Skip to main content

2017 | OriginalPaper | Buchkapitel

10. E-Commerce Security and Fraud Issues and Protections

verfasst von : Efraim Turban, Judy Whiteside, David King, Jon Outland

Erschienen in: Introduction to Electronic Commerce and Social Commerce

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Upon completion of this chapter, you will be able to:
1.
Understand the importance and scope of security of information systems for EC.
 
2.
Describe the major concepts and terminology of EC security.
 
3.
Understand about the major EC security threats, vulnerabilities, and technical attacks.
 
4.
Understand Internet fraud, phishing, and spam.
 
5.
Describe the information assurance security principles.
 
6.
Describe the major technologies for protection of EC networks, including access control.
 
7.
Describe various types of controls and special defense mechanisms.
 
8.
Describe consumer and seller protection from fraud.
 
9.
Discuss enterprisewide implementation issues for EC security.
 
10.
Understand why it is so difficult to stop computer crimes.
 
11.
Discuss the future of EC.
 

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Alto, P. “Infographic: The Real Cost of Cyberattacks.” Enterprise Innovation, March 21, 2016. Alto, P. “Infographic: The Real Cost of Cyberattacks.” Enterprise Innovation, March 21, 2016.
Zurück zum Zitat Andress, J. The Basics of Information Security, Second Edition: Understanding the Fundamentals of InfoSec in Theory and Practice. Rockham, MA: Syngress Pub., 2014. Andress, J. The Basics of Information Security, Second Edition: Understanding the Fundamentals of InfoSec in Theory and Practice. Rockham, MA: Syngress Pub., 2014.
Zurück zum Zitat Bort, J. “For the First Time, Hackers Have Used a Refrigerator to Attack Businesses.” Business Insider, January 16, 2014. Bort, J. “For the First Time, Hackers Have Used a Refrigerator to Attack Businesses.” Business Insider, January 16, 2014.
Zurück zum Zitat Cloud, J. Internet Security: Online Protection from Computer Hacking. North Charleston, USA: CreateSpace Publishing Platform, 2015. Cloud, J. Internet Security: Online Protection from Computer Hacking. North Charleston, USA: CreateSpace Publishing Platform, 2015.
Zurück zum Zitat Constantin, L. “Identity Thieves Obtain 100,000 Electronic Filing PINs from IRS System.” IDG News Service, February 10, 2016. Constantin, L. “Identity Thieves Obtain 100,000 Electronic Filing PINs from IRS System.” IDG News Service, February 10, 2016.
Zurück zum Zitat CyberSource. 14th Annual 2013 Online Fraud Report, CyberSource Corporation (2013). CyberSource. 14th Annual 2013 Online Fraud Report, CyberSource Corporation (2013).
Zurück zum Zitat Dawn Ontario. “Virus Information: Guide to Computer Viruses.” n.d. Dawn Ontario. “Virus Information: Guide to Computer Viruses.” n.d.
Zurück zum Zitat Forrest, C. “Phishing Gets More Dangerous: New Report Analyzes the Weapons of Choice.” TechRepublic, January 27, 2016. Forrest, C. “Phishing Gets More Dangerous: New Report Analyzes the Weapons of Choice.” TechRepublic, January 27, 2016.
Zurück zum Zitat Frenkel, K. A. “2016 Has the Markings of a Perfect Storm for Fraud.” CIO Insight, January 28, 2016. Frenkel, K. A. “2016 Has the Markings of a Perfect Storm for Fraud.” CIO Insight, January 28, 2016.
Zurück zum Zitat Goodman, M. Future Crimes: Inside the Digital Underground and the Battle for our Connected World. New York: Anchor Reprint, 2016. Goodman, M. Future Crimes: Inside the Digital Underground and the Battle for our Connected World. New York: Anchor Reprint, 2016.
Zurück zum Zitat Greengard, S. “Breaches of Health Care Data: A Growing Epidemic.” Baseline, February 12, 2016. Greengard, S. “Breaches of Health Care Data: A Growing Epidemic.” Baseline, February 12, 2016.
Zurück zum Zitat Harrison, V., and J. Pagliery. “Nearly 1 Million New Malware Threats Released Everyday.” CNN News, April 14, 2015. Harrison, V., and J. Pagliery. “Nearly 1 Million New Malware Threats Released Everyday.” CNN News, April 14, 2015.
Zurück zum Zitat Harwood, M. Internet Security: How to Defend Against Attackers on the Web (Jones & Bartlett Learning Information Systems Security & Assurance), 2nd edition. Burlington, MA: John Bartlett Learning, 2015. Harwood, M. Internet Security: How to Defend Against Attackers on the Web (Jones & Bartlett Learning Information Systems Security & Assurance), 2nd edition. Burlington, MA: John Bartlett Learning, 2015.
Zurück zum Zitat Hinckley, S. “Pay by Selfie? Amazon Says Your Portrait Can Protect Online Purchases.” CSMonitor, March 15, 2016. Hinckley, S. “Pay by Selfie? Amazon Says Your Portrait Can Protect Online Purchases.” CSMonitor, March 15, 2016.
Zurück zum Zitat Horowitz, D., and A. Horowitz. “Online Merchandise Scams Target Students.” The Costco Connection, December 2015. Horowitz, D., and A. Horowitz. “Online Merchandise Scams Target Students.” The Costco Connection, December 2015.
Zurück zum Zitat Jennings, R. “This Hollywood Hospital Didn’t Backup Its Data? “Ransomware” Payday for Evil Hackers.” Computerworld, February 18, 2016. Jennings, R. “This Hollywood Hospital Didn’t Backup Its Data? “Ransomware” Payday for Evil Hackers.” Computerworld, February 18, 2016.
Zurück zum Zitat John, A. Internet Security. Publisher: Self-Publishing, 2016. John, A. Internet Security. Publisher: Self-Publishing, 2016.
Zurück zum Zitat Jones, M. “Facebook Tests Tool that Identifies Fake Accounts.” Value Walk, March 24, 2016. Jones, M. “Facebook Tests Tool that Identifies Fake Accounts.” Value Walk, March 24, 2016.
Zurück zum Zitat Kan, M. “Alibaba Uses Facial Recognition Tech for Online Payments.” Computer World, March 16, 2015. Kan, M. “Alibaba Uses Facial Recognition Tech for Online Payments.” Computer World, March 16, 2015.
Zurück zum Zitat Lawinski, J. “Security Slideshow: Malicious Attacks Skyrocket as Hackers Explore New Targets.” CIO Insight, May 7, 2012. Lawinski, J. “Security Slideshow: Malicious Attacks Skyrocket as Hackers Explore New Targets.” CIO Insight, May 7, 2012.
Zurück zum Zitat Lemos, R. “Phishing Attacks Continue to Sneak Past Defenses.” eWeek, February 11, 2016. Lemos, R. “Phishing Attacks Continue to Sneak Past Defenses.” eWeek, February 11, 2016.
Zurück zum Zitat Maxwell, D. Hacking: Bootcamp—How to Hack Computers, Basic Security and Penetration Testing (Hacking The Common Core). [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016. Maxwell, D. Hacking: Bootcamp—How to Hack Computers, Basic Security and Penetration Testing (Hacking The Common Core). [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016.
Zurück zum Zitat Nakashima, E., and M. Zapotosky. “U.S. Charges Iran-Linked Hackers with Targeting Banks, N.Y. Dam.” The Washington Post, March 24, 2016. Nakashima, E., and M. Zapotosky. “U.S. Charges Iran-Linked Hackers with Targeting Banks, N.Y. Dam.” The Washington Post, March 24, 2016.
Zurück zum Zitat Pagliery, J. “Your Car Is a Giant Computer- and It Can Be Hacked.” CNN Money, June 2, 2014b. Pagliery, J. “Your Car Is a Giant Computer- and It Can Be Hacked.” CNN Money, June 2, 2014b.
Zurück zum Zitat Reisinger, D. “10 Mobile Security Issues that Should Worry You.” eWeek, February 11, 2014. Reisinger, D. “10 Mobile Security Issues that Should Worry You.” eWeek, February 11, 2014.
Zurück zum Zitat Russell, K. “Here’s How to Protect Yourself from the Massive Security Flaw That’s Taken over the Internet.” Business Insider, April 8, 2014. Russell, K. “Here’s How to Protect Yourself from the Massive Security Flaw That’s Taken over the Internet.” Business Insider, April 8, 2014.
Zurück zum Zitat Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 1: Learn to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Cloud Security Basics and Much More. [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016a. Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 1: Learn to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Cloud Security Basics and Much More. [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016a.
Zurück zum Zitat Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and Much More! [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016b. Scott, J. Cybersecurity 101: What You Absolutely Must Know!- Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecurity, Defense Against Cookie Vulnerabilities, and Much More! [Kindle Edition] Seattle, WA: Amazon Digital Services, 2016b.
Zurück zum Zitat Scott, W. Information Security 249 Success Secrets- 249 Most Asked Questions on Information Security- What You Need to Know. Brisbane, Queensland, Australia: Emereo Publishing, 2014. Scott, W. Information Security 249 Success Secrets- 249 Most Asked Questions on Information Security- What You Need to Know. Brisbane, Queensland, Australia: Emereo Publishing, 2014.
Zurück zum Zitat Singer, P. W., and A. Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. 1st Edition, New York: Oxford University Press, 2014. Singer, P. W., and A. Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. 1st Edition, New York: Oxford University Press, 2014.
Zurück zum Zitat Smith, R. Elementary Information Security, 2nd edition. Burlington, MA: Jones Bartlett, 2015. Smith, R. Elementary Information Security, 2nd edition. Burlington, MA: Jones Bartlett, 2015.
Zurück zum Zitat Swann, C. T. Marlins Cry a Phishing Story. Spokane, WA: Cutting Edge Communications, Inc., 2012. Swann, C. T. Marlins Cry a Phishing Story. Spokane, WA: Cutting Edge Communications, Inc., 2012.
Zurück zum Zitat TechRepublic Staff. “The 15 Most Frightening Data Breaches.” TechRepublic, October 29, 2015. TechRepublic Staff. “The 15 Most Frightening Data Breaches.” TechRepublic, October 29, 2015.
Zurück zum Zitat Teo, F. “Monitoring Your Internal Network with Intelligent Firewalls.” Enterprise Innovation, January 18, 2016. Teo, F. “Monitoring Your Internal Network with Intelligent Firewalls.” Enterprise Innovation, January 18, 2016.
Zurück zum Zitat Troinovski, A. “German Parliament Struggles to Purge Hackers from Computer Network.” The Wall Street Journal, June 12, 2015. Troinovski, A. “German Parliament Struggles to Purge Hackers from Computer Network.” The Wall Street Journal, June 12, 2015.
Zurück zum Zitat Van Allen, F. “The 18 Scariest Computer Viruses of All Time.” TechRepublic, January 22, 2016. Van Allen, F. “The 18 Scariest Computer Viruses of All Time.” TechRepublic, January 22, 2016.
Zurück zum Zitat Victor, D. “Authorities Shut Down Darkode, a Marketplace for Stolen Personal Data.” New York Times, July 15, 2015. Victor, D. “Authorities Shut Down Darkode, a Marketplace for Stolen Personal Data.” New York Times, July 15, 2015.
Zurück zum Zitat Wagstaff, K. “Why Is the U.S. Going After Chinese Hackers? Jobs?” NBC News, May 19, 2014. Wagstaff, K. “Why Is the U.S. Going After Chinese Hackers? Jobs?” NBC News, May 19, 2014.
Zurück zum Zitat Winton, R. “Hollywood Hospital Pays $17,000 in Bitcoin to Hackers: FBI Investigation.” Los Angeles Times, February 18, 2016. Winton, R. “Hollywood Hospital Pays $17,000 in Bitcoin to Hackers: FBI Investigation.” Los Angeles Times, February 18, 2016.
Zurück zum Zitat Wollen, J. “10 Social Engineering Exploits Your Users Should Be Aware Of.” TechRepublic, January 27, 2016. Wollen, J. “10 Social Engineering Exploits Your Users Should Be Aware Of.” TechRepublic, January 27, 2016.
Zurück zum Zitat Yan, S. “Chinese Man Admits to Cyber Spying on Boeing and Other U.S. Firms.” Money CNN News, March 24, 2016. Yan, S. “Chinese Man Admits to Cyber Spying on Boeing and Other U.S. Firms.” Money CNN News, March 24, 2016.
Metadaten
Titel
E-Commerce Security and Fraud Issues and Protections
verfasst von
Efraim Turban
Judy Whiteside
David King
Jon Outland
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-50091-1_10