Get Started. It's Free
or sign up with your email address



1.1.1. Credit Card E-commerce Enablers Internet payment service can provide both a merchant account and the software tools. is an Internet payment sevices provider helps a merchant secure an account. CyverSource is another well-known Internet payment service provider.

1.1.2. Limitations of Online Credit Card Payment Systems. most importance :- security, merchant risk, administrative, transaction costs, social equity. merchant designed to collect credit card numbers and the consumer could be a theif using stolen. administrative costs of setting up an online credit card system and becoming authorized to accept credit cards.


1.2.1. online stored value payment system is permit consumers to make instant, online payment to merchant.

1.2.2. PayPal is the most commonly used online credit/debit card alternative.

1.2.3. Amazon Payments is aimed at consumer who have entrusting their credit card information.

1.2.4. Bill Me Later(eBay) appeals to consumers who do not wish to enter their credit card information online.


1.3.1. Near field communication (NFC) is one of the enabling technologies for mobile payment systems.


1.4.1. Digital cash an alternative payment system in which unique, authenticated tokens represent cash value.

1.4.2. Virtual currency typically circulates within an internal virtual world community or is issued by a specific corporate entitty, and used to purchase virtual goods.



2.1.1. 1)PERFOME A RISK ASSESMENT an assesment of the risk and points of vulnerability.

2.1.2. 2)DEVELOP A SECURITY POLICY can develop based on quantities list of risks

2.1.3. 3)DEVELOP AN IMPLEMENTATION steps on you will take to achieve the security plan of risks.

2.1.4. 4)CREATE A SECURITY ORGANIZATION to implementation your plan to educates & train users keeps,management aware of securoty threats

2.1.5. 5)PERFORM A SECURITY AUDIT involves routine review of access logs.


2.2.1. Private and Private-Public Cooperation Efforts example:CERT Coordination Centre

2.2.2. Government Policies and Controls on Encryption Software Various governments have proposed schemes for controlling encryption software or at least preventing criminals from obtaining strong encryption tools



3.1.1. Cash legal tender defined by a national authority to represent value

3.1.2. Checking Transfer funds transferred directly via a signed draft or check from a consumer’s checking account to a merchant or other individual

3.1.3. Credit Card Credit card associations represents an account that extends credit to consumers, permits consumers to purchase items while deferring payment

3.1.4. Stored Value account created by depositing funds into an account and from which funds are paid out or withdrawn as needed debit card

3.1.5. Accumulating Balance account that accumulates expenditures and to which consumers make periodic payments


3.2.1. CONSUMERS low-risk, Low-cost, refutable convenient reliable payment mechanisms

3.2.2. MERCHANTS low-risk low-cost irrefutable secure reliable payment mechanisms

3.2.3. FINANCIAL INTERMEDIARIES secure payment systems that transfer risks and costs to consumers and merchants, while maximizing transaction fees payable to themselves

3.2.4. GOVERNMENT REGULATORS in maintaining trust in the financial system


4.1. system that enable the online delivery and payment of monthly bills. it also allow consumer to view bill electronically and pay them through electronic funds transfers from bank or credit card accounts.

4.1.1. MARKET SIZE AND GROWTH Bitcoin is a form of digital currency, created and held electronically. No one controls it. allow businesses to take and make payments much more easily than through channels like PayPal and credit cards. designed to simulate mining for gold and to slowly increase the supply in the market. consumer are also becoming more receptive to online bill payment, particularly via mobile device.

4.1.2. EBPP BUSINESS MODELS biller direct biller-direct system was originally created by utility companies that send millions of bills routinely online. consolidator consolidator model, third party such as a financial institution or a focused portal.



5.1.1. Integrity The ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party

5.1.2. Nonrepudiation The ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions

5.1.3. Authenticity The ability to identify the identity of a person or entity with whom you are dealing on the Internet

5.1.4. Confidentiality The ability to ensure that messages and data are available only to those who are authorized to view them

5.1.5. Privacy The ability to control the use of information about oneself

5.1.6. Availability The ability to ensure that an e-commerce site continues to function as intended


5.2.1. Ease of Use The more security measures added to an e-commerce site, the more difficult it is to use and the slower the site becomes Digital security is purchased at the price of slowing down processors and adding significantly to data storage demands on storage devices

5.2.2. Public Safety and the Criminal Uses of the Internet Encrypted files sent via e-mail were used by Ramzi Yousef to hide plans for bombing 11 U.S. airliners the Internet was also used to plan and coordinate the subsequent attacks The case of Umar Farouk Abdulmutallab make effective use of the Internet to radicalize, recruit, train, and coordinate youthful terrorists allegedly attempted to blow up an American airliner National Security Administration contractor Edward Snowden release of classified NSA documents that revealed that the NSA had obtained access to the servers NSA analysts have been searching e-mail, online chats, and browsing histories of U.S. citizens without any court approval The U.S. government informal tapping of telegraph wires the first police wiretaps of local telephone systems were in place

5.3. Cyber crime against e-commerce sites is dynamic and changing all the time, with new risks appearing often

5.3.1. The amount of losses to businesses appears to be significant but stable

5.3.2. may represent a declining percentage of overall sales

5.3.3. firms have invested in security measures to protect against the simplest crimes


5.4.1. New technologies are available and should be used These technologies by themselves do not solve the problem Organizational policies and procedures are required to ensure the technologies are not subverted Industry standards and government laws are required to enforce payment mechanisms Investigate and prosecute violators of laws designed to protect the transfer of property in commercial transactions



6.1.1. Encryption the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver purpose of encryption is (a) to secure stored information and (b) to secure information transmission

6.1.2. Symmetric Key Encryption both the sender and the receiver use the same key to encrypt and decrypt the message

6.1.3. Public Key Encryption The mathematical algorithms used to produce the keys are one-way functions. A one-way irreversible mathematical function is one in which, once the algorithm is applied, the input cannot be subsequently derived from the output. based on the idea of irreversible mathematical functions. The keys are sufficiently long (128, 256, and 512 bits) that it would take enormous computing power to derive one key from the other using the largest and fastest computers available two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot be used to unencrypt the message

6.1.4. Public Key Encryption Using Digital Signatures and Hash Digests digital signature (e-signature) “signed” cipher text that can be sent over the Internet hash function an algorithm that produces a fixed-length number called a hash or message digest

6.1.5. Digital Envelopes a technique that uses symmetric encryption for large documents, but public key encryption to encrypt and send the symmetric key

6.1.6. Digital Certificates and Public Key Infrastructure (PKI) a digital document issued by a certification authority that contains the name of the subject or company, the subject’s public key, a digital certificate serial number, an expiration date, an issuance date, the digital signature of the certification authority, and other identifying information certification authority (CA) a trusted third party that issues digital certificates public key infrastructure (PKI) - CAs and digital certificate procedures that are accepted by all parties Pretty Good Privacy (PGP) - a widely used e-mail public key encryption software program

6.1.7. Limitations to Encryption Solutions PKI applies mainly to protecting messages in transit on the Internet and is not effective against insiders—employees—who have legitimate access to corporate systems including customer information. Most e-commerce sites do not store customer information in encrypted form no guarantee the person using your computer—and your private key—is really you there is no guarantee the verifying computer of the merchant is secure


6.2.1. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) secure negotiated session - a client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted session key - a unique symmetric encryption key chosen for a single secure session

6.2.2. Virtual Private Networks (VPNs) allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP) primary use of VPNs is to establish secure communications among business partners—larger suppliers or customers, and employees working remotely Using the Internet and VPN as the connection method significantly reduces the cost of secure communications

6.2.3. Wireless (Wi-Fi) Networks Wi-Fi networks used a security standard called Wired Equivalent Privacy (WEP) to encrypt information WEP was very weak, and easy for hackers to crack Wi-Fi Protected Access (WPA) was developed that provided a higher standard of protection, but this too soon became vulnerable to intrusion the current standard is WPA2 WPA2 - wireless security standard that uses the AES algorithm for encryption and CCMP, a more advanced authentication code protocol


6.3.1. Firewalls refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy controls traffic to and from servers and clients, forbidding communications from untrustworthy sources, and allowing other communications from trusted sources to proceed can filter traffic based on packet attributes such as source IP address, destination port or IP address, type of service (such as WWW or HTTP), the domain name of the source, and many other dimensions increasing use of firewalls by home and business Internet users has greatly reduced the effectiveness of attacks, and forced hackers to focus more on e-mail attachments to distribute worms and viruses

6.3.2. Proxy Servers software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization sometimes called dual-home systems because they have two network interfaces To internal computers, a proxy server is known as the gateway, while to external computers it is known as a mail server or numeric address. . The proxy server validates the user and the nature of the request, and then sends the request onto the Internet improve Web performance by storing frequently requested Web pages locally, reducing upload times, and hiding the internal network’s address

6.3.3. Intrusion Detection and Prevention Systems IDS - examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack IPS - has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities


6.4.1. Operating System Security Enhancements most obvious way to protect servers and clients is to take advantage of automatic computer security upgrades e. The most common known worms and viruses can be prevented by simply keeping your server and client operating systems and applications up to date

6.4.2. Anti-Virus Software The easiest and least-expensive way to prevent threats to system integrity is to install anti-virus software identify and eradicate the most common types of malicious code as they enter a computer, as well as destroy those already lurking on a hard drive Anti-virus suite packages and stand-alone programs are available to eliminate intruders such as bot programs, adware, and other security risks

7. Security Threats in the E-commerce Environment

7.1. Malicious Code

7.1.1. Malicious code (sometimes referred to as “malware”) includes a variety of threats such as viruses, worms, Trojan horses, ransomware, and bots.

7.2. Potentially Unwanted Programs (pups)

7.2.1. the e-commerce security environment is further challenged by potentially unwanted programs (PUPs).

7.3. Hacking, Cybervandalism, Hacktivism, and Data Breaches

7.3.1. A hacker is an individual who intends to gain unauthorized access to a computer system.

7.3.2. hackers have malicious intentions to disrupt, deface, or destroy sites (cybervandalism) or to steal personal or corporate information they can use for financial gain (data breach).

7.3.3. Hacktivism adds a political twist. Hacktivists typically attack governments, organizations, and even individuals for political purpose.

7.3.4. A data breach occurs whenever organizations lose control over corporate information to outsiders.

7.4. Credit Card Fraud/theft

7.4.1. Theft of credit card data is one of the most feared occurrences on the Internet.

7.5. Spoofing, Pharming, and Spam (Junk) Web Sites

7.5.1. Spoofing involves attempting to hide a true identity by using someone else’s e-mail or IP address

7.5.2. Spam (junk) Web sites (also sometimes referred to as link farms) are a little different

7.6. Identity Fraud

7.6.1. Identity fraud involves the unauthorized use of another person’s personal data.

7.7. Denial of Service (DOS) and Distributed Denial of Service (DDOS) AttackS

7.7.1. A Distributed Denial of Service (DDoS) attack uses hundreds or even thousands of computers to attack the target network from numerous launch points.

7.7.2. In a Denial of Service (DoS) attack, hackers flood a Web site with useless pings or page requests that inundate and overwhelm the site’s Web servers

7.8. Sniffing

7.8.1. A sniffer is a type of eavesdropping program that monitors information traveling over a network.

7.9. Poorly Designed Server and Client Software

7.9.1. Many security threats prey on poorly designed server and client software.

7.10. Social Network Security Issues

7.10.1. Social networks like Facebook, Twitter, LinkedIn, Pinterest, and Tumblr.

7.11. Cloud Security Issues

7.11.1. The move of so many Internet services into the cloud also raises security risks.