Unit 4 Ecommerce
Unit 4 Ecommerce
• The number of the most common and most damaging forms of security
threats to e-commerce consumers and site operators: malicious code,
potentially unwanted programs, phishing, hacking and cybervandalism,
credit card fraud/theft, spoofing, pharming, spam (junk) websites (link
farms), identity fraud, Denial of Service (DoS) and DDoS attacks,
sniffing, insider attacks, poorly designed server and client software, social
network security issues, mobile platform security issues, and finally,
cloud security issues.
• MALICIOUS CODE
• Malicious code (sometimes referred to as “malware”) includes a variety
of threats such as viruses, worms, Trojan horses, ransomware, and bots.
• Some malicious code, sometimes referred to as an exploit, is designed to
take advantage of software vulnerabilities in a computer’s operating
system, web browser, applications, or other software components.
• Exploit kits are collections of exploits bundled together and rented or
sold as a commercial product, often with slick user interfaces and in-
depth analytics functionality. Use of an exploit kit typically does not
require much technical skill, enabling novices to become cybercriminals.
• Malware is often delivered in the form of a malicious attachment to an
email or embedded as a link in the email.
• One of the latest innovations in malicious code distribution is to embed it
in the online advertising chain (known as maladvertising), including in
Google, AOL, and other ad networks.
• Much of the maladvertising in the recent years has been in the form of
drive-by downloads that exploited the frequent zero-day vulnerabilities
that have plagued Adobe Flash, which is often used for online
advertisements.
• A drive-by download is malware that comes with a downloaded file that a
user intentionally or unintentionally requests. Drive-by is now one of the
most common methods of infecting computers.
• A virus is a computer program that has the ability to replicate or make
copies of itself, and spread to other files. In addition to the ability to
replicate, most computer viruses deliver a “payload.” The payload may be
relatively benign, such as the display of a message or image, or it may be
highly destructive—destroying files, reformatting the computer’s hard
drive, or causing programs to run improperly.
• Viruses are often combined with a worm. Instead of just spreading from
file to file, a worm is designed to spread from computer to computer. A
worm does not necessarily need to be activated by a user or program in
order for it to replicate itself.
• Ransomware (scareware) is a type of malware (often a worm) that locks
your computer or files to stop you from accessing them. Ransomware will
often display a notice that says an authority such as the FBI, Department
of Justice, or IRS has detected illegal activity on your computer and
demands that you pay a fine in order to unlock the computer and avoid
prosecution.
• A Trojan horse appears to be benign, but then does something other than
expected. The Trojan horse is not itself a virus because it does not
replicate, but is often a way for viruses or other malicious code such as
bots or rootkits (a program whose aim is to subvert control of the
computer’s operating system) to be introduced into a computer system.
• A backdoor is a feature of viruses, worms, and Trojans that allows an
attacker to remotely access a compromised computer. Downadup is an
example of a worm with a backdoor, while Virut, a virus that infects
various file types, also includes a backdoor that can be used to download
and install additional threats.
• Bots (short for robots) are a type of malicious code that can be covertly
installed on your computer when attached to the Internet. Once installed,
the bot responds to external commands sent by the attacker; your
computer becomes a “zombie” and is able to be controlled by an external
third party (the “bot-herder”). Botnets are collections of captured
computers used for malicious activities such as sending spam,
participating in a DDoS attack, stealing information from computers, and
storing network traffic for later analysis.
• POTENTIALLY UNWANTED PROGRAMS (PUPS)
• In addition to malicious code, the e-commerce security environment is further
challenged by potentially unwanted programs (PUPs) such as adware, browser
parasites, spyware, and other applications that install themselves on a computer, such
as rogue security software, toolbars, and PC diagnostic tools, typically without the
user’s informed consent. Such programs are increasingly found on social network and
user generated content sites where users are fooled into downloading them.
• Once installed, these applications are usually exceedingly difficult to remove from the
computer
• Adware is typically used to call for pop-up ads to display when the user visits certain
sites. While annoying, adware is not typically used for criminal activities.
• A browser parasite is a program that can monitor and change the settings of a user’s
browser, for instance, changing the browser’s home page, or sending information
about the sites visited to a remote computer. Browser parasites are often a component
of
adware.
• Spyware, on the other hand, can be used to obtain information such as a user’s
keystrokes, copies of e-mail and instant messages, and even take screenshots (and
thereby capture passwords or other confidential data)
• Phishing
• Phishing is any deceptive, online attempt by a third party to obtain confidential
information for financial gain. Phishing attacks typically do not involve malicious
code but instead rely on straightforward misrepresentation and fraud, so-called “social
engineering” techniques. One of the most popular phishing attacks is the e-mail scam
letter.
• Thousands of other phishing attacks use other scams, some pretending to be eBay,
PayPal, or Citibank writing to you for account verification (known as spear phishing,
or targeting a known customer of a specific bank or other type of business). Click on a
link in the e-mail and you will be taken to a website controlled by the scammer, and
prompted to enter confidential information about your accounts, such as your account
number and PIN codes.
DATA BREACHES
• A data breach occurs whenever organizations lose control over corporate
information to outsiders.
• Hackers were the leading cause of data breaches, responsible for almost 40% of
breaches, followed by employee error/negligence (15%), accidental e-mail/Internet
exposure (14%) and insider theft (11%).
IDENTITY FRAUD
• Identity fraud involves the unauthorized use of another person’s personal data, such as
social security, driver’s license, and/or credit card numbers, as well as user names and
passwords, for illegal financial benefit.
• Criminals can use such data to obtain loans, purchase merchandise, or obtain other
services, such as mobile phone or other utility services.
• Cybercriminals employ many of the techniques such as spyware, phishing, data
breaches, and credit card theft, for the purpose of identity fraud. Data breaches, in
particular, often lead to identity fraud.
SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES
• Spoofing involves attempting to hide a true identity by using someone else’s e-mail or IP
address. For instance, a spoofed e-mail will have a forged sender e-mail address designed
to mislead the receiver about who sent the e-mail.
• IP spoofing involves the creation of TCP/IP packets that use someone else’s source IP
address, indicating that the packets are coming from a trusted host. Most current routers
and firewalls can offer protection against IP spoofing.
• Spoofing a website sometimes involves pharming, automatically redirecting a web link
to an address different from the intended one, with the site masquerading as the intended
destination.
• Links that are designed to lead to one site can be reset to send users to a totally unrelated
site—one that benefits the hacker.
• Although spoofing and pharming do not directly damage files or network servers, they
threaten the integrity of a site.
• Spam (junk) websites (also sometimes referred to as link farms) are sites that promise to
offer some product or service, but in fact are just a collection of advertisements for other
sites, some of which contain malicious code.
• For instance, you may search for “[name of town] weather,” and then click on a link that
promises your local weather, but then discover that all the site does is display ads for
weather-related products or other websites.
INSIDER ATTACKS
• Some of the largest disruptions to service, destruction to sites, and diversion of customer
credit data and personal information have come from insiders—once trusted employees.
• Employees have access to privileged information, and, in the presence of sloppy internal
security procedures, they are often able to roam throughout an organization’s systems
without leaving a trace.
• In some instances, the insider might not have criminal intent, but inadvertently exposes
data that can then be exploited by others.
POORLY DESIGNED SOFTWARE
• Many security threats prey on poorly designed software, sometimes in the operating
system and sometimes in the application software, including browsers.
• The increase in complexity and size of software programs, coupled with demands for
timely delivery to markets, has contributed to an increase in software flaws or
vulnerabilities that hackers can exploit.
• For instance, SQL injection attacks take advantage of vulnerabilities in poorly coded
web application software that fails to properly validate or filter data entered by a user on a
web page to introduce malicious program code into a company’s systems and networks.
• Browser vulnerabilities in particular are a popular target, as well as browser plug-ins such
as for Adobe Reader. A zero-day vulnerability is one that has been previously unreported
and for which no patch yet exists.
PCI-DSS Compliance
The PCI-DSS (Payment Card Industry-Data Security Standard) is a data security standard
instituted by the five major credit card companies (Visa, MasterCard, American Express,
Discover, and JCB). PCI-DSS is not a law or governmental regulation,but an industry-
mandated standard. Every online merchant must comply with the appropriate level of PCI-
DSS in order to accept credit card payments. Those that fail to comply and are involved in a
credit card breach may ultimately be subjected to fines and other expenses. PCI-DSS has
various levels, related to the number of credit and/or debit cards processed by the merchant
each year. Level 1, the strictest level, applies to very large merchants that process more than
6 million transactions a year, while Level 2 applies to those who process between 1 million
and 6 million. Level 3 applies to organizations that process between 20,000 and 1 million
transactions, while Level 4 applies to smaller merchants that process less than 20,000
transactions. PCI-DSS has six major control objectives. It requires the merchant to (a) build
and maintain a secure network, (b) protect cardholder data, (c) maintain a vulnerability
management program, (d) implement strong access control measures, (e) regularly test and
monitor networks, and (f) maintain an information security policy.