e com module 4
e com module 4
E- SECURITY
Trojan horses: In computing, a Trojan horse is any malware which misleads users
of its true intent.
● The term is derived from the Ancient Greek story of the deceptive Trojan Horse
that led to the fall of the city of Troy.
● Trojans can be employed by cyber-thieves and hackers trying to gain access to
users' systems.
● Users are typically tricked by some form of social engineering into loading and
executing Trojans on their systems.
Internet hoax: Internet hoaxes are stories that spread throughout theinternet, often
through email, forums, and blogs or showing images that are untrue or alteration of
the truth.
● It is usually an email urgingto pass this information to as many people to make
aware of this information.
● The only purpose of hoax is to waste time.
Spyware: Spyware is unwanted software that gain our computing device, stealing
internet usage data and sensitive information.
●Spyware is classified as a type of malware — malicious software designed to gain
access to or damage your computer, often without your knowledge. Spyware aims to
gather information about a person or organization and send such information to
another entity in a way that harms the user; for example by violating their privacy or
endangering their device's security.
Vulnerability
A weakness in security procedures, network design, or implementation that
can be exploited to violate a corporate security policy is called vulnerability.
● Internet attacks can be launched from anywhere in the world and the location of the
attacker can easily be hidden.
● New web based attack types are coming out every day; this is causing businesses,
communities and individuals to take security seriously now.
Types of vulnerability:
Cyber industrial espionage: Cyber espionage is a form of cyber attack that steals
classified, sensitive data or intellectual property to gain an advantage over a
competitive company or government entity. Espionage is “the practice of spying or
using spies to obtain information about the plans and activities especially of a foreign
government or a competing company.”
Credit card fraud and theft of customer data: Credit card fraud is an inclusive
term for fraud committed using a payment card, such as a credit card or debit card.
● The purpose may be to obtain goods or services, or to make payment to another
account which is controlled by a criminal.
● The most common types of fraud causing concern among merchants are identity
theft.
Username and password: Password protection allows only those with a authorized
password to gain access to certain information.
Virus scanning software: It helps to scan and identify any malicious content and
removes it from the system.
Transaction security and data protection
Encryption: It is the process of transforming plain text or data into cipher text
that can not be read by anyone other than the sender and the receiver.
Secure socket layer (SSL): The SSL protocol provides data encryption, server
authentication, optional client authentication,and message integrity for TCP/IP
connections.
Secure electronic transaction (SET): It will enable payment security for all
involved, authenticate card holders and merchants,provide confidentiality for payment
data and define protocols.
Managing and controlling network traffic: This is the first and most basic function.
It should be able to identify which data packets are coming through, which connection
is established and also be able to control those traffic in the system.
Authentication access: The usage of packet filtering helps to restrict resource access
from unexpected sources. Acting as a intermediary: Instead of allowing computers
connect directly to the internet, a firewall is modified into an intermediary device to
the internet. The simplest mechanism for verification is asking users for a username
and password whenever they want to access the system.
Recording and reporting of events: Records all information about policy violated
activities and reports it to administrator.
Preventing access to information: It also used to limit the activities of their users
on the internet. Enforcing policy: Firewall enforce the rules about which network
traffic is allowed to enter or leave a network.
Auditing: If a security breach occurs, audit trails can be used to help determine
what had happened.
E-business risk management issues
1. Cybersecurity Risks
2. Privacy Risks
3. Financial Risks
5. Reputation Risks
● Disruptions in the supply chain or logistical issues that impact the ability
to deliver products or services.
● Management: Develop contingency plans, diversify suppliers, and use
technology to track inventory and shipments.
7. Technology Risks
● Insider threats, lack of skilled staff, or high turnover rates that affect
e-business operations.
● Management: Focus on employee training, implement strict internal
controls, and build a strong organizational culture.
Information security environment in india
India's information security environment is evolving, with increasing emphasis on
protecting data and digital infrastructure due to the rapid expansion of the internet and
digital economy. Below are key elements that shape India's information security
landscape:
1. Cybersecurity Challenges
2. Government Initiatives
3. Legal Framework
● Information Technology Act, 2000 (IT Act): Provides a legal framework for
electronic transactions, cybersecurity, and digital signatures, with provisions for
cybercrimes and data protection.
● Personal Data Protection Bill (PDPB): Currently under discussion, this bill
aims to regulate the processing of personal data, giving individuals control over
their data and enforcing penalties for non-compliance.
● Other Regulations: India is also aligning its cybersecurity laws with global
standards like GDPR to improve data protection and privacy.
7. International Cooperation
Ethical Issues:
1. Web spoofing: It occurs when the attacker sets up a fake website which is
almost same as the original website in order to attract consumers to give their
credit card number or other personal information. Normally, the spoof website
will adopt the design of the target website, and it sometimes has a similar URL.
3. Web tracking: Web tracking is the practice by which operators of websites
collect, store and share information about visitors’ activities on the World Wide
Web.
4. Identity theft: Identity theft occurs when someone uses another person's
personal identifying information, like their name, identifying number, or credit
card number, without their permission, to commit fraud or other crimes.
Legal Issue:
3. Skimming: Skimming is the unauthorized capture and transfer of payment data
to another source. For example, information that is electronically stored on the
magnetic stripe of a credit card or debit card is illegally copied during an
attempt to use an automatic teller machine (ATM).
4. Copyright: Copyright is a type of intellectual property that gives its owner the
exclusive right to make copies of a creative work, usually for a limited time.
Unfortunately, it is easy for the computer to create an exact copy of
valuable software in seconds. Software piracy is widespread. It refers to
the unauthorized duplication of computer software.
Internet Gambling
It refers to the act of placing bets or playing games of chance for money through
online platforms. It includes activities such as online casinos, sports betting, poker,
bingo, and esports betting. The industry has grown significantly, driven by the rise of
internet accessibility and digital payment methods.
Legal and Regulatory Issues: The legality of internet gambling varies by country and
region. Some countries, like the UK, have robust regulations, while others, like India,
have unclear or restrictive laws. Regulations typically aim to ensure fair play,
protect consumers, and prevent fraud and money laundering.
Risks:
1. Cyberbullying
● Cyberbullying involves the use of digital platforms (social media, gaming sites,
text messages) to harass, threaten, or belittle a child.
● Impact: Emotional distress, depression, anxiety, and sometimes physical harm.
Victims may experience a sense of isolation and diminished self-esteem.
● Prevention: Encourage open communication, monitor online activity, and
educate children on how to block or report cyberbullying incidents.
2. Online Predators
● Online predators are individuals who use the internet to exploit children for
sexual purposes or grooming. They may attempt to build relationships with
children through social media, chat rooms, or gaming platforms.
● Impact: Sexual exploitation, emotional manipulation, and physical harm.
● Prevention: Monitor online interactions, set privacy settings on social media,
and educate children about not sharing personal information online with
strangers.