Page 325 - Introduction to Electronic Commerce and Social Commerce
P. 325

312                                                     10  E-Commerce Security and Fraud Issues and Protections

             SECTION 10.4  REVIEW QUESTIONS                     Authentication, Authorization,
                                                              and Nonrepudiation
             1.  Define phishing.
             2.  Describe the relationship of phishing to financial fraud.  Three concepts are related to the IA model: authentication,
             3.  Briefly describe some phishing tactics.      authorization, and nonrepudiation. These important concepts
             4.  Describe spam and its methods.               are:
             5.  Define splogs and explain how sploggers make money.
             6.  Why and how are social networks being attacked?
             7.  Describe data breaches (data leaks).           •  Authentication is a security measure making sure
                                                                  that data information, ECD participants and trans-
                                                                  actions, and all other EC related objects are valid.
                                                                  Authentication requires verification. For example, a
           10.5   THE INFORMATION ASSURANCE                       person can be authenticated by something he knows
                  MODEL AND DEFENSE STRATEGY                      (e.g., a password), something he possesses (e.g., an
                                                                  entry token), or something unique to that person
           The Information Assurance (IA) model, known as the CIA   (e.g., a fingerprint).
           security triad, is a point of reference used to identify problem   •  Authorization requires comparing information pro-
           areas and evaluate the information security of an organization.   vided by a person or a program during a login with
           The use of the model includes three necessary attributes: con-  stored information associated with the access
           fidentiality, integrity, and availability. This model is described   requested.
           next. (For a discussion, see  whatis.techtarget.com/defini-  •  Nonrepudiation is the concept of ensuring that a party
           tion/Confidentiality-integrity-and-availability-CIA.)  in an EC transaction cannot repudiate (or refute) the
              Note: The assurance model can be adapted to several EC   validity of an EC contract and that she or he will fulfill
           applications. For example, securing the supply chain is critical.  their obligation in the transactions. According to the
                                                                  National Information Systems Security (INFOSEC)’s
                                                                  glossary, nonrepudiation is the “[a]ssurance the sender
             Confidentiality, Integrity, and Availability         of data is provided with proof of delivery and the recip-
                                                                  ient is provided with proof of the sender’s identity, so
           The success and security of EC can be measured by these   that neither can later deny having processed the data.”
           attributes:

                                                                Note: See the list of Key Terms in Section 10.2. Some
                                                              sources list more concepts (e.g., Techopedia).
                                                                To assure these attributes, e-commerce applies technolo-
                1.  Confidentiality is the assurance of data secrecy and   gies such as encryption, digital signature, and certification.
                privacy. Namely, the data is disclosed only to autho-  For example, the use of a digital signature makes it difficult
                rized people.  Confidentiality is achieved  by using   for people to deny their involvement in an EC transaction.
                several methods, such as encryption and passwords.  In e-commerce, new or improved methods to ensure the
                2.  Integrity is the assurance that data are accurate and   confidentiality of credit card numbers, the integrity of tran-
                that they cannot be altered. The integrity attribute   saction- related messages, the authentication of buyers and
                needs to be able to detect and prevent the unauthor-  sellers, and nonrepudiation of transactions need to be con-
                ized creation, modification, or deletion of data or   stantly updated as older methods become obsolete.
                messages in transit.
                3.  Availability is the assurance that access to any rele-
                vant data, information websites, or other EC services     E-Commerce Security Strategy
                and their use is available in real time, whenever and
                wherever needed. The information must be reliable.  EC security needs to address the IA model and its components.
                                                              In Figure 10.7, an EC security framework that defines the high-
   320   321   322   323   324   325   326   327   328   329   330