E-Commerce (A2)
E-Commerce (A2)
E-commerce platforms are attractive targets for cybercriminals due to the sensitive
financial and personal data they handle. These threats can disrupt business
operations, compromise customer trust, and lead to significant financial and
reputational damage.
1. Data Breaches
- Description: Unauthorized access to sensitive information like customer
personal details, payment information, and login credentials.
- Impact: Loss of customer trust, legal liabilities, and financial penalties.
- Example: Hackers stealing credit card details from an online retailer’s
database.
2. Phishing Attacks
- Description: Cybercriminals trick users into sharing sensitive information by
impersonating legitimate e-commerce websites or sending fake emails.
- Impact: Identity theft, financial fraud, and unauthorized access to user
accounts.
- Example: Fake login pages mimicking an e-commerce platform to steal user
credentials.
3. Payment Fraud
- Description: Fraudulent activities involving unauthorized transactions or the
use of stolen payment methods.
- Impact: Financial losses for customers and merchants.
- Example: Use of stolen credit card information for online purchases.
8. Insider Threats
- Description: Employees or partners misusing their access privileges to steal or
manipulate data.
- Impact: Breach of confidentiality and loss of business integrity.
- Example: A disgruntled employee stealing customer information for personal
gain.
9. Bot Attacks
- Description: Automated scripts (bots) used for fraudulent purposes like fake
account creation, inventory hoarding, or price scraping.
- Impact: Skewed analytics, loss of revenue, and damaged customer experience.
- Example: Bots hoarding popular products to resell them at a higher price.
Examples:
- Credit Cards
- Debit Cards
- E-Wallets (e.g., Paytm, Google Pay)
- Net Banking
- Cryptocurrency
How It Works:
1. A user loads digital currency into an e-cash wallet from their bank account.
2. This e-cash can be transferred directly to a merchant or another user without
involving a bank.
3. Transactions are often encrypted for security.
Advantages:-
- Anonymity: Similar to physical cash, it doesn’t leave a transaction trail.
- Ease of Use: Ideal for microtransactions (e.g., purchasing e-books, apps).
Disadvantages:-
- Limited Acceptance: Not widely adopted compared to credit/debit cards.
- Risk of Loss: Lost e-cash cannot be recovered.
Examples:
- DigiCash (early e-cash system)
- Bitcoin (can function as a form of digital cash)
3. Credit Card
Credit card is small plastic card with a unique number attached with an account.
It has also a magnetic strip embedded in it which is used to read credit card via
card readers. When a customer purchases a product via credit card, credit card
issuer bank pays on behalf of the customer and customer has a certain time
period after which he/she can pay the credit card bill. It is usually credit card
monthly payment cycle. Credit cards also include a line of credit that allows the
cardholder to borrow money in the form of a cash advance.
Advantages:-
- Buy Now, Pay Later: Convenient for users without immediate funds.
- Global Acceptance: Widely accepted across e-commerce platforms.
- Fraud Protection: Many credit cards offer liability protection for unauthorized
transactions.
Disadvantages:
- Interest Charges: High interest if balances are not paid on time.
- Risk of Fraud: Card details can be stolen and misused.
Examples:-
- Visa, MasterCard, American Express
4. Debit Card
Debit Card
Debit card, like credit card is a small plastic card with a unique number mapped
with the bank account number. It is required to have a bank account before
getting a debit card from the bank. The major difference between debit card and
credit card is that in case of payment through debit card, amount gets deducted
from card's bank account immediately and there should be sufficient balance in
bank account for the transaction to get completed.
Process:
1. The user enters the card details and authorizes the transaction using a PIN or
OTP.
2. Funds are deducted directly from the linked bank account.
3. The merchant receives the payment instantly or within a short period.
Advantages:-
- No Debt: Users spend only what they have, avoiding credit risks.
- Instant Transactions: Payments are processed in real-time.
- Ease of Use:- Widely accepted and easy to operate.
Disadvantages:-
- No Credit Facility:- Not suitable for users who need to defer payments.
- Limited Fraud Protection:- Funds are immediately deducted, making recovery
difficult in case of fraud.
Examples:-
- Visa Debit, MasterCard Debit, RuPay
1. E-Wallets
- Digital wallets like PayPal, Apple Pay, and Google Pay store user payment
information securely for fast transactions.
2. Net Banking
- Allows users to directly transfer funds from their bank account to the
merchant’s account.
3. Cryptocurrency
- Digital currencies like Bitcoin and Ethereum allow decentralized, secure
transactions.
4. Mobile Payments
- Payments made through mobile devices using apps or SMS services.
Comparison of Credit Card and Debit Card
Conclusion
E-commerce payment systems like e-cash, credit cards, and debit cards are integral
to the digital economy. Each method offers unique advantages and caters to
different user needs. However, ensuring the security of these systems is paramount
to prevent fraud and build user trust.
Cryptography
Cryptography uses codes to protect data and communications so only the intended
receivers can decode and understand them. Consequently, restricting access to
information from outside parties.
"Crypto" indicates "hidden," and "graphy" indicates "writing," respectively. The
techniques used in cryptography to secure data are based on mathematical
principles and a set of rule-based calculations known as algorithms to modify
signals in a way that makes them challenging to decode.
These algorithms generate cryptographic keys, create digital signatures, safeguard
data privacy, enable online browsing on the Internet, and ensure the confidentiality
of private transactions like credit and debit card payments.
Currently used cryptography techniques can potentially be irreversible, ensuring
the message's security forever. The requirement for data to be safeguarded more
securely than ever before has led to the development of more complex
cryptography methods. Most early cryptographic ciphers and algorithms have been
cracked, making them ineffective for data security.
It would sometimes take years or even decades to figure out the meaning of a
single message, even though it is possible to interpret today's algorithms. Thus, the
competition to develop newer and more powerful cryptographic techniques
continues.
Asymmetric Key Cryptography: This approach uses a set of keys to encrypt and
decrypt data. Public keys are used for encryption, whereas private keys are used for
decryption.
The Public Key and Private Key are different from one another. Even if everyone
knows the public key, only the intended recipient may decode the message since
only he can access the private key.
A cipher suite uses three different algorithms: one for encryption, message
authentication, and key exchange. This process, integrated into protocols and
developed using software that runs on operating systems (OS) and networked
computer systems, involves:
o Data encryption and decryption using the production of public and private
keys
o To authenticate messages, use digital signature and verification
o Key exchange
Advantages
Access Management: Access control can use cryptography to guarantee that only
individuals with the appropriate authorizations are granted access to a resource.
The resource is encrypted and can only be accessed by those with the proper
decryption key.
Secure Communication: Cryptography is essential for private communication
over the Internet. It provides safe methods for sending sensitive data like bank
account numbers, passwords, and other private information over the Internet.
Protection against attacks: Attacks like replay and man-in-the-middle attacks can
be defended against with the help of cryptography. It provides techniques for
identifying and preventing these assaults.
Compliance with legal requirements: Businesses can use cryptography to help
them deal with several legal obligations, such as data protection and privacy laws.
Applications of Cryptography
Computer passwords: Cryptography is frequently used in computer security,
especially when creating and managing passwords. When users log in, their
password is hashed and contrasted with the previously saved hash. To store them,
passwords are first hashed and encrypted. This method encrypts the passwords so
that even if hackers can access the password database, they can't comprehend the
passwords.
Digital Signature
The Digital Signature is a technique which is used to validate the authenticity and
integrity of the message. We know that there are four aspects of security: privacy,
authentication, integrity, and non-repudiation.
The basic idea behind the Digital Signature is to sign a document. When we send a
document electronically, we can also sign it. We can sign a document in two ways:
to sign a whole document and to sign a digest.
Signing the Whole Document
o In Digital Signature, a public key encryption technique is used to sign a
document. However, the roles of a public key and private key are different
here. The sender uses a private key to encrypt the message while the receiver
uses the public key of the sender to decrypt the message.
o In Digital Signature, the private key is used for encryption while the public
key is used for decryption.
o Digital Signature cannot be achieved by using secret key encryption.
Digital Signature is used to achieve the following three aspects:
o Integrity: The Digital Signature preserves the integrity of a message
because, if any malicious attack intercepts a message and partially or totally
changes it, then the decrypted message would be impossible.
o Authentication: We can use the following reasoning to show how the
message is authenticated. If an intruder (user X) sends a message pretending
that it is coming from someone else (user A), user X uses her own private
key to encrypt the message. The message is decrypted by using the public
key of user A. Therefore this makes the message unreadable. Encryption
with X's private key and decryption with A's public key results in garbage
value.
o Non-Repudiation: Digital Signature also provides non-repudiation. If the
sender denies sending the message, then her private key corresponding to
her public key is tested on the plaintext. If the decrypted message is the same
as the original message, then we know that the sender has sent the message.
Note: Digital Signature does not provide privacy. If there is a need for privacy,
then another layer of encryption/decryption is applied.
Real life example of Digital Signature.
A real-life example of a digital signature is when you electronically sign a
document using platforms like DocuSign, Adobe Sign, or HelloSign.
Explanation :-
Imagine you need to sign a rental agreement online. Instead of printing it, signing
with a pen, and scanning it back, you use a tool like DocuSign. Here’s how it
works:
1. You open the document on the platform.
2. The platform asks for your confirmation that you want to sign it.
3. Your digital signature is applied, which is not just your name or a picture
of your handwriting. It also includes:
o A unique code (based on cryptographic algorithms) tied to your
identity.
o Information showing the document hasn't been tampered with after
you signed.
This process creates a secure and verifiable "seal" that proves:
You are the signer (authenticity).
The document hasn’t changed after you signed it (integrity).
Real-World Benefits:
Legally binding in many countries.
Faster and more eco-friendly than paper-based processes.
Ensures security through encryption, making it hard to forge or alter.
It’s like an unforgeable digital fingerprint on a document!
Real-Life Example of Symmetric Key Cryptography
Example: Using Wi-Fi Password to access a secure network.
How it works:
1. When you connect to a Wi-Fi network, the router and your device both use
the same password (shared secret key) to encrypt and decrypt the data being
exchanged.
2. This ensures that only devices with the correct password can access the
network and communicate securely.
Key feature: The same key is used for both encryption and decryption, so both
parties must keep it secret.
Pros:
Fast and efficient for large amounts of data.
Cons:
If someone else gets the key, they can decrypt the data too.
Simple Analogy:
Symmetric Key: Imagine a locked treasure chest that both you and your
friend can open because you both have the same key. If someone steals the
key, they can open the chest too.
Asymmetric Key: Imagine a mailbox with two keys: a public key that
anyone can use to put a letter in (encrypt), but only you (the private key
holder) can unlock and read the mail (decrypt).
Both are often used together for efficiency and security in modern systems (e.g.,
SSL/TLS uses asymmetric cryptography to share a symmetric session key
securely).
Difference Between Session and Cookies (Simplified)
Remembering a user’s
Example Keeping a user logged in during a
preferences or login details for
Use shopping session.
future visits.
Explanation
Sessions
Imagine you go to a restaurant, and the waiter gives you a token to identify
your table. While you’re there, the restaurant keeps track of your orders
based on that token. When you leave, they clear the token and your orders.
In tech terms:
o The token = session ID, temporarily stored in your browser.
o The orders = data stored on the server linked to your session.
Cookies
Imagine you visit a coffee shop, and they give you a loyalty card to track
your purchases. You take the card with you, so it’s available next time you
visit.
In tech terms:
o The loyalty card = cookie, stored in your browser.
o It tells the website about your preferences or history when you return.
Key Difference
Session: Temporary, stored on the server, better for secure and short-term
interactions (like logging in).
Cookies: Persistent, stored in the browser, useful for remembering
preferences over time (like a "remember me" checkbox).
What is SSL?
SSL (Secure Sockets Layer) is a technology that encrypts data sent between your
computer (or device) and a server, such as a website, to keep it secure and private.
Why is SSL Important?
When you visit a website (e.g., your bank or an online store) and enter sensitive
information like your password or credit card number, SSL ensures that:
1. Your data is encrypted: Hackers can't read it, even if they intercept it.
2. You are talking to the right website: SSL verifies the website's identity to
prevent fake websites from tricking you (phishing).
Example in Action
Online Banking:
You log into your bank’s website (e.g., https://yourbank.com).
SSL ensures:
1. Your username and password are encrypted as you enter them.
2. No one can intercept or tamper with your transactions.
3. You are connecting to the real bank website and not a fake one.
This makes SSL essential for secure online communication!
Risk Management
Risk management is the continuing process to identify, analyze, evaluate, and treat
loss exposures and monitor risk control and financial resources to mitigate the
adverse effects of loss.
Risk management Process
Risk Management
Risk management is the continuing process to identify, analyze, evaluate, and treat
loss exposures and monitor risk control and financial resources to mitigate the
adverse effects of loss.
Risk Assessment
Risk assessment includes processes and technologies that identify, evaluate, and
report on risk-related concerns. the risk assessment process is a “key component” of
the risk management process. it is primarily concerned with the Identification and
Analysis phases.
Risk Analysis
Risk analysis can be considered the evaluation component of the broader risk
assessment process, which determines the significance of the identified risk
concerns.
Layering
Layering separates hardware and software functionality into modular tiers.
A generic list of security architecture layers is as follows:
1. Hardware (bottom layer)
lOMoARcPSD|422 215 92
Abstraction:
Abstraction hides unnecessary details from the user.
Complexity is the enemy of security:
– The more complex a process is, the less secure it is. That said, computers
are tremendously complex machines.
Abstraction provides a way to manage that complexity.
-For example, while music is being played from a file through the speaker of
the computer system. The user is only concerned with playing of music just
with click without knowing the internal working of music player.
The Ring Model: The ring model is a form of CPU hardware layering that
separates and protects domains (such as kernel mode and user mode) from each
other.
(2) Physical access exposure to natural disasters:- Natural disasters may destroy your
computer systems or all data storage systems and might interrupt your network.
– for example fire, lightening, or electronic interruption
– Can’t be controlled, but recovery measures could be taken.
Access Control
Access Control is the process or mechanism for giving the authority to access the
specific resources, applications and system.
Access control defines a set of conditions or criteria to access the system and its
resources.
There are three main accesses Control model first is Mandatory access control
model, second is Discretionary access control model and third is Role based
access control models.
4. Video Recorders- There are two types of video recorders: DVR (Digital Video
Recorders) and NVR (Network Video Recorders).
5. Data Storage
6. Hard disk for recording
7. Lenses
8. Power supply and power cables.
lOMoARcPSD|422 215 92
CCTV Applications
Industrial Application: In heavy machinery operated process where the method
has to be monitored at every stage and is directed accordingly along with the men
power observation, CCTV can be used for the monitoring purpose.
City Surveillance: Under the smart city projects or as a crime prevention
methodology, CCTV cameras can be implemented across the city. In case of
criminal or suspicious activities, it helps better to catch & identify the culprits
and are admissible to courts as a legit proof.
Traffic Management: In the fast rushing metro cities, saying that the traffic
management systems should be implemented is an understatement. Traffic
Management has become a necessity to manage, monitor and prediction of traffic
across the city. Not only that, it helps identify the people responsible for over-
lOMoARcPSD|422 215 92
speeding, breaking the traffic rules and helps managing the city better with
reduced risks of accidents.
Retail Sector: With mass development and wide spread retail sector, they can
be helpful to put off and monitor shop lifting.
Residential: With the expansion & awarenessin home automation & security
industry, CCTV cameras can be helpful with the incorporation with Fire Alarms,
home invasion alerts, and unethical access notifications.
Private Sector: Private sector does not hold back when it comes to installing the
cameras in the work environment mainly to avert unethical practices.
CCTV In Reception Areas
As receptionists are open to anything from abuse to armed attack, CCTV cameras
can be installed to give a clear view of everyone standing at the reception desk and
counter. This not only gives a visual record of people as they arrive but also acts as
a deterrent to criminal or abusive behavior.
Car Parks, Garages, Depots, Construction Sites
CCTV cameras mounted at the entrance and exit to the area where vehicles are
coming and going is a good security system to have in place as all vehicles can be
monitored and record all vehicles via their license plates, twenty-four hours a day
Vehicle Monitoring
A camera mounted at the entrance to the area will enable you to monitor and record
all vehicle, with their number plates.
CCTV Advantages
CCTV Disadvantages
Privacy issues -Some people may object to being filmed 24/7 and
it may damage the trust you have between family members or
employees as they feelthat you don’t trust them at all.
Initial Cost -The initial cost incurred per camera are high. The
installation may also increase the initial expenditure.Cameras,
monitors, recording devices, and other equipment cost start to add
up.
As valuable as backups are, they also pose a risk if not properly secured. Unsecured
backups can be accessed by hackers or malicious insiders, who may delete or alter
the data in them. This can lead to data loss or corruption, which can be devastating
for businesses that rely on their data to function.
Unsecured backups can also be vulnerable to physical threats, such as fires, floods,
or theft. If the backup storage devices are not properly protected, they can be
damaged or stolen, resulting in the loss of all the data that they contain.
Types of Backup
There are several different types of backups that you can use to protect your data −
Full backups − A full backup is a complete copy of all the files and data that
you want to protect. These backups capture everything, including all files,
folders, and system files. Full backups can be time-consuming to create and
lOMoARcPSD|422 215 92
take up a lot of storage space, but they offer the highest level of protection, as
they contain all your data.
Incremental backups − An incremental backup captures only the data that
has changed since the last backup. This means that only new or modified files
are included in the backup. Incremental backups are faster and use less
storage space than full backups, but they offer less protection, as they don't
contain all your data.
Differential backups − A differential backup captures all the data that has
changed since the last full backup. Like incremental backups, differential
backups only include new or modified files. However, they offer more
protection than incremental backups, as they contain all the changes made
since the last full backup.
Network backups − Network backups, also known as remote or cloud
backups, involve storing your backups on a remote server or in the cloud.
This allows you to access your backups from anywhere with an internet
connection. Network backups can offer a high level of security, as they are
stored offsite and often use multiple layers of security. However, they can be
slower to restore, as they require an internet connection to access.
It's important to choose the right type of backup for your needs, based on the
amount of data you have, the level of protection you need, and your budget and
resources. Full backups offer the highest level of protection, but they can be slow
and expensive. Incremental and differential backups are faster and use less storage
space, but they offer less protection. Network backups offer convenient access, but
they can be slower to restore.
To protect your backups from these threats, there are several best practices that you
should follow −
Here are a few specific examples of backup security measures that you can
implement
Offsite backups − One of the most effective ways to protect your backups
from physical threats is to store them offsite. This might include storing them
in a secure, remote location, such as a data center or cloud storage provider.
This way, if your primary location is damaged or destroyed, your backups
will still be safe and available.
Air-gapped backups − Another option is to use air-gapped backups, which
are physically disconnected from your network and the internet. This makes it
much more difficult for hackers to access or tamper with your backups, as
they would need to physically access the storage devices in order to do so.
Backup rotation − Instead of relying on a single set of backups, you can
implement a backup rotation schedule. This involves creating multiple sets of
backups and storing them in different locations. For example, you might
create one set of backups to store onsite, another to store offsite, and a third to
store in the cloud. By rotating between these sets, you can ensure that you
always have a recent backup available in case of a disaster.
Cloud storage − Cloud-based storage solutions can offer a high level of
security for your backups. Many cloud providers use multiple layers of
lOMoARcPSD|422 215 92