置印验固盒画增铺息还金副恩配 Chapter 5 E-commerce Security and Payment Systems Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 5 E-commerce Security and Payment Systems Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Class discussion Cyberwar: MAD 2.0 What is the difference between hacking and cyberwar? Why has cyberwar become more potentially devastating in the past decade? Why has google been the target of so many cyberattacks? a Is it possible to find a political solution to MAD 2.0? Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide5-3
Class Discussion Cyberwar: MAD 2.0 ◼ What is the difference between hacking and cyberwar? ◼ Why has cyberwar become more potentially devastating in the past decade? ◼ Why has Google been the target of so many cyberattacks? ◼ Is it possible to find a political solution to MAD 2.0? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-3
The E-commerce Security Environment Data Technology Solutions Organizational policies and Procedures Laws and Industr Standards Figure 5.1, page 252 Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
The E-commerce Security Environment Figure 5.1, Page 252 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
Dimensions of e-commerce security a Integrity ensures that info sent and received has not been altered by unauthorized party a Nonrepudiation ability to ensure that participants do not deny (repudiate their online actions a authenticity ability to identify the person' s identity with whom you are dealing with over the internet a Confidentiality authorized to be seen by those who should view it a Privacy ability to control who sees your info Availability e-commerce site functions as intended Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
Dimensions of E-commerce Security ◼ Integrity ensures that info sent and received has not been altered by unauthorized party ◼ Nonrepudiation ability to ensure that participants do not deny (repudiate) their online actions ◼ Authenticity ability to identify the person’s identity with whom you are dealing with over the internet ◼ Confidentiality authorized to be seen by those who should view it ◼ Privacy ability to control who sees your info ◼ Availability e-commerce site functions as intended Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
TABLE 5.3 CUSTOMER AND MERCHANT PERSPECTIVES ON THE DIFFERENT DIMENSIONS OF E-COMMERCE SECURITY CUSTOMER' S MERCHANT S DIMENSION PERSPECTIVE PERSPECTIVE Integrity Has intormation I transmitted or Has data on the site been altered received been altered? without authorization? Is data being received from customers valid Nonrepudiation Can a party to an action with me Can a customer deny ordering later deny taking the action? products? Authenticity Who am I dealing with? How can I be What is the real identity of the assured that the person or entity is customer? who they claim to be? Confidentiality Can someone other than the Are messages or confidential data intended recipient read accessible to anyone other than messages those authorized to view them? Privacy Can I control the use of intormation What use, if any, can be made of about myself transmitted to an personal data collected as part of an e-commerce merchant? e-commerce transaction? Is the personal information of customers being used in an unauthorized manner? Availability Can i get access to the site? Is the site operational? Table 5.3, Page 254 Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6
Table 5.3, Page 254 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6