Page 331 - Introduction to Electronic Commerce and Social Commerce
P. 331

318                                                     10  E-Commerce Security and Fraud Issues and Protections

             General, Administrative, and Other Controls      becomes a necessity for any successful social networking
                                                              initiative.
           The major categories of general controls are physical   Social networking spans many different applications and
             controls, administrative controls, and other controls. A brief  services. Therefore, many methods and tools are available to
           description of general controls is provided next.  defend such systems. Many of the solutions are technical in
                                                              nature and are outside the scope of this book.
           Physical Controls
           Physical controls protect computer facilities and resources,  Protecting Against Phishing
           including the physical area where computing facilities are  Because there are many phishing methods, there are many
           located. The controls provide protection against natural haz-  defense methods as well. Illustrative examples are provided
           ards, criminal attacks, and some human error.      by Symantec (2009) and the FTC Consumer Information at
              Network access control software is offered by all major secu-  consumer.ftc.gov/articles/0003-phishing. For risk and fraud
           rity vendors (e.g., see symantec.com/endpoint-protection).  insights, see sas.com/en_us/insights/risk-fraud.html.

           Administrative Controls                            Protecting Against Malvertising
           Administrative controls are defined by management and cover  According to TechTarget, malvertising (malicious  advertising)
           guidelines and compliance issuing and monitoring.  “is an advertisement on the Internet that is capable of infecting
                                                              the  viewer’s  computer  with  malware.”  Microsoft  combats
             Protecting Against Spam                          malvertising by taking legal action against malvertisers.

           Sending spam that includes a sales pitch and looks like per-    Protecting Against Spyware
           sonal, legitimate e-mail and may bypass filters is a violation of
           the U.S. Controlling the Assault of Non-Solicited Pornography  In response to the emergence of spyware, a large variety of
           and Marketing (CAN-SPAM) Act of 2003. However, many  antispyware software exists. Antispyware laws, available in
           spammers hide their identity by using hijacked PCs or spam  many jurisdictions, usually target any malicious software
           zombies to avoid detection and identification. For protecting  that is installed without the knowledge of users.  The
           your system against botnet attacks, which also spread a huge  U.S.  Federal  Trade Commission advises consumers about
           volume.                                            spyware infections. For details and resources, see ftc.gov/
                                                              news-events/media-resources/identity-theft-and-data-
             Protecting Your Computer from Pop-Up Ads         security/spyware-and-malware.


           The use of pop-ups and similar advertising methods is grow-    Protecting Against Cyberwars
           ing rapidly. Sometimes it is even difficult to close these ads
           when they appear on the screen. Some of these ads may be  This is a difficult task since these attacks usually come from
           part of a consumer’s permitted marketing agreement, but  foreign countries. The U.S. government is developing tools
           most are unsolicited. What can a user do about unsolicited  that will mine social media sites to predict cyberattacks. The
           pop-up ads? Here are some resources:               tools will monitor all Facebook, Twitter, and other social net-
              Panicware, Inc.’s Pop-Up Stopper Free Edition (pop-up-  works sites to interpret content. The idea is to automate the
           stopper-free-edition.software.informer.com), Softonic’s Pop  process.
           up Blocker (pop-up-blocker.en.softonic.com/download), and
           AdFender (adfender.com); others are available for a fee. For a
           list, see snapfiles.com; and for a list of blocker software for   Business Continuity and Disaster Recovery
           Windows, see download.cnet.com/windows/popup-blocker-
           software. Many ISPs and major browser makers (e.g., Google,  Disasters may occur without warning. A prudent defense is
           Microsoft, Yahoo!, Mozilla) offer tools to stop pop-ups.  to have a business continuity plan, mainly consisting of a
                                                              disaster recovery plan. Such a plan describes the details of
             Protecting Against Other Social Engineering Attacks  the recovery process from major disasters such as loss of all
                                                              (or most) of the computing facilities or the data.
           With the increasing number of social engineering attacks via
           websites and in social networks comes the need for better   Example: Hospital Paid Ransom after Malware Attack
           protection. The open-source environment and the interactive  Hollywood Presbyterian Medical Center paid a ransom of
           nature of the technology also create risks. Thus, EC security  $17,000  in Britain (so the) blackmailer-hacker cannot be
   326   327   328   329   330   331   332   333   334   335   336