SlideShare a Scribd company logo
1 of 15
E-Commerce




                  Security Issues
       Threats and Challenges on the Internet

             Presented By Humayun Khalid
Threats and Challenges
• There are many ways of attacking a website,
  online software applications, and any online
  system that is connected to internet.
• Four basic ways of threats
  – Loss of data integrity
  – Loss of data privacy
  – Loss of service
  – Loss of control

                     Presented By Humayun Khalid
Loss of data integrity
• Information is created, modified, or deleted
     • Example {HTML page coding changes}
     • Write the coding of html page



               Loss of data privacy

• Information is made available to unauthorized
  persons.
   • Hacking


                     Presented By Humayun Khalid
Hacking
• Hacking is unauthorized
  use of computer and
  network resources. (The
  term "hacker" originally
  meant a very gifted
  programmer (claver
  programmer). In recent
  years though, with easier
  access to multiple                             White Hat Hackers
  systems, it now has
  negative implications.)
                   Presented By Humayun Khalid
Hacking continue
• Sometime hacker gain full
  access of computer
  system and sometime
  don’t get full access but
  use DoS.
• Dos is denial-of-service
  attack (DoS attack) or
  distributed denial-of-
  service attack (DDoS
  attack) is an attempt to
  make a computer or
  network resource
  unavailable to its
  intended users.
                     Presented By Humayun Khalid
DoS attack continue

• In DoS the hackers attacks the website and
  server components and damage the coding
  and access programming of the system due to
  this the program refuses to give access to
  authorized access.
• It creates financial loss and also system,
  softwares and databases loss for the
  organization

                 Presented By Humayun Khalid
Ways of attacking
• One way is to monitor the communication
  b/w two persons. It is unsecure because the
  communication is done through text format,
  when one enter communication, the hacker
  change the text and creates conflicts b/w
  parties




                  Presented By Humayun Khalid
Phishing
• Phishing is a way of attempting to
  acquire information such as
  usernames, passwords, and credit
  card details by masquerading as a
  trustworthy entity in an electronic
  communication.

             Define phishing procedure

    Hackers can change, delete and modified the
    information and the web server, owner and
    even the person or customer don’t know that
    which information is being changed.




                              Presented By Humayun Khalid
Software theft
• A biggest problem that the hackers can damage the softwares
  coding contains on the data of customers, personal
  information and user name, login details, passwords etc.

                         Sniffing
 • Sniffing is a possibility to intercept the traffic on a network.
 • Text log remain active on internet
 • Hackers damage the output device e.g. monitor that show the
   results by using remote assistance that is done by using these
   text logs files



                         Presented By Humayun Khalid
Trojan Horse
• A Trojan horse, or Trojan, is software that appears to perform
  a desirable function for the user prior to run or install, but
  (perhaps in addition to the expected function) steals
  information or harms the system. The term is derived from
  the Trojan Horse story in Greek mythology.
• Trojan horse transfer the information from one system to
  another system, by this the hacker can use system remotely
  without any problem.




                        Presented By Humayun Khalid
Spoofing Attack
• In the context of network security,
  a spoofing attack is a situation in which
  one person or program successfully
  masquerades as another by falsifying
  data and thereby gaining an illegitimate
  advantage.
• The hacker can take the control of the
  network through hacking of one
  system.
   – Network configuration is badly
      affected by hacking.
   – IP address spoofing (control of IP
      addresses)
        • IP1,IP2, IP3, IP4
        • Hackers attacks on the 1 IP and by using
          administrative controls all IP’s By Humayun Khalid
                                   Presented
IP Spoofing
• Hacker destroy the information and
  also present false information to
  customers that create conflicts,
  problems for customers.
• Used by competitors to destroy the
  image and goodwill of the online
  business.
• So, keep you websites secure by
  purchasing the online security
  services such as VERISIGN, NORTON
  SYMANTEC,WATCHBOX, @SEC

                       Presented By Humayun Khalid
Floppy                                                    Bribe the
        hacking                                                 Programmers
• An old and know way                                           by offering the amount to get
• Hacker is easily locate                                       required information



      Fake Website Pages
Hacker create a new page of the index page of
the website and the link it up with a wrong
webpage address, that create the problem for
customers. Customer don’t get their orders and
in case the firm’s sales decreases day by day,
when it comes in the knowledge of owner , he
surely loose its many potential customers. It is
called DNS hacking

                                  Presented By Humayun Khalid
DNS hacking
• Domain Name System (DNS) is a hierarchical
  distributed naming system for computers,
  services, or any resource connected to
  the Internet or a private network.

• So just security provided systems should to be
  visible on the internet. (firewall)


                  Presented By Humayun Khalid
Presented By Humayun Khalid

More Related Content

What's hot

Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerceVipin Subhash
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6annwhyjay
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605SovanChanda
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerceStudsPlanet.com
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A PrimerJohn ILIADIS
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securityelmira282
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce securityNuth Otanasap
 

What's hot (20)

Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
E commerce
E commerceE commerce
E commerce
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
E - comerce
E - comerceE - comerce
E - comerce
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
 

Viewers also liked

Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGData-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGAnkit Mehta
 
Desarrollo de Marca Personal para el Alto Director de Servicios Educativos
Desarrollo de Marca Personal para el Alto Director de Servicios EducativosDesarrollo de Marca Personal para el Alto Director de Servicios Educativos
Desarrollo de Marca Personal para el Alto Director de Servicios EducativosLorena M. Olaya A.
 
E se non fosse colpa di Panda? GTConference Torino 2011
E se non fosse colpa di Panda?   GTConference Torino 2011E se non fosse colpa di Panda?   GTConference Torino 2011
E se non fosse colpa di Panda? GTConference Torino 2011Roberto Pala
 
Edu Dz Algerian Students
Edu Dz Algerian StudentsEdu Dz Algerian Students
Edu Dz Algerian Studentscampusmilenio
 
Sisällöntuottajana Alma Mediassa
Sisällöntuottajana Alma MediassaSisällöntuottajana Alma Mediassa
Sisällöntuottajana Alma MediassaAnn-Christine Wahl
 
визитка.вики
визитка.викивизитка.вики
визитка.викиint4
 
How to Change the World and Make it a Better Place.Social entrepreneurship
How to Change the World and Make it a Better Place.Social entrepreneurshipHow to Change the World and Make it a Better Place.Social entrepreneurship
How to Change the World and Make it a Better Place.Social entrepreneurshipcampusmilenio
 
Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit - wolfSSL
 
Overview of Evolution of the industrial relations system in Pakistan
Overview of Evolution of the industrial relations system in PakistanOverview of Evolution of the industrial relations system in Pakistan
Overview of Evolution of the industrial relations system in PakistanHumayun Khalid Qureshi
 
Lecture 15&16
Lecture 15&16Lecture 15&16
Lecture 15&16narachka
 
Repormasyon at kontra repormasyon.
Repormasyon at kontra repormasyon. Repormasyon at kontra repormasyon.
Repormasyon at kontra repormasyon. Thelai Andres
 

Viewers also liked (20)

Data-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPGData-in-Motion, Data-At-Rest and GPG
Data-in-Motion, Data-At-Rest and GPG
 
Elsevier
ElsevierElsevier
Elsevier
 
Desarrollo de Marca Personal para el Alto Director de Servicios Educativos
Desarrollo de Marca Personal para el Alto Director de Servicios EducativosDesarrollo de Marca Personal para el Alto Director de Servicios Educativos
Desarrollo de Marca Personal para el Alto Director de Servicios Educativos
 
E se non fosse colpa di Panda? GTConference Torino 2011
E se non fosse colpa di Panda?   GTConference Torino 2011E se non fosse colpa di Panda?   GTConference Torino 2011
E se non fosse colpa di Panda? GTConference Torino 2011
 
Philosophy for old_age
Philosophy for old_agePhilosophy for old_age
Philosophy for old_age
 
Edu Dz Algerian Students
Edu Dz Algerian StudentsEdu Dz Algerian Students
Edu Dz Algerian Students
 
Sisällöntuottajana Alma Mediassa
Sisällöntuottajana Alma MediassaSisällöntuottajana Alma Mediassa
Sisällöntuottajana Alma Mediassa
 
визитка.вики
визитка.викивизитка.вики
визитка.вики
 
Internet del futuro
Internet del futuroInternet del futuro
Internet del futuro
 
Appeals
AppealsAppeals
Appeals
 
How to Change the World and Make it a Better Place.Social entrepreneurship
How to Change the World and Make it a Better Place.Social entrepreneurshipHow to Change the World and Make it a Better Place.Social entrepreneurship
How to Change the World and Make it a Better Place.Social entrepreneurship
 
Parent watch
Parent watchParent watch
Parent watch
 
Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit -
 
Organizational behaviour
Organizational behaviourOrganizational behaviour
Organizational behaviour
 
Overview of Evolution of the industrial relations system in Pakistan
Overview of Evolution of the industrial relations system in PakistanOverview of Evolution of the industrial relations system in Pakistan
Overview of Evolution of the industrial relations system in Pakistan
 
Lecture 15&16
Lecture 15&16Lecture 15&16
Lecture 15&16
 
Repormasyon at kontra repormasyon.
Repormasyon at kontra repormasyon. Repormasyon at kontra repormasyon.
Repormasyon at kontra repormasyon.
 
Faculty cafeteria presentation
Faculty cafeteria presentationFaculty cafeteria presentation
Faculty cafeteria presentation
 
Presentation
PresentationPresentation
Presentation
 
OGDCL Presentation
OGDCL PresentationOGDCL Presentation
OGDCL Presentation
 

Similar to E commerce

Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.pptShivaniSingha1
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attacktaufiq463421
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 

Similar to E commerce (20)

All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Hacking
HackingHacking
Hacking
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
building foundation for ethical hacking.ppt
building foundation for ethical hacking.pptbuilding foundation for ethical hacking.ppt
building foundation for ethical hacking.ppt
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 

E commerce

  • 1. E-Commerce Security Issues Threats and Challenges on the Internet Presented By Humayun Khalid
  • 2. Threats and Challenges • There are many ways of attacking a website, online software applications, and any online system that is connected to internet. • Four basic ways of threats – Loss of data integrity – Loss of data privacy – Loss of service – Loss of control Presented By Humayun Khalid
  • 3. Loss of data integrity • Information is created, modified, or deleted • Example {HTML page coding changes} • Write the coding of html page Loss of data privacy • Information is made available to unauthorized persons. • Hacking Presented By Humayun Khalid
  • 4. Hacking • Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer (claver programmer). In recent years though, with easier access to multiple White Hat Hackers systems, it now has negative implications.) Presented By Humayun Khalid
  • 5. Hacking continue • Sometime hacker gain full access of computer system and sometime don’t get full access but use DoS. • Dos is denial-of-service attack (DoS attack) or distributed denial-of- service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Presented By Humayun Khalid
  • 6. DoS attack continue • In DoS the hackers attacks the website and server components and damage the coding and access programming of the system due to this the program refuses to give access to authorized access. • It creates financial loss and also system, softwares and databases loss for the organization Presented By Humayun Khalid
  • 7. Ways of attacking • One way is to monitor the communication b/w two persons. It is unsecure because the communication is done through text format, when one enter communication, the hacker change the text and creates conflicts b/w parties Presented By Humayun Khalid
  • 8. Phishing • Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Define phishing procedure Hackers can change, delete and modified the information and the web server, owner and even the person or customer don’t know that which information is being changed. Presented By Humayun Khalid
  • 9. Software theft • A biggest problem that the hackers can damage the softwares coding contains on the data of customers, personal information and user name, login details, passwords etc. Sniffing • Sniffing is a possibility to intercept the traffic on a network. • Text log remain active on internet • Hackers damage the output device e.g. monitor that show the results by using remote assistance that is done by using these text logs files Presented By Humayun Khalid
  • 10. Trojan Horse • A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology. • Trojan horse transfer the information from one system to another system, by this the hacker can use system remotely without any problem. Presented By Humayun Khalid
  • 11. Spoofing Attack • In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. • The hacker can take the control of the network through hacking of one system. – Network configuration is badly affected by hacking. – IP address spoofing (control of IP addresses) • IP1,IP2, IP3, IP4 • Hackers attacks on the 1 IP and by using administrative controls all IP’s By Humayun Khalid Presented
  • 12. IP Spoofing • Hacker destroy the information and also present false information to customers that create conflicts, problems for customers. • Used by competitors to destroy the image and goodwill of the online business. • So, keep you websites secure by purchasing the online security services such as VERISIGN, NORTON SYMANTEC,WATCHBOX, @SEC Presented By Humayun Khalid
  • 13. Floppy Bribe the hacking Programmers • An old and know way by offering the amount to get • Hacker is easily locate required information Fake Website Pages Hacker create a new page of the index page of the website and the link it up with a wrong webpage address, that create the problem for customers. Customer don’t get their orders and in case the firm’s sales decreases day by day, when it comes in the knowledge of owner , he surely loose its many potential customers. It is called DNS hacking Presented By Humayun Khalid
  • 14. DNS hacking • Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. • So just security provided systems should to be visible on the internet. (firewall) Presented By Humayun Khalid