SlideShare a Scribd company logo
SECURE ELECTRONIC
APPLICATION
(SECURITY & RELIABILITY OF E-
COMMERCE)
                     Noor Syazana Bt Md Yusof
                      Shajarotun Nur Bt Hamzah
                           Siti Aishah Binti Isnin
                      Sri Rahayu Bt Muhammad
Which one do you preferred most?
General E-Commerce Security Issues
   Any E-Commerce needs to be concerned about network
    security.
   The Internet is a “public” network consisting of thousands
    of interconnected private computer networks.
   Private computer network systems are exposed to
    threats from anywhere on the public network.
   Businesses must protect against the unknown.
   New methods of attacking networks and Web sites, and
    new network security holes, are being constantly
    discovered or invented.
   An E-Commerce cannot expect to achieve perfect
    security for its network and Web site.
Security Questions
   How is the data protected once it is delivered to
    the E-Commerce?
   How are credit card transactions authenticated
    and authorized?
   The biggest potential security problem in an E-
    Commerce is of human, rather than electronic,
    origin.
   The weakest link in any security system is the
    people using it.
Example of Online Application
SWOT analysis
   Strength :
     Reliable
       Good feedback from the user
       Built trust in their customer by providing the ease of use of
        the application

   Weakness :
     Not   secure
       Money lost
       Information stealing – credit card no, password
SWOT analysis
   Opportunity :
     Increase   market scope
         Increase the demand of their products or services
     Competitive    advantage
         Can compete with their competitors


   Threat :
     Hacking  – SSL Man-in-the-Middle
     Phishing attack

     Fake website
Security&reliability
Verisign
Sources:
Kosmo Online
Date:
18 April 2012
Secure Socket Layer
   The Secure Socket Layer protocol was created by
    Netscape to ensure secure transactions between
    web servers and browsers. The protocol uses a third
    party, a Certificate Authority (CA), to identify one
    end or both end of the transactions.
How it Works??
The VeriSign Secured Seal Increases
the Likelihood to Buy

   With an understanding of the importance of trust
    marks in completing online transactions, Web
    merchants should be sure to choose the trust mark
    that offers the most value. The VeriSign Secured
    Seal is the most trusted symbol of secure commerce
    on the Web.
The VeriSign Secured Seal Increases
the Likelihood to Buy
  83  % of online shoppers are familiar with the VeriSign
   Secured Seal, more than any other mark.
  Among shoppers who are aware of the VeriSign
   Secured Seal, more than 4 in 5 say it is their preferred
   seal.
  The VeriSign Secured Seal rates best overall
   worldwide among endorsement programs in terms of
   consumer trust (67% within Australia, 60% worldwide),
   with consumers indicating they believe the seal
   represents security, protection, verification, and
   reputation.
The VeriSign Secured Seal Increases
the Likelihood to Buy

   The VeriSign Secured Seal can also affect which
    vendor Web site online shoppers prefer to do
    business with. The majority of respondents (62%
    within Australia, 53% worldwide) prefer to use sites
    that display the VeriSign Secured Seal.
Network and Web Site Security
   An entire glossary of words and phrases
    identifies network and Web security risks, such as
    hacker, cracker, Trojan horse, and more.
   As part of planning a startup E-Business’s
    security, management should become familiar
    with network and Web server security risk
    terminology.
Denial of Service Attacks
   Designed to disable a Web site by flooding it
    with useless traffic or activity.
   Distributed denial of service attack uses multiple
    computers to attack in a coordinated fashion.
   Risk is primarily centered around downtime or
    lack of Web site availability.
   Defenses exist for these attacks.
Web Site Defacement
   Occurs when a hacker penetrates the system and
    replaces text or graphics with “other” material.
   Risk is primarily down time and repair costs.
   There have been many well publicized examples,
    including high profile industry and government
    sites.
   Ordinary defenses against unauthorized logins are
    a first line defense.
   Total security may be difficult to achieve.
Electronic Industrial Espionage
   A very serious problem, especially considering
    that “professional” hackers may be involved.
   Must implement and diligently maintain industry
    standard “best practices”.
   Additional recommendations:
     Don’t open questionable or suspicious e-mail
      attachments.
     Keep security software and virus checkers updated.
Credit Card Fraud & Data Theft
   E-Business is at risk from credit card fraud from
    stolen data.
   Secure your own data.
   Verify the identity of your customers and the
    validity of the incoming credit card data.
   Identity theft by a miscreant masquerading as
    someone else is also a common problem.
Data Spills
   A security problem caused, ordinarily by a bug
    or other “system” failure, occasionally hackers
    are behind this problem
   This is an unintended disclosure of customer or
    corporate data through the Web or other
    Internet service
   May expose firm to legal liability
E-Commerce Security
   An important issue that is often overlooked or given
    a lower priority in the face of startup activity.
   A startup firm should consider outsourcing Web and
    Internet services in part since the outsourcing
    company can address security concerns as part of
    the “package.”
Network and Web Site Security
   Tools such as passwords, firewalls, intrusion
    detection systems, and virus scanning software
    should be used to protect an E-Commerce’s network
    and Web site.
Transaction Security and Data
Protection
   Use a predefined key to encrypt and decrypt
    the data during transmission.
   Use the secure sockets layer (SSL) protocol to
    protect data transmitted over the Internet.
   Move sensitive customer information such as
    credit card numbers offline or encrypting the
    information if it is to be stored online.
Transaction Security and Data
Protection - internal
   Remove all files and data from storage devices
    including disk drives and tapes before getting
    rid of the devices.
   Shred all hard-copy documents containing
    sensitive information before trashing them.
   Security is only as strong as the weakest link.
Security Audits and Penetration
Testing
   Can provide an overall assessment of the firm’s
    current exposure and vulnerabilities.
   This is an outsourced item.
   Consultant will provide a comprehensive
    recommendation to address list of vulnerabilities.
Security Providers and Products
   There are many security consultants.
   Many commercial products are available.
   Training for in-house staff is a key issue.
Risk Management
   Network and Web site security and intruder
    detection programs
   Antivirus protection
   Firewalls
   Sound security policies and procedures
   Employee education
Risk Transfer
   A firm can manage and transfer risk through
    insurance products
   May be purchased as part of the firms business
    insurance package
   Consult an insurance professional
Opinion
   Government have to strengthen the Internet law
   Have video chat when doing online business
   Put company registration number in every e-
    commerce site
SECURITY
   Google data center security
   How SSL works tutorial - with HTTPS
   Top 10 Hackers

More Related Content

DOCX
What you need to know about cyber security
PDF
Ijnsa050215
PPTX
Employee Awareness in Cyber Security - Kloudlearn
PDF
Compliance is a pit stop – your destination lies ahead
PDF
10 security problems unique to it
PDF
Cybersecurity- What Retailers Need To Know
PDF
100+ Cyber Security Interview Questions and Answers in 2022
PDF
Elementary-Information-Security-Practices
What you need to know about cyber security
Ijnsa050215
Employee Awareness in Cyber Security - Kloudlearn
Compliance is a pit stop – your destination lies ahead
10 security problems unique to it
Cybersecurity- What Retailers Need To Know
100+ Cyber Security Interview Questions and Answers in 2022
Elementary-Information-Security-Practices

What's hot (20)

PDF
PDF
Application Security: Safeguarding Data, Protecting Reputations
PDF
IT Security - Guidelines
PDF
ZSAH Security - Web
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
Cybersecurity
PDF
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PDF
Insights into cyber security and risk
 
PDF
E-Commerce Security: A Primer
PPT
Online Security Breach Compromises 77 Million Client Accounts
PPTX
Security is Hard
PDF
Banking and Modern Payments System Security Analysis
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PDF
Enterprise Information Systems Security: A Case Study in the Banking Sector
PDF
InformationSecurity_11141
PDF
How to tell if that pop-up window is offering you a rogue anti-malware product
PPTX
Summer internship - Cybersecurity
Application Security: Safeguarding Data, Protecting Reputations
IT Security - Guidelines
ZSAH Security - Web
Fundamentals of information systems security ( pdf drive ) chapter 1
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Cybersecurity
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Insights into cyber security and risk
 
E-Commerce Security: A Primer
Online Security Breach Compromises 77 Million Client Accounts
Security is Hard
Banking and Modern Payments System Security Analysis
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Enterprise Information Systems Security: A Case Study in the Banking Sector
InformationSecurity_11141
How to tell if that pop-up window is offering you a rogue anti-malware product
Summer internship - Cybersecurity
Ad

Viewers also liked (18)

PPS
Alhambra Rocio Jurado
PDF
Dke679 Fm
PDF
Institucional Presentation Nov/2015
PDF
Get Pdf1
PDF
K&P Presentation
PPS
Wintereinbruch (2)
PPS
Wintereinbruch (2)
PDF
Idea factory by Psykologifabriken
PPT
Online Portfolio
PPTX
Bubble Gum
PPT
E Portfolio For Michelle Emanuel Harrington Updated
PDF
Catalog Eelectrocasnice Incorporabile Bosch2009
PPTX
Bubble Gum
PPS
Alhambra Rocio Jurado (Frh)
PPS
Alhambra Rocio Jurado
PDF
필독Automatic Fire Detection
PPTX
Project Management Pepsi
Alhambra Rocio Jurado
Dke679 Fm
Institucional Presentation Nov/2015
Get Pdf1
K&P Presentation
Wintereinbruch (2)
Wintereinbruch (2)
Idea factory by Psykologifabriken
Online Portfolio
Bubble Gum
E Portfolio For Michelle Emanuel Harrington Updated
Catalog Eelectrocasnice Incorporabile Bosch2009
Bubble Gum
Alhambra Rocio Jurado (Frh)
Alhambra Rocio Jurado
필독Automatic Fire Detection
Project Management Pepsi
Ad

Similar to Security&reliability (20)

PPTX
E-commerce & Security
PPTX
protection & security of e-commerce ...
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PDF
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
PDF
Understanding Network and Web Security: How to Safeguard Your Digital Assets
PDF
Importance of Cyber Security for Company.pdf
PDF
Choosing the Right Network Security for Your Business - Minerva.pdf
PPTX
E-commerce-Security-_20250212_131135_0000.pptx
PDF
Top Cyber Security Interview Questions and Answers 2022.pdf
PDF
Cyber security notes or Mca/bca about security
PPTX
Lesson 3 - Cybersecurity and its impact to e-commerce (32).pptx
PPTX
Network security
PDF
10 security problems unique to it
PDF
Cyber Security Services for Business.pdf
DOCX
The Importance of Cybersecurity to Secure Business Operations.docx
PDF
What is Cybersecurity and Its Importance to Business
PDF
Cyber Security In The Digital Age - Infocenter
DOCX
Cyber Security Solutions Every Business Needs to Prevent Data Breaches.docx
PDF
Strong authentication implementation guide
 
E-commerce & Security
protection & security of e-commerce ...
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
Understanding Network and Web Security: How to Safeguard Your Digital Assets
Importance of Cyber Security for Company.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
E-commerce-Security-_20250212_131135_0000.pptx
Top Cyber Security Interview Questions and Answers 2022.pdf
Cyber security notes or Mca/bca about security
Lesson 3 - Cybersecurity and its impact to e-commerce (32).pptx
Network security
10 security problems unique to it
Cyber Security Services for Business.pdf
The Importance of Cybersecurity to Secure Business Operations.docx
What is Cybersecurity and Its Importance to Business
Cyber Security In The Digital Age - Infocenter
Cyber Security Solutions Every Business Needs to Prevent Data Breaches.docx
Strong authentication implementation guide
 

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
Programs and apps: productivity, graphics, security and other tools
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx

Security&reliability

  • 1. SECURE ELECTRONIC APPLICATION (SECURITY & RELIABILITY OF E- COMMERCE) Noor Syazana Bt Md Yusof Shajarotun Nur Bt Hamzah Siti Aishah Binti Isnin Sri Rahayu Bt Muhammad
  • 2. Which one do you preferred most?
  • 3. General E-Commerce Security Issues  Any E-Commerce needs to be concerned about network security.  The Internet is a “public” network consisting of thousands of interconnected private computer networks.  Private computer network systems are exposed to threats from anywhere on the public network.  Businesses must protect against the unknown.  New methods of attacking networks and Web sites, and new network security holes, are being constantly discovered or invented.  An E-Commerce cannot expect to achieve perfect security for its network and Web site.
  • 4. Security Questions  How is the data protected once it is delivered to the E-Commerce?  How are credit card transactions authenticated and authorized?  The biggest potential security problem in an E- Commerce is of human, rather than electronic, origin.  The weakest link in any security system is the people using it.
  • 5. Example of Online Application
  • 6. SWOT analysis  Strength :  Reliable  Good feedback from the user  Built trust in their customer by providing the ease of use of the application  Weakness :  Not secure  Money lost  Information stealing – credit card no, password
  • 7. SWOT analysis  Opportunity :  Increase market scope  Increase the demand of their products or services  Competitive advantage  Can compete with their competitors  Threat :  Hacking – SSL Man-in-the-Middle  Phishing attack  Fake website
  • 11. Secure Socket Layer  The Secure Socket Layer protocol was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions.
  • 13. The VeriSign Secured Seal Increases the Likelihood to Buy  With an understanding of the importance of trust marks in completing online transactions, Web merchants should be sure to choose the trust mark that offers the most value. The VeriSign Secured Seal is the most trusted symbol of secure commerce on the Web.
  • 14. The VeriSign Secured Seal Increases the Likelihood to Buy  83 % of online shoppers are familiar with the VeriSign Secured Seal, more than any other mark.  Among shoppers who are aware of the VeriSign Secured Seal, more than 4 in 5 say it is their preferred seal.  The VeriSign Secured Seal rates best overall worldwide among endorsement programs in terms of consumer trust (67% within Australia, 60% worldwide), with consumers indicating they believe the seal represents security, protection, verification, and reputation.
  • 15. The VeriSign Secured Seal Increases the Likelihood to Buy  The VeriSign Secured Seal can also affect which vendor Web site online shoppers prefer to do business with. The majority of respondents (62% within Australia, 53% worldwide) prefer to use sites that display the VeriSign Secured Seal.
  • 16. Network and Web Site Security  An entire glossary of words and phrases identifies network and Web security risks, such as hacker, cracker, Trojan horse, and more.  As part of planning a startup E-Business’s security, management should become familiar with network and Web server security risk terminology.
  • 17. Denial of Service Attacks  Designed to disable a Web site by flooding it with useless traffic or activity.  Distributed denial of service attack uses multiple computers to attack in a coordinated fashion.  Risk is primarily centered around downtime or lack of Web site availability.  Defenses exist for these attacks.
  • 18. Web Site Defacement  Occurs when a hacker penetrates the system and replaces text or graphics with “other” material.  Risk is primarily down time and repair costs.  There have been many well publicized examples, including high profile industry and government sites.  Ordinary defenses against unauthorized logins are a first line defense.  Total security may be difficult to achieve.
  • 19. Electronic Industrial Espionage  A very serious problem, especially considering that “professional” hackers may be involved.  Must implement and diligently maintain industry standard “best practices”.  Additional recommendations:  Don’t open questionable or suspicious e-mail attachments.  Keep security software and virus checkers updated.
  • 20. Credit Card Fraud & Data Theft  E-Business is at risk from credit card fraud from stolen data.  Secure your own data.  Verify the identity of your customers and the validity of the incoming credit card data.  Identity theft by a miscreant masquerading as someone else is also a common problem.
  • 21. Data Spills  A security problem caused, ordinarily by a bug or other “system” failure, occasionally hackers are behind this problem  This is an unintended disclosure of customer or corporate data through the Web or other Internet service  May expose firm to legal liability
  • 22. E-Commerce Security  An important issue that is often overlooked or given a lower priority in the face of startup activity.  A startup firm should consider outsourcing Web and Internet services in part since the outsourcing company can address security concerns as part of the “package.”
  • 23. Network and Web Site Security  Tools such as passwords, firewalls, intrusion detection systems, and virus scanning software should be used to protect an E-Commerce’s network and Web site.
  • 24. Transaction Security and Data Protection  Use a predefined key to encrypt and decrypt the data during transmission.  Use the secure sockets layer (SSL) protocol to protect data transmitted over the Internet.  Move sensitive customer information such as credit card numbers offline or encrypting the information if it is to be stored online.
  • 25. Transaction Security and Data Protection - internal  Remove all files and data from storage devices including disk drives and tapes before getting rid of the devices.  Shred all hard-copy documents containing sensitive information before trashing them.  Security is only as strong as the weakest link.
  • 26. Security Audits and Penetration Testing  Can provide an overall assessment of the firm’s current exposure and vulnerabilities.  This is an outsourced item.  Consultant will provide a comprehensive recommendation to address list of vulnerabilities.
  • 27. Security Providers and Products  There are many security consultants.  Many commercial products are available.  Training for in-house staff is a key issue.
  • 28. Risk Management  Network and Web site security and intruder detection programs  Antivirus protection  Firewalls  Sound security policies and procedures  Employee education
  • 29. Risk Transfer  A firm can manage and transfer risk through insurance products  May be purchased as part of the firms business insurance package  Consult an insurance professional
  • 30. Opinion  Government have to strengthen the Internet law  Have video chat when doing online business  Put company registration number in every e- commerce site
  • 31. SECURITY  Google data center security  How SSL works tutorial - with HTTPS  Top 10 Hackers