E-Commerce Module4 (2)
E-Commerce Module4 (2)
E-Security
Module 4
Information system security
.
● Security refers to the policies, procedures and technical measures
and to prevent unauthorised access,alteration,theft or physical
damage to information systems.
● Confidentiality objective
● Integrity objective
● The actual attack occurs when the victim visits the web page or
web application that executes the malicious code.
● The web page or web application becomes a vehicle to deliver the
malicious script to the user’s browser.
Broken authentication and session management
.
● If the user authentication system of a website is weak, hackers can
take full advantage.
● Authentication systems involve passwords, session IDs, and
cookies that can allow a hacker to access user’s account from any
computer.
● If a hacker exploits the authentication and session management
system, they can operate with user’s identity.
Cross site request forgery attack
.
● Cross-site request forgery (also known as CSRF) is a web security
vulnerability that allows an attacker to induce users to perform
actions that they do not intend to perform.
● Acting as a intermediary
● Auditing
Normally, the spoof website will adopt the design of the target
website, and it sometimes has a similar URL.
● Cyber squatting
. It means an activity in which a person or firm register, purchase
and uses the existing domain name, belonging to a well known
organization, for the purpose of infringing its trademark.
● Identity theft
The availability of emails and popup ads have paved the way for
financial criminals to have access to many people.
● Skimming
. Skimming is the unauthorized capture and transfer of payment data
to another source.
Remedial measures
■ Involvement of parent
■ Keep computer in an open area
■ Set rules and warn about dangers
■ Talking with children
■ Monitor computer activity
■ Partitioning computer into separate account
.
The End
Thank You
Teacher : Jishna K