WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

E-commerce capabilities assessment: -security of e-payment systems- case of the democratic republic of congo

( Télécharger le fichier original )
par Espérant Ngongo Mbuli
University of Walles - Master in Advanced information technology and Business Management 2013
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

II.7.2.6 Overview of the security of the communication channel

Data packets flowing to the internet are not using the same path to reach the server. Information sent over the net can be intercepted, altered or deleted before it can reach the receiver.

E-commerce will face integrity, confidentiality and availability threat inherent to the nature of the Internet as communication channel.

Confidentiality threat

The main concern of confidentiality is to make sure that information is protected against unauthorized disclosure, while the privacy is concerned by the legal instrument and policy to ensure the protection of private information.

The theft of sensitive information or personal data such as credit card number, names, and addresses is one of the most important threats for e-commerce. Therefore, e-commerce infrastructure must address this threat with highest priority.

One of the technology solutions used to ensure data confidentiality is the encryption tools and solutions.

What is the encryption?

In this study, the definition given by G. Schneider (2011, p465) is considered: «Encryption is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible».

Encrypted information can travel around the internet to ensure that it can't be disclosed easily.

Page | 24

Integrity threats

An integrity threat appears when information or data can be object of unauthorized modification, alteration, creation or deletion.

Cyber vandalism is one of the examples of integrity violation because it destroys or modifies information on existing web sites.

Integrity prevention can be achieved by intrusion detection systems which monitor suspicious activity on the network or computer to prevent unauthorized access to information stored on the system or transmitted on the network.

Availability threats

Turban et al. (2006, p517) defines availability as «assurance that access to data, website, or other electronic commerce data service is timely, available, reliable, and restricted to authorized users».

The availability threat consists of all events which cause delay or deny access to data. The most known is the Denial-of-Service (DOS) attack which trouble normal operation of a computer or server and can conduct on abnormal slowness of the server, network or electronic systems such as Automated Teller Machine (ATM).

E-payment systems must be protected by IDS or Firewall able to stop these kinds of attacks.

Authentication, authorization and non repudiation

To conclude on the communication channels, it is clearly described in the previous sections that e-commerce relies on the confidentiality, integrity and availability (CIA) of information and the business web site (Turban et al., 2008, p. 517).

These functions depend on the authentication which is a process to «assure the real identity of an entity which can be a user computer, program, website or any Information resource (Turban et al. 2008, p 517).

Authorization is the process of ensuring that the authenticated entity has been granted rights to access resource and which operations it'll perform on it.

The non repudiation will ensure that authenticated entity cannot falsely deny action it conducts online.

For e-commerce perspective non repudiation will be the «assurance that online customers or trading partners cannot falsely deny (repudiate) their purchases or transactions». (Turban et al, 2008, p518).

Page | 25

Threats to physical security of the internet communication channels The packet-switching infrastructure permits to have many links to the internet.

In case of physical attack to one of the link; data packets will be routed to another link to the internet.

For e-commerce business the countermeasure to this threat will be to use redundant links to different Internet Service Providers (ISPs) which in their turn have many different links to internet.

Threat to Wireless network

Wireless access points (WAP) provide network connectivity to computer (mostly laptops) and other mobile devices within a short range of hundred meters to access to a shared resource, in the case of this study, the internet.

If the wireless access point is not protected, anyone can connect to the network and gain access to the resources on the network.

The security on wireless is implemented via a wireless encryption protocol (WEP) which permits to encrypt and decrypt data over wireless transmission.

Threat to server computer

There is no system which can be hundred percent secured, even if strong security policies and measures are implemented, web servers will have vulnerabilities which can be exploited to compromise them.

The confidentiality can be compromised by the web server itself if it allows automatic display of directory listings and the folder names are revealed to the web browser. (G. Schneider, 2011, p.474).

Web servers are connected to back-end storage server (database servers) where valuable information about products and customers are stored; in case of unauthorized access, that information can be disclosed.

Modern database management systems (DBMS) have security features to authenticate users. This login information can be stolen by hidden malicious programs installed by hackers in the servers.

Also, some organization will keep default DBMS credentials which are provided by the editor; this will keep a security hole to the database which can be exploiting by the hackers.

Page | 26

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Il existe une chose plus puissante que toutes les armées du monde, c'est une idée dont l'heure est venue"   Victor Hugo