).ppt
- 结构(9.1 构建手机通讯录 9.2 结构变量 9.3 结构数组 9.4 结构指针).ppt
- 浙江大学计算机系:网络图形技术 Chinagraph‘2000 讨论组.ppt
- 浙江大学:《计算机辅助设计与图形学》课程教学资源(PPT讲稿)基于图像的绘制技术 Image Based Rendering, IBR.ppt
- 浙江大学:循环结构(PPT讲稿).pptx
- 浙江大学:程序设计专题(PPT讲稿)结构化程序设计与递归函数(刘新国).pptx
- 耶鲁大学:A Sparse Parametric Mixture Model for BTF Compression, Editing and Rendering.ppsx
- 浙江大学计算机科学与技术学院:C语言程序设计基础与试验(PPT讲稿).ppt
- Python的基本应用(PYTHON的入门应用).pptx
- 浙江大学:《计算机辅助设计与图形学》课程教学资源(PPT讲稿)数据可视化基础.ppt
- 浙江大学:《计算机辅助设计与图形学》课程教学资源(PPT讲稿)简单图形库介绍.pptx
- 数据结构与控制算法分析(PPT专题讲稿)查找与排序.ppt
- 浙江大学:《计算机辅助设计与图形学》课程教学资源(PPT讲稿)查找、排序.pptx
- 浙江大学:《计算机控制装置》课程教学资源(PPT讲稿)计算机控制系统的抗干扰设计.ppt
- 杭州电子科技大学:《计算机、互联网和万维网简介》教学资源(PPT课件)Chapter 01 C++ Programming Basics.ppt
- 香港浸会大学:《Data Communications and Networking》课程教学资源(PPT讲稿)Chapter 10 Circuit Switching and Packet Switching.ppt
- 山东大学:《微机原理及单片机接口技术》课程教学资源(PPT课件讲稿)第九章 模数转换器与数模转换器.ppt
- 电子科技大学计算机学院:《现代密码学》课程PPT教学课件(密码学基础)第一章 引言.ppt
- 西安电子科技大学:Operating-System Structures(PPT讲稿).pptx
- 《面向对象程序设计》课程PPT教学课件:第1章 Visual Basic概述(主讲:高慧).ppt
- JavaScript编程基础(JavaScript语法规则).ppt
- 长春大学旅游学院:《计算机网络与网络安全》课程教学资源(PPT课件)第6章 计算机网络与网络安全.ppt
- 《程序设计语言》课程PPT教学课件(章节大纲).ppt
- 《网络搜索和挖掘技术》课程教学资源(PPT讲稿)Lecture 1:Web Search Overview & Web Crawling.ppt
- 《编译原理》课程教学资源(PPT课件讲稿)第四章 语法分析——自上而下分析.ppt
- 赣南师范大学:《计算机网络技术》课程教学资源(PPT课件讲稿)第十章 Internet概述.ppt
- Java面向对象程序设计:Java的接口(PPT讲稿).pptx
- 动态内存分配器的实现(实验PPT讲稿).pptx
- 东南大学:《数据结构》课程教学资源(PPT课件讲稿)随机算法(主讲:方效林).pptx
- 中国科学技术大学:《现代密码学理论与实践》课程教学资源(PPT课件讲稿)第1章 引言(主讲:苗付友).pptx
- 《算法设计与分析 Design and Analysis of Algorithms》课程PPT课件:Tutorial 10.pptx
- 《C程序设计》课程PPT电子教案:第一章 概述.ppt
- 南京大学:《嵌入式网络物理系统》课程教学资源(PPT讲稿)时光自动机 Timed Automata.ppt
- 《PowerPoint》课程PPT教学课件:第六章 使用PowerPoint创建演示文稿.ppt