Professional Documents
Culture Documents
Lecture Notes
Dr. Rana Nour El-Deen
The E-commerce Security Environment
Has data on the site been altered without Has information I transmitted or Integrity
authorization? Is data being received from
?received been altered
?customers valid
?Can a customer deny ordering products Can a party to an action with me Nonrepudiation
?later deny taking the action
?What is the real identity of the customer Who am I dealing with? How Authenticity
can I be assured that the person
or entity is who they claim to
?be
Are messages or confidential data accessible Can someone other than the Confidentiality
to anyone other than those authorized to intended recipient read my
?view them ?messages
What use, if any, can be made of personal Can I control the use of Privacy
data collected as part of an e-commerce information about myself
transaction? Is the personal information of transmitted to an
customers being used in an unauthorized
?e-commerce merchant
?manner
?Is the site operational ?Can I get access to the site Availability
Thirdly: Malicious Code
:Examples
Trojan Horse: malicious code that looks legitimate but can take -
control of your computer. A Trojan is designed to damage, disrupt,
steal, or in general inflict some other harmful action on your data or
.network
Credit Card Fraud/Theft: Theft of credit card data is one of the most -
feared occurrences on the internet. Fear that credit card information
will be stolen prevents users from making online purchases in many
.cases
.The action steps you will take to achieve the security plan goals
Credit cards expand the user's purchasing power and raise the -
standards of living, in addition that credit cards provide a convenient
.payment method for purchases
The limitations of the online credit card system have opened the way for
.the development of a number of alternative online payment systems
:Blockchain*