Chapter 5 E-Commerce
Chapter 5 E-Commerce
Systems
Escalating Cyberwarfare and DDoS Attacks: The Russia-Ukraine conflict has led to
an increase in cyberwarfare, with DDoS attacks now capable of slowing down Internet
services at a national level.
Focus on Social Networks and Hacktivism: Hackers are targeting social networks
for social engineering attacks, while politically motivated hacktivist groups are
merging with financially motivated criminals to target financial systems.
Role of Laws and Policies: Security technologies alone are insufficient; organizational
policies and procedures must ensure proper implementation, while laws and industry
standards are needed for enforcement and prosecution of offenders.
Balance Between Cost and Security: Security must be balanced with costs, as absolute
security is impossible; instead, it is often sufficient to protect information for a specific
period of time, considering its time value.
Weakest Link Principle: Security is only as strong as its weakest link, meaning that proper
management of all security measures—including technologies, keys, and processes—is
essential for a secure e-commerce environment.
THE E-COMMERCE SECURITY ENVIRONMENT
The Dimensions of E-commerce Security
Integrity:
Ensures information is not altered by unauthorized parties during transmission or
display.
Nonrepudiation: Ensures participants cannot deny their online actions or
transactions.
Confidentiality: Ensures that only authorized individuals can access messages and
data.
Malicious code (malware) includes threats like viruses, worms, ransomware, Trojan horses, and bots.
Exploits target software vulnerabilities in operating systems, web browsers, and applications.
Exploit kits are bundles of exploits sold as commercial products, often requiring minimal technical skill
to use.
Malware is delivered through email attachments, malicious links, drive-by downloads, and malvertising.
Common methods include embedding malware in PDFs or through online advertising networks
(malvertising).
Different Types of Malware
Server attacks are less frequent but can take down entire websites,
whereas client-level attacks are more common and spread easily.
Countermeasures and Security Improvements:
https://www.youtube.com/watch?v=n8mbzU0X2nQ
Phishing
Social Engineering and Phishing:
A common example is the "Nigerian letter" scam, which has become more
sophisticated over time.
Phishing
Business Email Compromise (BEC):
Phishers use email, social media, and text messaging to deceive recipients into giving
out personal information.
Phishing websites often "spoof" legitimate institutions and may install malware, such
as keyloggers, on victims' devices.
Example: Meta's lawsuit in 2021 targeted phishing schemes involving 39,000 fake
websites intended to deceive users into sharing login credentials.
Impact of Phishing:
In the hacking community, "cracker" refers to a hacker with criminal intent, though
in public, both terms are often used interchangeably.
Hackers and crackers exploit security weaknesses to gain access to websites and
systems.
Evolution of Hacking Intent:
Major tech companies (e.g., Apple, Microsoft, Intel) and blockchain firms
offer bounties to hackers who discover vulnerabilities in their systems.
Some hackers seek prestige rather than financial gain by discovering and
publishing security flaws without causing disruption.
Data breaches enable credential stuffing, a type of brute force attack where hackers use botnets
and automated tools to exploit known usernames and passwords from breached data.
Credential stuffing is especially prevalent in financial services, with over 193 billion attacks
observed in 2020.
Yahoo: Exposed data of 3 billion users, making it the largest breach in history.
Marriott International: Exposed personal data of nearly 400 million customers through its
Starwood reservation system.
Equifax: Unpatched software allowed access to data of about 147 million U.S. consumers.
T-Mobile (2021): Exposed personal records of over 50 million customers in its third major data
breach in two years.
CREDIT CARD FRAUD/THEFT
Fear and Prevention of Credit Card Theft
•Theft of credit card data online is a major concern, discouraging users from
making online purchases.
•Merchants use techniques such as automated fraud detection, manual order
reviews, and additional security checks (e.g., CVV codes) to combat fraud.
Liability and Costs of Credit Card Fraud
•U.S. federal law limits individual liability to $50 for fraudulent charges.
•Credit card companies and merchants often bear losses, leading to higher
interest rates and prices to cover costs.
Shift to EMV Technology
The U.S. is transitioning to EMV credit cards with computer chips, which are more secure
than magnetic strips.
EMV cards support contactless payments but cannot fully prevent data breaches.
Previously, fraud was caused by lost/stolen cards, employee theft, and stolen identities.
Today, hacking and looting of corporate servers holding credit card information is the
leading cause.
Identity Verification Challenges
Establishing a customer’s identity online is challenging, posing higher risks for e-commerce.
U.S. federal laws, like the E-Sign Act, give digital signatures legal authority, supporting the
use of e-signatures in various sectors.
E-signature solutions like DocuSign and Adobe Sign use multi-factor authentication and
encryption to verify identities.
IDENTITY FRAUD
•Unauthorized Use: Involves unauthorized use of personal data, like social
security and credit card numbers, for illegal financial benefit.
•Financial Gain: Criminals use identity fraud to obtain loans, purchase
merchandise, or access services.
•Fraud Techniques: Techniques such as spyware, phishing, data breaches,
and credit card theft are employed for identity fraud.
•Consumer Loss: In 2021, about 15 million U.S. consumers suffered identity
fraud, resulting in $24 billion in losses.
•Account Fraud: New account fraud rose by over 100%, and account
takeover losses increased by 90% in 2021.
SPOOFING, PHARMING, AND SPAM (JUNK)
WEBSITES
Spoofing Identity: Involves hiding a true identity by using someone
else's email or IP address.
Spam Websites: Junk websites that promise products or services but are
mostly filled with advertisements.
Distributed Attacks: In a Distributed Denial of Service (DDoS) attack, hackers use botnets
composed of thousands of compromised computers to launch coordinated attacks from
multiple points, making the attack harder to mitigate. These attacks can indefinitely shut
down a target network, causing significant operational damage.
IoT Vulnerability: The growing number of Internet of Things (IoT) devices has created new
vulnerabilities, as hackers use these connected devices to form botnets for launching DDoS
attacks. High-profile examples include the Mirai botnet, which took down major websites by
overwhelming their servers with traffic from infected IoT devices.
Smokescreening: DDoS attacks are often used as a diversion while hackers carry out more
harmful activities, such as inserting malware or stealing data. The chaos of a DDoS attack
can distract security teams, allowing attackers to infiltrate systems unnoticed.
INSIDER ATTACKS
Internal Threats: Insider attacks pose the largest financial threat to businesses,
often surpassing external attacks such as robberies. Employees with access to
sensitive data can embezzle funds or misuse information, resulting in significant
financial damage.
Increasing Incidents: The frequency and costs of insider attacks have risen
significantly. According to a Proofpoint/Ponemon Institute survey, the average
annual cost of insider threats increased by over 33% to $15.4 million between
2019 and 2021, highlighting their growing impact on organizations.
Unintentional Data Breaches: Not all insider incidents are malicious; some are
accidental due to user carelessness. Unintentional data breaches can still be highly
damaging, making it crucial for companies to address both intentional and
accidental risks.
POORLY DESIGNED SOFTWARE
SQL Injection Vulnerabilities: Poorly coded software, especially in web applications,
can be vulnerable to SQL injection (SQLi) attacks. SQLi exploits improper input
validation, allowing attackers to inject malicious code and gain unauthorized access to
databases.
Social Engineering Attacks: Many attacks on social networks exploit social engineering,
tricking users into clicking malicious links, sharing information, or installing malware through
deceptive tactics like fake events, fake apps, or reactions.
Notorious Incidents: In 2020, hackers took over prominent Twitter accounts via a social
engineering hack and posted a Bitcoin scam, showcasing the vulnerabilities of social networks
to such attacks.
Ineffective Policing by Platforms: Social networks have been poor at preventing these attacks,
as they often fail to adequately remove malicious accounts and do not certify apps as malware-
free, leaving users vulnerable.
MOBILE PLATFORM SECURITY ISSUES
Malware and Vulnerabilities:
Increased Exposure: Mobile
Mobile malware, especially on
devices are loaded with
Android devices, is prevalent
personal and financial
due to poorly regulated third-
information, making them
party app stores. Android and
prime targets for hackers.
iOS are susceptible to
Users often underestimate the
malicious apps, spyware like
vulnerabilities in smartphones
Pegasus, and browser-based
compared to computers.
malware.
Smishing Attacks: SMS
Wi-Fi and SIM Card
phishing (smishing) attacks
Threats: Public Wi-Fi
exploit users' trust in text
networks and flaws in SIM
messages, directing them to
cards create vulnerabilities,
malicious sites, while SMS
allowing attackers to intercept
spoofing conceals attackers'
data or gain access to devices.
identities.
CLOUD SECURITY ISSUES
Privacy Concerns: Metaverse platforms may collect and store biometric data,
behavioral patterns, and personal information, raising serious privacy and data
security concerns.
Protecting Internet Communications
Public Nature of Internet Communications:
•E-commerce transactions pass through many routers and servers, posing security threats.
•Unlike private networks, public networks lack dedicated communication lines,
increasing vulnerability.
TOOLS
AVAILABLE TO
ACHIEVE E-
COMMERCE
SECURITY
Encryption
• Definition: Process of converting plain text into unreadable cipher text.
• Purpose:
– Secure stored information.
– Secure information during transmission.
• Types of Ciphers:
Security Strength: The keys are long (128, 256, 512 bits), making it
difficult for even the largest and fastest computers to crack the encryption.
Public Key Cryptography Using Digital
Signatures and Hash Digests
Limitations of Public Key Cryptography: Lacks authentication,
nonrepudiation, and integrity, meaning the sender's identity is not verified, they
could deny sending the message, and the message could be altered in transit.
Message Encryption: The sender encrypts both the original message and its
hash using the recipient's public key, ensuring confidentiality.
TLS and HTTPS: TLS (Transport Layer Security) replaced SSL (Secure Sockets Layer) as
the protocol for secure communication over the Internet. HTTPS (Secure Sockets Layer) uses
TLS to encrypt data and verify the server identity, providing a secure version of HTTP.
Digital Certificates: TLS uses digital certificates to authenticate server identities, ensuring
users are communicating with legitimate entities, especially during sensitive transactions like
online shopping.
Secure Negotiated Session: During communication, TLS establishes a secure session using
a unique session key for encryption, ensuring data confidentiality and integrity between the
browser and server.
Handshake Process: The handshake involves exchanging digital certificates and agreeing on
a session key, which is used to encrypt data for that particular session, ensuring privacy and
data security.
Server and Client Authentication: TLS primarily ensures server authentication, providing
assurance that users are communicating with a verified server. Client authentication is
optional.
HSTS and HTTPS Adoption: HTTP Strict Transport Security (HSTS) ensures that browsers
use HTTPS for secure communication. Today, about 80% of websites use HTTPS by default,
improving overall Internet security.
Virtual Private Networks (VPNs)
Secure Remote Access: VPNs allow remote users to securely connect to a local network
via the Internet, providing a safe way to access private resources from anywhere.
Tunneling Process: The process of connecting one protocol through another is called
"tunneling." It creates a secure "tunnel" by wrapping messages in an encrypted layer,
making it inaccessible to unauthorized viewers.
Virtual Secure Line: Although VPNs provide a secure connection, they are "virtual" in
the sense that they are not dedicated, but rather temporary secure connections that
appear like private lines to users.
Popularity with Remote Work: The use of VPNs has surged due to the increase in
remote work, providing a reliable solution for maintaining security and connectivity for
distributed teams.
Security Issues of Wireless (Wi-fi) Networks
Early Wi-Fi Security (WEP): Early Wi-Fi networks used Wired
Equivalent Privacy (WEP) for encryption, which was weak and easily
compromised by hackers.
Dual-Home Systems: Proxy servers are sometimes called dual-home systems due
to their two network interfaces. They serve as a gateway for internal users and act
as a mail server or numeric address for external systems.
Request Handling: When users request web pages, the proxy server validates the
request before allowing it to proceed to the Internet, thereby controlling access
and filtering unwanted websites.
CERT Coordination Center at Carnegie Mellon: The CERT Coordination Center, a private
organization, tracks criminal online activities and assists private corporations and government
agencies in identifying, tracing, and mitigating cyberattacks.
Expert Assistance and Public Communication: CERT comprises computer experts who help
organizations trace the origins of cyberattacks, identify security issues, and develop solutions,
while also communicating with the public about hacker threats.
Public Training and Knowledge Enhancement: CERT offers product assessments, reports, and
training to increase public awareness of cybersecurity threats and improve understanding of
effective security measures and solutions.
E-Commerce Payment Systems
Adaptation of Traditional Payment Methods: Traditional payment mechanisms,
including cash, credit cards, debit cards, and stored value accounts, have been adapted
to online use but face limitations, prompting the need for alternative payment solutions.
Emergence of New Payment Systems: The rise of mobile platforms and new
purchasing relationships among individuals has driven the development of new e-
commerce payment systems, meeting emerging consumer needs.
Market Growth and Competition: The U.S. online payment market exceeded $1
trillion in 2022, with increased demand driven by the pandemic. Payment processors,
such as banking and credit card firms, earn significant revenues through transaction
fees, fueling competition.
Credit and Debit Cards Remain Dominant: Credit and debit cards are still the
primary payment methods for online transactions in the U.S., despite the availability of
alternative systems, which rely on traditional banking institutions for managing funds
and providing credit.
Rise of Mobile Wallet Apps: Mobile wallet apps, such as PayPal, have become the
fastest-growing form of alternative payment systems, with around 41% of U.S.
smartphone users utilizing these apps for payments in 2022, reflecting a significant
trend towards mobile-based transactions.
MAJOR TRENDS IN E-COMMERCE
PAYMENTS 2022–2023
Dominance of Credit and Debit Cards: Credit and debit cards continue to
be the leading forms of payment for online transactions.
Rise of Mobile Payments and Apps: Mobile retail payments have surged,
with major tech companies like Apple, Google, expanding their mobile
payment app offerings, and services like PayPal maintaining popularity.
Emergence of BNPL and P2P Systems: Buy Now Pay Later (BNPL)
services are growing in popularity, while peer-to-peer (P2P) systems such as
Venmo, Zelle, and Square Cash are becoming mainstream.
Dominant Payment Method: Credit and debit cards are the primary forms
of online payment, and online transactions work similarly to in-store
transactions but without physical card presence or signature.
Cardholder Not Present (CNP) Transactions: Online transactions are
considered CNP, making them more prone to disputes since merchants do
not see the card or obtain a signed payment agreement.
Parties Involved in Transactions: Five parties are involved in online
credit card purchases—consumer, merchant, clearinghouse, merchant
bank, and card-issuing bank.
Merchant Account Requirement: Online merchants need a merchant
account to process credit card payments and receive funds from
transactions.
Transaction Process: A secure TLS tunnel is used to transmit credit card
information, which is authenticated by a clearinghouse and verified by the
issuing bank, ultimately crediting the merchant’s account.
HOW AN ONLINE CREDIT CARD
TRANSACTION WORKS
How Credit Card Processing Works -
Transaction Cycle & 2 Pricing Models
https://www.youtube.com/watch?v=avRkRuQsZ6M
Credit Card E-commerce Enablers
Two-Step Process: Securing a merchant account is just the first
step; merchants also need software to handle online transactions,
often provided by payment gateways.
Payment Service Providers: Providers like Authorize.net,
Cybersource, Stripe, and Square help merchants secure accounts
and process transactions through a "payment gateway."
Transaction Routing: Payment gateways collect transaction
information from merchants and route it to the appropriate bank to
ensure customer authorization.
PCI-DSS Compliance: The Payment Card Industry-Data Security
Standard (PCI-DSS) is a mandated industry standard, not a law,
required for merchants to accept credit card payments securely.
Compliance Levels: PCI-DSS has various levels, related to the
number of card transactions processed annually, and non-
compliance can result in fines and expenses for breached merchants.
Limitations of Online Credit Card Payment Systems
PayPal: A leading online stored value payment system available in over 200
countries. Users can make payments using linked bank accounts or credit/debit
cards without sharing personal credit information. It remains dominant with 425
million active consumer users but has relatively high fees (1.9% to 3.49% plus a
fixed fee).
Amazon Pay: Enables consumers to make purchases on non-Amazon websites
using payment methods stored in their Amazon accounts, aimed at those wary of
sharing credit card information with unfamiliar retailers.
Meta Pay (formerly Facebook Pay): Allows users to transfer money directly from
banks and credit cards for purchases or peer-to-peer transactions, saving payment
information for future use.
Visa Checkout & Mastercard MasterPass: Substitute a user’s name and password
for actual payment card numbers during checkout but have not reached PayPal’s
usage level.
Buy Now Pay Later (BNPL): Allows purchases in installments, with payment
volume rising from $6.5 billion in 2019 to over $75 billion in 2022. Klarna and
Afterpay are popular providers, serving millions of users in the U.S.
Mobile Payment Systems
Definition: Mobile payments involve using a mobile device for
payments, including online, in-store, and peer-to-peer (P2P) transactions.
Mobile wallets are smartphone apps storing debit cards, coupons, and
other payment means.