You are on page 1of 61

Unit 2

The E-Marketing Environment


Prepared by
Dr.Lakshmi.H

Prepared by Dr.Lakshmi.H
2

Overview of Global E Marketing Issues


• Internet language users:
• English- 872.9 million
• China-704.5 million
• Increasing number of non us
internet users will have 2 effects:
web’s content and language-
more diversified- caters to more
local content
• Google- more than 100 countries-
130 languages
3

Global markets
• Globalization- changed the way-
marketers conduct business-
physical distance reduced-
advancements in
telecommunication and computer
technologies- lot of opportunities
for e marketing
• E marketers assess the country’s
market opportunity and market
conditions before selection of
specific targets for entry
4

Country & Market Opportunity Analysis


• E-marketing plan guides marketer through process of
identifying & analysing potential markets
• Market differences are ways in which 2 markets exhibit
dissimilar characteristics in language, cultural behaviors,
buying behaviors
• Market similarity refers to way 2 markets exhibit
similar characteristics
• Based on this concept- emerging economy- wants to
market to its home (domestic) target market- marketers
must identify market differences. Eg: India- India
• Similarly when a firm from developed economy wants to
do business in emerging economy- understand the
market differences. Eg: US to India
5

• Conversely marketers in emerging economy must find


market similarities to sell its products in developed
economies. Eg: India to US
• Market similarity:
• Marketers often choose foreign markets that have
characteristics similar to their home market for initial
market entry
• Eg: Amazon adopted this strategy of targeting Canada,
Japan, Australia than other countries because
▫ Share common language
▫ High literacy rates, high internet usage,
▫ Willing to shop books
▫ Credit cards for wide purchase
▫ Trusted online mechanisms and efficient logistics
6

• 2004 amazon entered china- through acquisition of


popular online bookstore joyo.com
• 2007 it cobranded wit joyo
• Globalization- migration of people from home country to
foreign land- form “diaspora community”
• This community often maintains relationship with their
homeland
• E business with emerging economy (India) target these
communities for living abroad (Dubai, UK,US)

• Market Similarity can be seen in phenomenon called as


‘Market Convergence’- process by which markets
becomes increasingly similar over time
7

• Eg: E commerce in India- especially banking- transactions


happen online- most preferred- convenient, time saving,
hassle free

• E commerce payment and trust issues:


• E commerce in emerging markets- often hampered by
limited use of credit cards- lack of trust in safely
conducting online transactions.
• Eg: Nepal- early stage of credit card adoption- cash based
economy- credit cards are for rich and elite. India also-
concept of COD (cash on delivery)
8

Technological Readiness Influences Marketing


• Apart from safety and credit card issues other hurdles
which e commerce companies faces are
1. Limited access to and limited use of computers and
telephones
2. High internet connection cost
3. Slow internet connection speeds
4. Power supplies
9

Computers and Telephone Internet connection costs

• Developed countries- • Use of smart phones- increase


internet service providers in internet to great extent
(ISP) or broad bands • Eg: Egypt innovative strategies
• Owning a computer is very increases internet access
general • Encouraged private sector
competition within domestic
• Emerging economies- telecommunication markets
growing computer • Egyptians could surf for
ownership- few places still unlimited amount of time for
less ownership the cost of only one call
• Telecenters/ internet cafes • 2nd initiative “A PC for every
• Prime hurdle to e-marketers home”- enable household to
in emerging markets- use of but PC in installment- showing
computers telephone credit
10

Electricity problems
• Nepal- less developed countries- rich in natural resources
• Through UN & other international aids- Nepal built series of
hydroelectric dams- 0nly 15% of households have dams
• NEA (Nepal Electrical Authority)- could not generate
electricity- 6-12 hours of blackout
• Similar condition with china Zimbawe and other countries,
India
11

Connection speeds: Broadband


influence
1. Users Problem
A largely computer illiterate population
Only 73 percent of Indians are literate, and only a small fraction
are computer-literate.

Solution
Through a countrywide digital literacy campaign N Ravi Shanker,
CMD of Bharat Broadband Network (BBNL), the government
entity charged with deploying a Rs 20,000-crore National Fibre
Optic Network, says, “We need pan-India digital literacy
campaigns and missions that are aligned to existing literacy and
education programmes like the National Literacy Mission and the
Sarva Shiksha Abhiyan. We should aim to make at least one
person in each household computer-literate.”
12

2. Devices Problem: Not enough affordable computing


devices
• Less percent of the population have access to a PC; decent
smartphones, tablets are too expensive for most.
• But experts estimate consumer adoption will shoot up once prices fall
to around Rs 3,000 for a smartphone and Rs 5,000 for a tablet.

3. Last Mile Connectivity Problem


• Excessively expensive and the biggest hurdle towards greater
penetration of wired broadband
• India has just 15 million connections.
• Out of the 94 million cable TV homes—homes that are already wired
with cable that can be upgraded to carry internet data—the bulk
remain TV consumers only..
13

Wireless Internet Access


• Explosive growth of smart phones- changes in e commerce
• General statistics- mobile phone-20 years to reach 1 billion-
but only 40 months to reach next billion
• BRIC countries- largest use of smart phones
• E marketers- has to modify the content- to fit into small
screen- develop content, secure payment methods
• Evolution of internet telephony and messaging services
14

The Digital Divide


• E marketers must consider the social environment- business
operate
• UN had developed a system to rank economic development
countries- Least Developed Countries- countries with
poorest economies- economically under developed
• Share common characteristics:
• Illiteracy, poor sanitation, majority rural population
• Formal education for school children but illiteracy remains for
young & old
• Infant mortality rates etc
• LDC often has population where wealth is concentrated in
country’s largest capital
• Capital cities- airports, world class hotels, banks, stores and
other facilities
15

• This disparity is mainly concerns the ability of technology to


raise both individual and whole country’s standard of living is
called as “Digital divide”
• In other words digital divide refers to wide division between
countries, different groups of people within countries- those
who have access to information & communication technology
& are using it effectively
• Rapid diffusion of mobile phones- develop small scale,
affordable, income generating projects for low income
consumers
16

Ethical and legal


issues
17

Overview of Ethics and Legal Issues


• Ethics- concerns with values • Law- created for broader
and practices of purpose- goal of addressing
professionals- values of national or international
society as a whole populations
• Ethics makes important
contributions to legal
developments, influencing
lobbyists, legislators &
judges
18

Ethics and Ethical Codes


• Ethics basically deals with right • Ethical codes developed by the
or wrong, how we judge the trade associations,
differences, organizations dictate
• Tasks involves necessarily appropriate behavior of
involve examination of rights participants
and responsibilities • Benefits:
• Ethical codes: American • Pressures to maximise profits
Marketing Association (AMA)- through exploitation can be
code of ethics reflects controlled
recognition of commitment to
practice honesty, integrity,
fairness in all professional
transactions
19

Privacy
• Privacy- can be defined as “right to be left alone”
• Lawsuits for invasion of privacy: 4 categories
1. Unreasonable intrusion seclusion of another
2. Unreasonable publicity of another private life
3. Appropriation of another’s name or likeness
4. Publication of another’s personal information in a false light
• Later theories evolved:
1. Seclusion theory:
• This model encourages law and ethical standards that are
oriented towards maintaining personal and punishing those
who cross the limits set by the individual
20

2. Access control:
• Emphasis on laws and standards that enables person to
reasonably regulate the information that they are giving up
• Empower individuals to protect personal material form
unauthorized release
• Eg: Details on FB

3. Autonomy model:
• Empowering individuals to decide whether to give information
are not
• Eg: credit cards, frequent flyer programs, security precautions
in airport etc
21

Privacy Within Digital Context


• 2000- Double click- online advertising firm- effort to collect
large database of personal consumer information
• Double click- success by establishing system of more than
11,000 websites with advertising when clicked- enables users
to visit product sites
• System records the response known as “clickstreams” within
own database
• Click stream info- was then available to form user profile-
allowing target advertising
• Users not given consent- 1,00,000 online profiles
• Controversy erupted when double click acquired abacus
direct- specialised in acquisition of offline consumer data
• Acquisition mainly to provide premium subscription
• Coalition of civil rights, privacy and consumer groups- filed a
case
22

• DoubleClick is a subsidiary
of Google which develops and provides
Internet ad serving services.
• Its clients include agencies, and
publishers who serve customers
like Microsoft, General Motors, Coca-
Cola,Motorola, L'Oréal, Apple
Inc., Visa USA, Nike etc among others.
• DoubleClick's headquarters is in New
York City, United States.
• Internet advertiser DoubleClick and
market researcher Abacus Direct have
won shareholder approval to merge in
a deal estimated to be worth $1.7
billion, bringing together droves of
consumer marketing information.
23

• Cookies- general means to obtain data- packets created in


user’s hard drive- response to web page instructions
• Once stored they perform various purposes- like speeding up
the process like purchasing, recall stored sales information
• Cookies collect personal data like address, email id, name,
phone number, demographic details, log in time etc
• Cookies can be transferred & sold in open market
• Children Online Protection Policy Act (COPP)- 2000
• This acts wants websites- knowingly collect information form
children under age of 12 years
• Provide notice to parents
• Verifiable parental consent- disclosure of information
• Allow parents to view correct information
• Enable parents to prevent further data collection
• Establish confidentiality, privacy
• Limit personal information in child participating in prize, offer
etc
24

International Privacy Issues


• FTC – minimum requirements in ethical use of consumer
information
1. Notice: Users should be aware of site’s information policy
before data collection
2. Consent: users should be allowed to choose participation
or exclusion from collection
3. Access: users should have ability to access their data and
correct them if wrong
4. Security: policies to ensure integrity of data and prevention
of misuse
5. Enforcement: users should have effective means to hold
data collection to their policies
25

Digital Property
• Primary function of law is ownership- challenging coz of
widespread use of internet
• So law protects protect intangible or intellectual property
through 3 basic mechanisms

1. Patent: centered upon inventions and ability to reproduce or


manufacture an inventor’s product
2. Copyright: addresses the expressions- right to publish or
duplicate expressions of ideas
3. Trademark: concerned with words and images used to
identify products in the market
26

Patents
• Mainly for invention but not for computer software- codes
algorithms and formulas are generic in nature- so cannot be
owned by anyone
• Current focus- business patents- marketing activities and
approaches, methods for conducting commerce online
27

Copyright
• Copyright is a bundle of rights given by the law to the
creators of literary, dramatic, musical and artistic
works and the producers of cinematograph films and
sound recordings.

• The rights provided under Copyright law include the


rights of reproduction of the work, communication of
the work to the public, adaptation of the work and
translation of the work.

• The scope and duration of protection provided under


copyright law varies with the nature of the protected
work.

• Lifetime of the author +60 years


28

• 1997- President Bill Clinton- No Electronic Theft (NET) Act


• Confers about copyright protection for computer contents and
imposes sanctions- infringement committed for commercial or
private financial gains- by reproduction or distribution
• Punishment- criminal prosecution

• Related act in 1998- Digital Millennium Copyright (DMCA)


Act
• For software protection, development or distribution of
products
29

Trademarks
• Concerned with ownership of intellectual property that
identifies goods or services
• Lanham Act:
• Trademarks may be registered with the government,
registered or not, may still be protect under this act
• Claimants must prove that trademark is protectable- more
distinctive
• This act also prohibits dilution- use of famous trademarks in
association with different goods or services in manner-
lessening its uniqueness
30

• Trademark law- applied to internet naming system- domain


names
• Eg: Domain names of websites
• When enough dissimilarity of goods or service exist repetition
may be allowed
• Cybersquatting:
• Activity involves registration of domain names that resembles or
duplicate the existing domain names or corporation names
• Domain name is then auctioned for higher sale price than the
original price
• Person is liable to suit, if he or she registers, traffics, sell a
domain name which is identical or confusingly similar to
registered trademark or which dilute the trademark
31

Metatags
• Are HTML statements that describes website contents
• They allow search engines to identify relevant sites to topics
of their inquiries
• Variation of metatag problem is found in practice of assigning
keywords- within search engines
• Eg: cosmetic manufacturer Estee Lauder sued Excite- alleging
entry of trademark to unlicensed dealer
• Framing:
• A process in which web browser is instructed to divide itself
into 2 or more partitions and load within a section obtained
form another website through execution of automatic link
32

Licenses
• Popular method of Intellectual property protection- involves
use of license
• Consist of contractual agreements made between consumers
and software vendors- allow the buyer to use the product but
restrict duplication or distribution
• Types of software validity are:
1. Shrink-wrap or break the seal licenses: appears outside the
software
2. Click-wrap licenses: user is required to click the button
online or within a program to acknowledge acceptance of
terms
• Shrink-wrap- vendors error, whereas click wrap legally
enforceable
33

UCITA Trade secrets


• Uniform Computer • Trade secrets include, but
Information not restricted to formulas,
Transactions Act market data, algorithms,
(UCITA) : codes and models
• Governs all legal • May be stored online or
agreements pertaining to intangible formats
software transactions • Computer based disclosures
including sales, license such as emails, downloads,
provisions, restricting web publications- within the
copying and release of scope of act
material, liability for
detective software
• UCITA applicable to
electronic books, materials
in computer readable form
34

Data Ownership
• Website usage is much easy and access is often shared by
site owners, marketing professionals, advertisers and
consumers
• Click data- new technology- collect data who access the ad
information
• Spidering:
• This process involves use of software applications called
‘robots’- to enter targeted websites and obtain data for the
use of its owner
35

Online Expression
• Mass distribution of unsolicited email is a major concern
• Spam, by definition, unrequested and users complain of
unwanted intrusion into their affairs
• Many users are disturbed that to find information given to
individuals or entities for one purpose is collected and sold
for mass distribution
• AMA code of ethics addresses spam problem as “the
expressed wishes of others should be respected with regard
to the receipt of unsolicited email messages”
• Opt out list to those who seek to avoid mass email messages
• Currently illicit spam consisting of deceptive, misleading
statements, false representation of email content as displayed
on the subject line
36

• Spam requires email headings to reveal their commercial


nature- recipients must provide clear instructions on how to
terminate further contact- further terminate spidering
• Computer Decency Act (CDA):
• Concerns with a criminal act to send an “obscene or indecent”
communication to recipient who was known to sender to be
under 18 years of age
• Any material that depicts or describes offensive content to the
minors
• Platform for Internet content Selection Rules (PICS):
• This website allows the filtering of sites that are deemed
inappropriate to minors- gives controls to parents and schools
37

• Cybercrime.mp4
38

Cyber Crime
• Cyber crimes can involve criminal activities that are traditional in
nature, such as theft, fraud, forgery, defamation and mischief, all of
which are subject to the Indian Penal Code.
• The abuse of computers has also given birth to a gamut of new age
crimes that are addressed by the Information Technology Act, 2000.

• Categorize Cyber crimes in two ways


1. The Computer as a Target :-using a computer to attack other
computers.
• e.g. Hacking, Virus/Worm attacks, DOS attack etc.
2. The computer as a weapon :-using a computer to commit real
world crimes.
• e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds,
offensive material etc.

• Cyber Crime regulated by Cyber Laws or Internet Laws.


39
• Technical Aspects
1. Unauthorized access & Hacking:-
• Access means gaining entry into, instructing or communicating with
the logical, arithmetical, or memory function resources of a
computer, computer system or computer network.

• Unauthorized access would therefore mean any kind of access


without the permission of either the rightful owner or the person in
charge of a computer, computer system or computer network.

• Every act committed towards breaking into a computer and/or


network is hacking. Hackers write or use ready-made computer
programs to attack the target computer. They possess the desire to
destruct and they get the kick out of such destruction. Some
hackers hack for personal monetary gains, such as to stealing the
credit card information, transferring money from various bank
accounts to their own account followed by withdrawal of money.

• By hacking web server taking control on another persons website


called as web hijacking
40

2. Trojan Attack:- 3. Virus and Worm attack:-


• A program that has capability to
• The program that act like
infect other programs and make
something useful but do the
copies of itself and spread into other
things that are quiet programs is called virus.
damping. The programs of • Programs that multiply like viruses
this kind are called as but spread from computer to
Trojans. computer are called as worms.
• The name Trojan Horse is 4. E-mail & IRC (Internet relay chat)
popular. related crimes:-
• Trojans come in two parts, a 1. Email spoofing
Client part and a Server part. • Email spoofing refers to email that
When the victim appears to have been originated
from one source when it was
(unknowingly) runs the
actually sent from another source.
server on its machine, the
2. Email Spamming
attacker will then use the
• Email "spamming" refers to sending
Client to connect to the
email to thousands and thousands of
Server and start using the users - similar to a chain letter.
trojan.
41

3. Sending malicious 5. Denial of Service attacks:-


codes through email • Flooding a computer resource
• E-mails are used to send with more requests than it can
viruses, Trojans etc through handle. This causes the resource
emails as an attachment or to crash thereby denying access
by sending a link of website of service to authorized users.
which on visiting downloads • Examples include
malicious code. • attempts to "flood" a network,
4. Email bombing thereby preventing legitimate
• E-mail "bombing" is network traffic
characterized by abusers • attempts to disrupt connections
repeatedly sending an between two machines, thereby
identical email message to preventing access to a service
a particular address. • attempts to prevent a particular
• Sending threatening emails individual from accessing a
• Defamatory emails service
• Email frauds • attempts to disrupt service to a
specific system or person.
42

6. Distributed DOS 7. Forgery:-


• A distributed denial of service • Counterfeit currency notes,
(DoS) attack is accomplished postage and revenue
by using the Internet to break stamps, mark sheets etc
into computers and using them can be forged using
to attack a network. sophisticated computers,
• Hundreds or thousands of printers and scanners.
computer systems across the • Also impersonate another
Internet can be turned into person is considered
“zombies” and used to attack forgery.
another system or website.
43

8. IPR Violations:-
• These include software piracy, copyright
infringement, trademarks violations, theft of
computer source code, patent violations.
etc.
Is a nonprofit
organization that is
• Cyber Squatting- Domain names are also responsible for
trademarks and protected by ICANN’s coordinating the
(The Internet Corporation for Assigned maintenance and
Names and Numbers) domain dispute methodologies of
several databases, with
resolution policy and also under trademark unique identifiers,
laws. related to the
namespaces of
the Internet - and
• Cyber Squatters registers domain name
thereby, ensuring the
identical to popular service provider’s network's stable and
domain so as to attract their users and get secure operation
benefit from it.
44

9. Cyber Terrorism:- 1.It is cheaper than traditional


• Targeted attacks on military terrorist methods.
installations, power plants, 2.Cyber terrorism is more
air traffic control, banks, trail anonymous than traditional
traffic control, terrorist methods.
telecommunication networks 3.The variety and number of
are the most likely targets. targets are enormous.
4.Cyber terrorism can be
• Others like police, medical, conducted remotely, a feature
fire and rescue systems etc. that is especially appealing to
terrorists.
• Cyber terrorism is an 5.Cyber terrorism has the
attractive option for modern potential to affect directly a
terrorists for several larger number of people.
reasons.
45

10. Banking/Credit card 11. E-commerce/ Investment


Related crimes:- Frauds:-
• In the corporate world, Internet • Sales and Investment frauds. An
hackers are continually looking offering that uses false or fraudulent
for opportunities to compromise claims to solicit investments or
a company’s security in order to loans, or that provides for the
gain access to confidential purchase, use, or trade of forged or
banking and financial counterfeit securities.
information. • Merchandise or services that were
• Use of stolen card information or purchased or contracted by
fake credit/debit cards are individuals online are never
common. delivered.
• Bank employee can grab money • The fraud attributable to the
using programs to deduce small misrepresentation of a product
amount of money from all advertised for sale through an
customer accounts and adding it Internet auction site or the non-
to own account also called as delivery of products purchased
salami. through an Internet auction site.
46

• Investors are enticed to invest 13. Online gambling:


in this fraudulent scheme by the • There are millions of websites
promises of abnormally high hosted on servers abroad, that
profits. offer online gambling. In fact, it
12. Sale of illegal articles:- is believed that many of these
• This would include trade of websites are actually fronts for
narcotics, weapons and wildlife money laundering.
etc., by posting information on 14. Defamation:
websites, auction websites, and • Defamation can be understood as
bulletin boards or simply by the intentional infringement of
using email communication. another person's right to his
• Research shows that number of good name.
people employed in this criminal • Cyber Defamation occurs when
area. Daily peoples receiving so defamation takes place with the
many emails with offer of help of computers and / or the
banned or illegal products for Internet.
sale.
47

• E.g. someone publishes 15. Cyber Stalking:-


defamatory matter about • Cyber stalking involves following
someone on a website or a persons movements across the
sends e-mails containing Internet by posting messages
defamatory information to all (sometimes threatening) on the
of that person's friends. bulletin boards frequented by the
Information posted to a victim, entering the chat-rooms
bulletin board can be accessed frequented by the victim,
by anyone. This means that constantly bombarding the victim
anyone can place with emails etc.
• Cyber defamation is also called • In general, the harasser intends
as Cyber smearing. to cause emotional distress and
has no legitimate purpose to his
communications.
48

16. Identity Theft : 17. Data diddling:


• Identity theft is the fastest • Data diddling involves changing
growing crime in countries like data prior or during input into a
America. computer.
• Identity theft occurs when • In other words, information is
someone appropriates changed from the way it should
another's personal information be entered by a person typing in
without their knowledge to the data, a virus that changes
commit theft or fraud. data, the programmer of the
• Identity theft is a vehicle for database or application, or
perpetrating other types of anyone else involved in the
fraud schemes. process of having information
stored in a computer file.
• It also include automatic
changing the financial
information for some time before
processing and then restoring
original information.
49

18.Theft of computer 20.Breach of Privacy and


system (Hardware):- Confidentiality
• This type of offence • Privacy
involves the theft of a • Privacy refers to the right of
computer, some part(s) of a an individual/s to determine
computer or a peripheral when, how and to what
attached to the computer. extent his or her personal
data will be shared with
19.Physically damaging a others.
computer system:- • Breach of privacy means
• Physically damaging a unauthorized use or
computer or its peripherals distribution or disclosure of
either by shock, fire or personal information like
excess electric supply etc. medical records, financial
status etc.
50

• Confidentiality • Generally for protecting secrecy


• It means non disclosure of of such information, parties
information to unauthorized while sharing information forms
or unwanted persons. an agreement about the
• In addition to Personal procedure of handling of
information some other type information and to not to
of information which useful disclose such information to
for business and leakage of third parties or use it in such a
such information to other way that it will be disclosed to
persons may cause damage third parties.
to business or person, such • Many times party or their
information should be employees leak such valuable
protected. information for monitory gains
and causes breach of contract
of confidentiality.
51

• Cyber Security Facts.mp4


52

Cyber Security
• Computer security, also known
as cyber security or IT security, is
the protection of information
systems from theft or damage to
the hardware, the software, and to
the information on them, as well as
from disruption or misdirection of the
services they provide.

• It includes controlling physical access to


the hardware, as well as protecting
against harm that may come via network
access, data and code injection, and due
to malpractice by operators,
whether intentional, accidental, or due to
them being tricked into deviating from
secure procedures.
53

• The field is of growing importance due to the increasing


reliance on computer systems in most societies.

• Computer systems now include a very wide variety of "smart"


devices, including smartphones, televisions and tiny devices as
part of the Internet of Things – and networks include not only
the Internet and private data networks, but
also Bluetooth, Wi-Fi and other wireless networks
54

Backdoors
• A backdoor in a computer system, a cryptosystem or an
algorithm, is any secret method of bypassing normal
authentication or security controls.

• They may exist for a number of reasons, including by


original design or from poor configuration.

• They may also have been added later by an authorized


party to allow some legitimate access, or by an attacker
for malicious reasons; but regardless of the motives for
their existence, they create a vulnerability
55

Denial-of-service attack
• Denial of service attacks are designed to make a machine or
network resource unavailable to its intended users.
• Attackers can deny service to individual victims, such as by
deliberately entering a wrong password enough consecutive
times to cause the victim account to be locked, or they may
overload the capabilities of a machine or network and block all
users at once.
• System will be attacked with more applications which it cannot
handle
• Such attacks can originate from the zombie computers of
a botnet, where innocent systems are fooled into sending traffic
to the victim.
56

Direct- Access Attacks


• An unauthorized user gaining physical access to a computer is
most likely able to directly download data from it.

• They may also compromise security by making operating


system modifications, installing software worms, keyloggers
(record every keystroke), covert listening devices or using
wireless mic.

• Even when the system is protected by standard security


measures, these may be able to be by passed by booting
another operating system or tool from a CD-ROM or other
bootable media.

• Disk encryption and Trusted Platform Module are designed to


prevent these attacks.
57

Eavesdropping Spoofing
• Eavesdropping is the act of • Spoofing of user identity
surreptitiously listening to a describes a situation in which
private conversation, typically one person or program
between hosts on a network. successfully masks as another
• For instance, programs such by falsifying data.
as Carnivore and NarusInsight
have been used by
the FBI and NSA to eavesdrop
• Tampering
on the systems of internet • Tampering describes a
service providers. malicious modification of
products.
• Even machines that operate as
a closed system (i.e., with no • So-called "Evil Maid"
contact to the outside world) attacks and security services
can be eavesdropped upon via planting of surveillance
monitoring the faint electro- capability into routers[ are
magnetic transmissions examples.
generated by the hardware
58

Phishing Privilege escalation

• Phishing is the attempt to • Privilege escalation describes a


acquire sensitive information situation where an attacker
such as usernames, passwords, with some level of restricted
and credit card details directly access is able to, without
from users. authorization, elevate their
• Phishing is typically carried privileges or access level.
out by email spoofing or • So for example a standard
instant messaging, and it often computer user may be able to
directs users to enter details at fool the system into giving
a fake website whose look and them access to restricted data;
feel are almost identical to the or even to "become root" and
legitimate one. have full unrestricted access to
a system.
59

Clickjacking
• Clickjacking, also known as "UI redress attack or User Interface
redress attack", is a malicious technique in which an attacker
tricks a user into clicking on a button or link on another
webpage while the user intended to click on the top level page.
• The attacker is basically "hijacking" the clicks meant for the top
level page and routing them to some other irrelevant page,
most likely owned by someone else. A similar technique can be
used to hijack keystrokes.
• Carefully drafting a combination of stylesheets, frames, buttons
and text boxes, a user can be led into believing that they are
typing the password or other information on some authentic
webpage while it is being channeled into an invisible frame
controlled by the attacker.
60

Systems at risk
1. Financial systems: credit card numbers and bank
account, ATMS

2. Utilities and industrial equipment: Computers control


functions at many utilities, including coordination
of telecommunications, the power grid, nuclear power
plants, and valve opening and closing in water and gas
networks. Nuclear devices

3. Aviation: A simple power outage at one airport can cause


repercussions worldwide, much of the system relies on radio
transmissions which could be disrupted, air traffic
control outages, which in turn can lead to airport closures,
loss of aircraft, loss of passenger life, damages on the
ground and to transportation infrastructure
61

4. Consumer devices: Smart phones, tablet


computers, smart watches, activity trackers have also
become targets and many of these have sensors such as
cameras, microphones, GPS receivers, compasses

5. Government: Government and military computer systems


are commonly attacked by activists and foreign powers

You might also like