48
E-commerce E-commerce 2015 2015 Kenneth C. Laudon Kenneth C. Laudon Carol Guercio Carol Guercio Traver Traver business. technology. society. eleventh edition Kenneth C. Laudon Kenneth C. Laudon Carol Guercio Carol Guercio Traver Traver business. technology. society. Copyright © 2015 Pearson Education, Inc.

E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Embed Size (px)

Citation preview

Page 1: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

E-commerce 2015E-commerce 2015

Kenneth C. LaudonKenneth C. Laudon

Carol Guercio TraverCarol Guercio Traver

business. technology. society.

eleventh edition

Kenneth C. LaudonKenneth C. Laudon

Carol Guercio TraverCarol Guercio Traver

business. technology. society.

Copyright © 2015 Pearson Education, Inc.

Page 2: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Chapter 5Chapter 5E-commerce Security and E-commerce Security and

Payment SystemsPayment Systems

Copyright © 2015 Pearson Education, Inc.

Page 3: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Class DiscussionClass Discussion

Cyberwar: MAD 2.0 What is the difference between hacking and

cyberwar? Why has cyberwar become more potentially

devastating in the past decade? Is it possible to find a political solution to

MAD 2.0? What issues do programs like MonsterMind

and Plan X pose?

Copyright © 2015 Pearson Education, Inc. Slide 5-3

Page 4: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

The E-commerce Security Environment

Overall size and losses of cybercrime unclearReporting issues

2013 survey: Average annualized cost of cybercrime was $11.56 million/year

Underground economy marketplace:Stolen information stored on underground

economy servers

Copyright © 2015 Pearson Education, Inc. Slide 5-4

Page 5: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

What Is Good E-commerce Security? To achieve highest degree of security

New technologiesOrganizational policies and proceduresIndustry standards and government laws

Other factorsTime value of moneyCost of security vs. potential lossSecurity often breaks at weakest link

Copyright © 2015 Pearson Education, Inc. Slide 5-5

Page 6: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

The E-commerce Security Environment

Figure 5.1, Page 256

Copyright © 2015 Pearson Education, Inc. Slide 5-6

Page 7: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Table 5.3, Page 258

Copyright © 2015 Pearson Education, Inc. Slide 5-7

Page 8: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

The Tension Between Security andOther Values

Ease of useThe more security measures added, the more

difficult a site is to use, and the slower it becomes

Public safety and criminal uses of the InternetUse of technology by criminals to plan crimes or

threaten nation-state

Copyright © 2015 Pearson Education, Inc. Slide 5-8

Page 9: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Security Threats in theE-commerce Environment

Three key points of vulnerability in e-commerce environment:1. Client

2. Server

3. Communications pipeline (Internet communications channels)

Copyright © 2015 Pearson Education, Inc. Slide 5-9

Page 10: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

A Typical E-commerce Transaction

Figure 5.2, Page 260

Copyright © 2015 Pearson Education, Inc. Slide 5-10

Page 11: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Vulnerable Points in an E-commerce Transaction

Figure 5.3, Page 261

Copyright © 2015 Pearson Education, Inc. Slide 5-11

Page 12: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Most Common Security Threats in the

E-commerce Environment Malicious code (malware) – threat at both client and server level Exploits and exploit kits Drive-by downloads Viruses Worms Ransomware Trojan horses Backdoors Bots, botnets

Copyright © 2015 Pearson Education, Inc. Slide 5-12

Page 13: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Most Common Security Threats (cont.)

Potentially unwanted programs (PUPs) Browser parasitesAdwareSpyware

Phishing Social engineeringE-mail scamsSpear phishingIdentity fraud/theft

Copyright © 2015 Pearson Education, Inc. Slide 5-13

Page 14: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Most Common Security Threats (cont.)

HackingHackers vs. crackersTypes of hackers: White, black, grey hatsHacktivism

Cybervandalism:Disrupting, defacing, destroying Web site

Data breachLosing control over corporate information to

outsiders

Copyright © 2015 Pearson Education, Inc. Slide 5-14

Page 15: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Insight on Business: Class DiscussionInsight on Business: Class Discussion

Hackers Infiltrate Target

What organizational and technological failures led to the data breach at Target?

What technical solutions are available to combat data breaches?

Have you or anyone you know experienced a data breach?

Copyright © 2015 Pearson Education, Inc. Slide 5-15

Page 16: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Most Common Security Threats (cont.)

Credit card fraud/theft Identity fraud/theft Spoofing Pharming Spam (junk) Web sites

Link farms

Denial of service (DoS) attack Site flooded with useless traffic to overwhelm network Distributed denial of service (DDoS) attack

Copyright © 2015 Pearson Education, Inc. Slide 5-16

Page 17: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Most Common Security Threats (cont.)

Sniffing Eavesdropping program that monitors information

traveling over a network

Insider attacks Poorly designed software Social network security issues Mobile platform security issues

Vishing, smishing, madware

Cloud security issues

Copyright © 2015 Pearson Education, Inc. Slide 5-17

Page 18: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Insight on Technology: Class DiscussionInsight on Technology: Class Discussion

Think Your Smartphone Is Secure? What types of threats do smartphones face? Are there any particular vulnerabilities to this

type of device? What did Nicolas Seriot’s “Spyphone” prove? Are apps more or less likely to be subject to

threats than traditional PC software programs?

Copyright © 2015 Pearson Education, Inc. Slide 5-18

Page 19: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Technology Solutions Protecting Internet communications

Cryptography

Securing channels of communicationSSL, TLS, VPNs, Wi-Fi

Protecting networksFirewalls, proxy servers, IDS, IPS

Protecting servers and clients OS security, anti-virus

Copyright © 2015 Pearson Education, Inc. Slide 5-19

Page 20: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Tools Available to Achieve Site Security

Figure 5.5, Page 281

Copyright © 2015 Pearson Education, Inc. Slide 5-20

Page 21: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Encryption Encryption

Transforms data into cipher text readable only by sender and receiver

Secures stored information and information transmission

Provides 4 of 6 key dimensions of e-commerce security: Message integrity Nonrepudiation Authentication Confidentiality

Copyright © 2015 Pearson Education, Inc. Slide 5-21

Page 22: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Symmetric Key Cryptography Sender and receiver use same digital key to encrypt

and decrypt message Requires different set of keys for each transaction Strength of encryption

Length of binary key used to encrypt data

Data Encryption Standard (DES) Advanced Encryption Standard (AES)

Most widely used symmetric key algorithm Uses 128-, 192-, and 256-bit encryption keys

Other standards use keys with up to 2,048 bits

Copyright © 2015 Pearson Education, Inc. Slide 5-22

Page 23: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Public Key Cryptography Uses two mathematically related digital keys

Public key (widely disseminated) Private key (kept secret by owner)

Both keys used to encrypt and decrypt message Once key used to encrypt message, same key

cannot be used to decrypt message Sender uses recipient’s public key to encrypt

message; recipient uses private key to decrypt it

Copyright © 2015 Pearson Education, Inc. Slide 5-23

Page 24: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Public Key Cryptography: A Simple Case

Figure 5.6, Page 285

Copyright © 2015 Pearson Education, Inc. Slide 5-24

Page 25: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Public Key Cryptography using Digital Signatures and Hash Digests

Hash function: Mathematical algorithm that produces fixed-length number called

message or hash digest

Hash digest of message sent to recipient along with message to verify integrity

Hash digest and message encrypted with recipient’s public key

Entire cipher text then encrypted with recipient’s private key—creating digital signature—for authenticity, nonrepudiation

Copyright © 2015 Pearson Education, Inc. Slide 5-25

Page 26: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Public Key Cryptography with Digital Signatures

Figure 5.7, Page 286

Copyright © 2015 Pearson Education, Inc. Slide 5-26

Page 27: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Digital Envelopes Address weaknesses of:

Public key cryptography Computationally slow, decreased transmission speed, increased

processing time

Symmetric key cryptography Insecure transmission lines

Uses symmetric key cryptography to encrypt document

Uses public key cryptography to encrypt and send symmetric key

Copyright © 2015 Pearson Education, Inc. Slide 5-27

Page 28: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Creating a Digital Envelope

Figure 5.8, Page 287

Copyright © 2015 Pearson Education, Inc. Slide 5-28

Page 29: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Digital Certificates and Public Key Infrastructure (PKI)

Digital certificate includes: Name of subject/company Subject’s public key Digital certificate serial number Expiration date, issuance date Digital signature of CA

Public Key Infrastructure (PKI): CAs and digital certificate procedures PGP

Copyright © 2015 Pearson Education, Inc. Slide 5-29

Page 30: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Digital Certificates and Certification Authorities

Figure 5.9, Page 288

Copyright © 2015 Pearson Education, Inc. Slide 5-30

Page 31: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Limits to Encryption Solutions Doesn’t protect storage of private key

PKI not effective against insiders, employeesProtection of private keys by individuals may be

haphazard

No guarantee that verifying computer of merchant is secure

CAs are unregulated, self-selecting organizations

Copyright © 2015 Pearson Education, Inc. Slide 5-31

Page 32: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Securing Channels of Communication Secure Sockets Layer (SSL)/Transport Layer

Security (TLS) Establishes secure, negotiated client–server session

Virtual Private Network (VPN) Allows remote users to securely access internal

network via the Internet

Wireless (Wi-Fi) networksWPA2

Copyright © 2015 Pearson Education, Inc. Slide 5-32

Page 33: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Secure Negotiated Sessions Using SSL/TLS

Figure 5.10, Page 291

Copyright © 2015 Pearson Education, Inc. Slide 5-33

Page 34: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Protecting Networks Firewall

Hardware or software that uses security policy to filter packets

Packet filters Application gateways

Next-generation firewalls Proxy servers (proxies)

Software servers that handle all communications from or sent to the Internet

Intrusion detection systems Intrusion prevention systems

Copyright © 2015 Pearson Education, Inc. Slide 5-34

Page 35: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Firewalls and Proxy Servers

Figure 5.11, Page 294

Copyright © 2015 Pearson Education, Inc. Slide 5-35

Page 36: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Protecting Servers and Clients Operating system security

enhancementsUpgrades, patches

Anti-virus software Easiest and least expensive way to prevent

threats to system integrityRequires daily updates

Copyright © 2015 Pearson Education, Inc. Slide 5-36

Page 37: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Management Policies, Business Procedures, and Public Laws

Worldwide, companies spend more than $71 billion on security hardware, software, services

Managing risk includes:TechnologyEffective management policiesPublic laws and active enforcement

Copyright © 2015 Pearson Education, Inc. Slide 5-37

Page 38: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

A Security Plan: Management Policies Risk assessment Security policy Implementation plan

Security organization Access controls Authentication procedures, including biometrics Authorization policies, authorization management

systems

Security audit

Copyright © 2015 Pearson Education, Inc. Slide 5-38

Page 39: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Developing an E-commerce Security Plan

Figure 5.12, Page 297

Copyright © 2015 Pearson Education, Inc. Slide 5-39

Page 40: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

The Role of Laws and Public Policy Laws that give authorities tools for identifying,

tracing, prosecuting cybercriminals: USA Patriot Act Homeland Security Act

Private and private-public cooperation US-CERT CERT Coordination Center

Government policies and controls on encryption software OECD, G7/G8, Council of Europe, Wassener Arrangement

Copyright © 2015 Pearson Education, Inc. Slide 5-40

Page 41: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

E-commerce Payment Systems Credit cards

46% of online payments in 2014 (United States)

Debit cards32% online payments in 2014 (United States)

Limitations of online credit card paymentSecurity, merchant riskCostSocial equity

Copyright © 2015 Pearson Education, Inc. Slide 5-41

Page 42: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

How an Online Credit Transaction Works

Figure 5.15, Page 304

Copyright © 2015 Pearson Education, Inc. Slide 5-42

Page 43: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Alternative Online Payment Systems Online stored value systems:

Based on value stored in a consumer’s bank, checking, or credit card account

Example: PayPal

Other alternatives: Amazon PaymentsGoogle WalletBill Me LaterWUPay, Dwolla, Stripe

Copyright © 2015 Pearson Education, Inc. Slide 5-43

Page 44: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Mobile Payment Systems Use of mobile phones as payment devices

established in Europe and Asia Near field communication (NFC)

Short-range (2”) wireless for sharing data between devices

Expanding in United States Apple Pay PayPal Square Google Wallet

Copyright © 2015 Pearson Education, Inc. Slide 5-44

Page 45: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Digital Cash and Virtual Currencies Digital cash

Based on algorithm that generates unique tokens that can be used in “real” world

Example: Bitcoin

Virtual currenciesCirculate within internal virtual worldExample: Linden Dollars in Second Life,

Facebook Credits

Copyright © 2015 Pearson Education, Inc. Slide 5-45

Page 46: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Insight on Society: Class DiscussionInsight on Society: Class Discussion

Bitcoin What are some of the benefits of using a

digital currency? What are the risks involved to the user? What are the political and economic

repercussions of a digital currency? Have you or anyone you know ever used

Bitcoin?

Copyright © 2015 Pearson Education, Inc. Slide 5-46

Page 47: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Electronic Billing Presentment and Payment (EBPP)

Online payment systems for monthly bills Over 50% of all bill payments Two competing EBPP business models:

Biller-direct (dominant model) Consolidator

Both models are supported by EBPP infrastructure providers

Copyright © 2015 Pearson Education, Inc. Slide 5-47

Page 48: E-commerce 2015 Kenneth C. Laudon Carol Guercio Traver business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver business

Copyright © 2015 Pearson Education, Inc. Slide 5-48