Security Threats To E-Commerce: BY Janani - SB
Security Threats To E-Commerce: BY Janani - SB
BY JANANI.SB
1
Implication of Threat
Any act or object that poses a danger to computer assets is known as a threat. Countermeasure is a procedure that recognizes, reduces, or eliminates a threat. The risk management model shows four general actions to take for the threat.
Client Threats
Web pages were mainly static. The widespread use of active content has changed the function of Web pages. Sources of client threats:
Active content Java, Java Applets, and JavaScript ActiveX Controls Graphics, Plug-Ins, and E-mail Attachments
4
Active Content
Active content refers to programs that are embedded transparently in Web pages and that cause action to occur. The best-known active content forms are Java applets, ActiveX controls, JavaScript, and VBScript. Also include graphics and Web browser plug-ins.
Active Content
A Trojan horse is a program hidden inside another program or Web page that masks its true purpose.
A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computer. Malicious cookie can destroy files stored on client computers.
6
Virus
A virus is software that attaches itself to another program and can cause damage when the host program is activated. Worm viruses replicate themselves on other machines. A macro virus is coded as a small program and is embedded in a file. The term steganography describes information that is hidden within another piece of information.
7
Secrecy Threats
Secrecy is the prevention of unauthorized information disclosure. Privacy is the protection of individual rights to nondisclosure. Secrecy is a technical issue requiring sophisticated physical and logical mechanism. Privacy protection is a legal matter.
Integrity Threats
An integrity threat exists when an unauthorized party can alter a message stream of information. Cyber vandalism is an example of an integrity violation. Masquerading or spoofing is one means of creating havoc on Web sites.
10
Necessity Threats
The purpose of a necessity threat is to disrupt normal computer processing or to deny processing entirely. Necessity threat is also known as a delay, denial, or denial-of-service threat (DOS). eBay faced the denial-of-service attack in early 2000.
11
Server Threats
Servers have vulnerabilities that can be exploited to cause destruction or to acquire information illegally. Server threats include:
Web server threats Database threats Common gateway interface threats Other programming threats
12
13
Database Threats
Databases connected to the Web could damage a company if it were disclosed or altered. Anyone obtains user authentication information can masquerade as a legitimate user. The Database threats resource center describes threats to database systems.
14
16
THANK YOU
17