WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

E-commerce capabilities assessment: -security of e-payment systems- case of the democratic republic of congo

( Télécharger le fichier original )
par Espérant Ngongo Mbuli
University of Walles - Master in Advanced information technology and Business Management 2013
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

IV.3 Specific findings regarding the Confidentiality, Integrity, Availability (CIA) IV.3.1 Confidentiality

The confidentiality of the e-payment system is guaranteed by the existence of the firewall and the encryption system in the network infrastructure. The table below shows the results of the availability of these two elements in the assessed organizations.

Table 7: Confidentiality elements

Element

Number of company

Firewall

6

Encryption

3

The study results show that 100% of the responding institutions have a firewall installed in their IT infrastructure and 50% have an encryption system deployed.

However, the integrity check of the firewall is an important element to assess the real value of the firewall in the LAN infrastructure.

The table below shows the result of the integrity of the e-payment systems reviewed. According to the likert scale used for the questionnaire, the occurrence table of the integrity check of the firewall configuration is provided per institution.

Table 8: Integrity check of the firewall configuration

Institution

Score

Bank 1

4

Bank 2

3

Bank 3

2

Bank 4

3

Mobile operator 1

2

Mobile operator 2

2

Page | 46

From the table above, the extracted table below shows how often the configuration of the firewall is checked for integrity.

Table 9: Integrity check of the firewall configuration

Response / Score

Frequency

Percentage

Not sure / 2

3

50%

Monthly / 3

2

33.33%

Weekly / 4

1

16.67%

 

6

100%

This result shows that the most observed value is the score 2 (Not sure) which is the mode of this frequency distribution. This means that 50% of the observed institutions do not have an integrity check of the firewall configuration in place increasing the vulnerability of the system. 33.33% have a monthly check while only 16.67% have a weekly check.

So the integrity of the configuration of the firewall can be compromised and it'll take at least a week to discover the exploit.

IV.3.2 Integrity

The integrity has to be assessed through the existence of digital certificate system, authentication and authorization for data access, and the protection against the virus.

Table 10: System integrity result

Capability

Number of institution

Digital certificate

1

Authentication

6

Authorization

6

Antivirus

6

 
 

The study result shows that the majority of assessed institutions don't have a digital certificate system in place; only one of them has a certificate server deployed.

Page | 47

The assessment of the integrity through the reporting of the unauthorized attempts to sensitive data and physical access control to computers hosting sensitive data is given in the table below.

Table 11: Reporting of unauthorized attempts to sensitive data

Institution

Score

Bank 1

5

Bank 2

5

Bank 3

5

Bank 4

5

Mobile operator 1

2

Mobile operator 2

5

This table shows that the majority of the assessed companies have a reporting system in place for unauthorized attempts to access sensitive data.

However, the physical access control of the system holding sensitive data is an important element to guarantee integrity of data.

Table 12: Additional physical access control

Institution

Score

Bank 1

2

Bank 2

2

Bank 3

1

Bank 4

1

Mobile operator 1

2

Mobile operator 2

1

The frequency distribution table of the additional physical access control to system holding sensitive data is given in the table 13 below.

Table 13: Frequency distribution of additional physical access control

Score

Frequency

Percentage

No / 1

3

50%

Not sure / 2

3

50%

 

6

100%

The table above shows that 100% of the assessed institutions don't have a strict physical access control mechanism on top of logical access controls for computers storing sensitive data. Even though unauthorized attempts to sensitive data are reported, strong physical access control mechanisms to computers systems holding sensitive data missed.

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Piètre disciple, qui ne surpasse pas son maitre !"   Léonard de Vinci