Different types of threat in e-commerce.
Security Threats in the E-commerce Environment
Vulnerabilities In E-commerce
Vulnerability is a weakness that allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, an attacker's capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness
From a technology perspective, three key points of vulnerability in the e-commerce environment when dealing with e-commerce:
- Client,
- Server and
- Internet communications channels
OR,
Four key points of vulnerability threat:
Most common threats:
- Malicious code
- Adware
- Spyware
- Social Engineering
- Phishing
- Hacking
- Credit card fraud and Identify theft
- Spoofing and Pharming
- Viruses: computer programs that as the ability to replicate and spread to other files; most also deliver a “payload” of some sort (maybe destructive or benign); include macro viruses, file-infecting viruses, and script viruses
- Worms: designed to spread from computer to computer
- Trojan horse: appears to be benign, but then does something other than expected
- Bad applets (malicious mobile code): malicious Java applets or ActiveX controls that may be downloaded onto the client and activated merely by surfing to a Website
- these code threats typically involve viruses, worms, Trojan horses.
- viruses are normally external threats and can corrupt the files on the website if they find their way into the internal network. They can be very dangerous as they destroy the computer systems completely and can damage the normal working of the computer. A virus always needs a host as it cannot spread by itself.
- worms are very much different and are more serious than viruses. It places itself directly through the internet. It can infect millions of computers in a matter of just a few hours.
- A Trojan horse is a programming code that can perform destructive functions. They normally attack your computer when you download something. So always check the source of the downloaded file
- the term is used to describe any code in any part of a software system that is intended to cause undesired effects, security breaches, or damage to a system.
- Drive-by downloads: Malware that comes with a downloaded file that a user requests.
- Viruses: A computer virus is a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
- Worms: A computer worm is a standalone malware program that replicates itself to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it
- Trojan Horse: Appears to be harmless, but then does something other than expected. It is not itself a virus because it does not replicate, but is often a way for viruses.
- Bots (short for Robots): A type of malicious code that can be covertly installed on computers when attached to the Internet. When installed, the bot responds to external commands sent by the attacker; the computer can be controlled by a third party.
Adware:Typically used to call for pop-up ads to display when the user visits certain sites; while annoying, adware is not typically used for criminal activities
OR
Adware: Adware is not exactly malicious but they do breach privacy of the users. They display ads on computer’s desktop or inside individual programs. They come attached with free to use software, thus main source of revenue for such developers. They monitor your interests and display relevant ads. An attacker can embed malicious code inside the software and adware can monitor your system activities and can even compromise your machine.
Browser Parasite: Program that can monitor and change the settings of a user’s browser, for example, changing browser’s homepage or sending information about the sites visited to a remote computer
Spyware: Program used to obtain information such as a user’s keystrokes, , instant messages, screenshots and so on.
OR,
Spyware:
- It is a program or we can say software that monitors your activities on a computer and reveal collected information to the interested party. Spyware is generally dropped by Trojans, viruses, or worms. Once dropped they install themselves and sits silently to avoid detection.
- One of the most common examples of spyware is KEYLOGGER. The basic job of a keylogger is to record user keystrokes with timestamps. Thus capturing interesting information like username, passwords, credit card details, etc.
PHISHING:
- Phishing is the act of sending an to a user falsely claiming to be a legitimate enterprise in an attempt to cheat the user into surrendering private information that will be used for identity theft
- Phishing is a common method of tricking
- Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication
IDENTITY THEFT: IDENTITY THEFT is the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.
Social Engineering:
- Relies on human curiosity as well as greed to trick people into taking an action that will result in the downloading of malware.
- Phishing attacks do not involve malicious code but instead rely on straightforward misrepresentation and fraud, so-called social engineering techniques.
- Most popular is the scam (fraudulent in computing) letter.
- Some pretending to be eBay, PayPal, or others writing to you for “account verification”
- Click on a link the will take you to a website controlled by the scammer and where you enter your confidential details such as account number and PIN codes, etc.
Social Engineering:
- It is the art of manipulating people so that they give up their confidential information like bank account details, passwords, etc. These criminals can trick you into giving your private and confidential information or they will gain your trust to get access to your computer to install malicious software- that will give them control of your computer.
- For example email or message from your friend, that was probably not sent by your friend. Criminal can access your friend's device and then by accessing the contact list, he can send infected emails and messages to all contacts. Since the message/ email is from a known person recipient will definitely check the link or attachment in the message, thus unintentionally infecting the computer.
Tricking the Shopper/ Social Engineering Techniques
- These attacks involve surveillance of the Shoppers' behavior and gathering information to use against the shopper.
- E.g. the attacker may contact the shopper pretending to be a representative from a site visited and extract information.
- HACKING is gaining unauthorized access to data in a system or computer and CYBER-VANDALISM is intentionally disrupting, defacing, or even destroying a site.
- Hacker: individual who intends to gain unauthorized access to a computer system.
- White hats are good hackers who help organizations locate and fix security flaws, they do their work with agreement from clients.
- Black hats are hackers who act with the intention of causing harm.
- Grey hats discover weaknesses in a system’s security and then publish the weakness without disrupting the site; their only reward is the prestige of discovering weakness.
Types of hackers include:
- Stolen credit card incidences about 0.9% on the Web and about 0.8% of mobile transactions
- Hacking and looting of corporate servers are the primary cause
- Central security issue: establishing customer identity
- E-signatures
- Multi-factor authentication
- Fingerprint identification
- It is one of the most feared occurrences on the Internet.
- Fear that credit card information will be stolen prevents users from making online purchases.
- Hackers target credit card files and other customer information files on merchant servers; use stolen data to establish credit under a false identity
- One solution: New identity verification mechanisms
- Social security number
- Driver's license
- Credit card numbers
- Usernames/passwords
- The largest financial threats to business institutions come not from robberies but from misappropriation of funds by insiders.
- Largest threat to business institutions come from insider embezzlement
- Employee access to privileged information
- Poor security procedures
- Insiders are more likely to be a source of cyberattacks than outsiders
- Many security threats prey on poorly designed server and client software, sometimes in the operating system and sometimes in the application software including browsers.
- An increase in complexity of and demand for software has led to increasing in flaws and vulnerabilities
- S Q L injection attacks
- Zero-day vulnerability
- Heartbleed bug; Shellshock (BashBug); F R E A K
- Social network sites like Facebook, Twitter, and LinkedIn provide a rich and rewarding environment for hackers.
- Viruses, identity theft, phishing, etc. are all found on social networks.
- Social networks an environment for:
- Viruses, site takeovers, identity fraud, malware-loaded apps, click hijacking, phishing, spam- Manual sharing scams- Sharing of files that link to malicious sites- Fake offerings, fake Like buttons, and fake apps
- A Man-in-the-middle attack is known to occur when someone with malevolent intent enters into a discussion among two parties, imitates both of them, and gets information these two parties are sending each other. The exciting feature of this situation is that maybe both parties are not aware of the man-in-the-middle.
- If in case a man-in-the-middle situation occurs to your site, the man in the middle can send you an email, that would look genuine. It is also probable that the man-in-the-middle has made a site that looks very similar to the website of your bank, so you would not falter to enter your authorizations and confidential information. There are various kinds of man-in-the-middle attacks, such as DNS spoofing, IP spoofing, stealing browser cookies, SSL hijacking, HTTPS spoofing, and email hijacking.
- Malicious code
- Hacking and cyber vandalism
- Credit card fraud/theft
- Spoofing
- Denial of service attacks
- Sniffing
- Insider jobs
- Malicious code
- Viruses: computer programs that as the ability to replicate and spread to other files; most also deliver a “payload” of some sort (maybe destructive or benign); include macro viruses, file-infecting viruses, and script viruses Worms: designed to spread from computer to computer
- Trojan horse: appears to be benign, but then does something other than expected
- Bad applets (malicious mobile code): malicious Java applets or ActiveX controls that may be downloaded onto the client and activated merely by surfing to a
- Hacker: Individual who intends to gain unauthorized access to computer systems
- Cracker: Used to denote hacker with criminal intent (two terms often used interchangeably)
- Cybervandalism: Intentionally disrupting, defacing, or destroying a Web site
- Types of hackers include:
- White hats – Members of “tiger teams” used by corporate security departments to test their own security measures
- Black hats – Act with the intention of causing harm
- Grey hats – Believe they are pursuing some greater good by breaking in and revealing system flaws
- Fear that credit card information will be stolen deters online purchases
- Hackers target credit card files and other customer information files on merchant servers; use stolen data to establish credit under a false identity
- One solution: New identity verification mechanisms
- single largest financial threat
- The largest threat to business institutions come from insider embezzlement
- Employee access to privileged information
- Poor security procedures
- Insiders are more likely to be a source of cyberattacks than outsiders
Comments
Post a Comment