电子商务英文版最新课件ec13-ppt-ch05-accessible(同名3943).pptx
- 【下载声明】
1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
3. 本页资料《电子商务英文版最新课件ec13-ppt-ch05-accessible(同名3943).pptx》由用户(晟晟文业)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 电子商务 英文 最新 课件 ec13_ppt_ch05_accessible 同名 3943
- 资源描述:
-
1、E-Commerce 2017:Business.Technology.Society.Thirteenth EditionChapter 5E-Commerce Security and Payment SystemsLearning Objectives5.1 Understand the scope of e-commerce crime and security problems,the key dimensions of e-commerce security,and the tension between security and other values.5.2 Identify
2、 the key security threats in the e-commerce environment.5.3 Describe how technology helps secure Internet communications channels and protect networks,servers,and clients.5.4 Appreciate the importance of policies,procedures,and laws in creating security.5.5 Identify the major e-commerce payment syst
3、ems in use today.5.6 Describe the features and functionality of electronic billing presentment and payment systems.Cyberwar:M A D 2.0 Class Discussion What is the difference between hacking and cyberwar?Why has cyberwar become potentially more devastating in the past decade?Is it possible to find a
4、political solution to M A D 2.0?What damage can be done by cyberweapons like Flame and Snake?The E-Commerce Security Environment Overall size and losses of cybercrime unclear Reporting issues 2016 survey:Average total cost of data breach to U.S.corporations was$4 million Low-cost web attack kits Onl
5、ine credit card fraud Underground economy marketplaceWhat Is Good E-Commerce Security?To achieve highest degree of security New technologies Organizational policies and procedures Industry standards and government laws Other factors Time value of money Cost of security vs.potential loss Security oft
6、en breaks at weakest linkFigure 5.1 The E-Commerce Security EnvironmentTable 5.3 Customer and Merchant Perspectives on the Different Dimensions of E-Commerce Security(1 of 2)DimensionCustomers PerspectiveMerchants PerspectiveIntegrityHas information I transmitted orreceived been altered?Has data on
7、the site been altered without authorization?Is data being received from customers valid?NonrepudiationCan a party to an action with me later deny taking the action?Can a customer deny ordering products?AuthenticityWho am I dealing with?How can I be assured that the person or entity is who they claim
8、 to be?What is the real identity of the customer?Table 5.3 Customer and Merchant Perspectives on the Different Dimensions of E-Commerce Security(2 of 2)DimensionCustomers PerspectiveMerchants PerspectiveConfidentialityCan someone other than the intended recipient read my messages?Are messages or con
9、fidential data accessible to anyone other than those authorized to view them?PrivacyCan I control the use of information about myself transmitted to ane-commerce merchant?What use,if any,can be made of personal data collected as part of an e-commerce transaction?Is the personal information of custom
10、ers being used in an unauthorized manner?AvailabilityCan I get access to the site?Is the site operational?The Tension Between Security and Other Values Ease of use The more security measures added,the more difficult a site is to use,and the slower it becomes Public safety and criminal uses of the In
11、ternet Use of technology by criminals to plan crimes or threaten nation-stateSecurity Threats in the E-Commerce Environment Three key points of vulnerability in e-commerce environment:Client Server Communications pipeline(Internet communications channels)Figure 5.2 A Typical E-Commerce TransactionFi
12、gure 5.3 Vulnerable Points in an E-Commerce TransactionMalicious Code Exploits and exploit kits Maladvertising Drive-by downloads Viruses Worms Ransomware(scareware)Trojan horses Backdoors Bots,botnetsPotentially Unwanted Programs Browser parasites Monitor and change users browser Adware Used to cal
13、l pop-up ads Spyware Tracks users keystrokes,e-mails,I M s,etc.Phishing Any deceptive,online attempt by a third party to obtain confidential information for financial gain Tactics Social engineering E-mail scams Spear phishing Used for identity fraud and theftHacking,Cybervandalism,and Hacktivism Ha
14、cking Hackers vs.crackers White hats,black hats,grey hats Tiger teams Goals:cybervandalism,data breaches Cybervandalism:Disrupting,defacing,destroying website HacktivismData Breaches When organizations lose control over corporate information to outsiders Nine mega-breaches in 2015 Leading causes Hac
15、king Employee error/negligence Accidental e-mail/Internet exposure Insider theftInsight on Society:The Ashley Madison Data Breach Class Discussion What organizational and technological failures led to the data breach at Ashley Madison?What technical solutions are available to combat data breaches?Ha
16、ve you or anyone you know experienced a data breach?Credit Card Fraud/Theft Stolen credit card incidences about 0.8%of all online card transactions Hacking and looting of corporate servers is primary cause Central security issue:establishing customer identity E-signatures Multi-factor authentication
17、 Fingerprint identificationIdentity Fraud/Theft Unauthorized use of another persons personal data for illegal financial benefit Social security number Drivers license Credit card numbers Usernames/passwords 2015:13 million U.S.consumers suffered identity fraudSpoofing,Pharming,and Spam(Junk)Websites
18、 Spoofing Attempting to hide true identity by using someone elses e-mail or I P address Pharming Automatically redirecting a web link to a different address,to benefit the hacker Spam(junk)websites Offer collection of advertisements for other sites,which may contain malicious codeSniffing and Man-In
19、-The-Middle Attacks Sniffer Eavesdropping program monitoring networks Can identify network trouble spots Can be used by criminals to steal proprietary information E-mail wiretaps Recording e-mails at the mail server level Man-in-the-middle attack Attacker intercepts and changes communication between
20、 two parties who believe they are communicating directlyDenial of Service(D o S)and Distributed Denial of Service(D D o S)Attacks Denial of service(D o S)attack Flooding website with pings and page requests Overwhelm and can shut down sites web servers Often accompanied by blackmail attempts Botnets
21、 Distributed Denial of Service(D D o S)attack Uses hundreds or thousands of computers to attack target network Can use devices from Internet of Things,mobile devices D D o S smokescreeningInsider Attacks Largest threat to business institutions come from insider embezzlement Employee access to privil
22、eged information Poor security procedures Insiders more likely to be source of cyberattacks than outsidersPoorly Designed Software Increase in complexity of and demand for software has led to increase in flaws and vulnerabilities S Q L injection attacks Zero-day vulnerability Heartbleed bugSocial Ne
23、twork Security Issues Social networks an environment for:Viruses,site takeovers,identity fraud,malware-loaded apps,click hijacking,phishing,spam Manual sharing scams Sharing of files that link to malicious sites Fake offerings,fake Like buttons,and fake appsMobile Platform Security Issues Little pub
展开阅读全文