《电子商务-管理与社交网络视角(第八版)》Chapter10_第1页
《电子商务-管理与社交网络视角(第八版)》Chapter10_第2页
《电子商务-管理与社交网络视角(第八版)》Chapter10_第3页
《电子商务-管理与社交网络视角(第八版)》Chapter10_第4页
《电子商务-管理与社交网络视角(第八版)》Chapter10_第5页
已阅读5页,还剩38页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Chapter10E-CommerceSecurityandFraudIssuesandProtectionsLearningObjectivesUnderstandtheimportanceandscopeofsecurityofinformationsystemsforEC.DescribethemajorconceptsandterminologyofECsecurity.UnderstandaboutthemajorECsecuritythreats,vulnerabilities,andtechnicalattacks.UnderstandInternetfraud,phishing,andspam.Describetheinformationassurancesecurityprinciples.IdentifyandassessmajortechnologiesandmethodsforsecuringECaccessandcommunications.LearningObjectivesDescribethemajortechnologiesforprotectionofECnetworks.Describevarioustypesofcontrolsandspecialdefensemechanisms.Describeconsumerandsellerprotectionfromfraud.DiscussenterprisewideimplementationissuesforECsecurity.Understandwhyitissodifficulttostopcomputercrimes.TheInformation

SecurityProblem*InformationsecurityWhatIsECSecurity?TheStatusofComputerSecurityintheUnitedStatesPersonalSecurityNationalSecuritySecurityRisksfor2014and-2015MajorECSecurityManagementConcernsfor2011TheInformation

SecurityProblemCyberwarsandCyberespionageAcrossBordersCyberwarefareAttackingInformationSystemsTypesofAttacksCorporateespionagePoliticalespionageandwarfareTheInformation

SecurityProblemTheDriversofECSecurityProblemsTheInternet’sVulnerableDesignTheShifttoProfit-InducedCrimesTheIncreasedVolumeofWirelessActivitiesandtheNumberofMobileDevicesTheGlobalizationoftheAttackersThe*Darknet*InternetUndergroundEconomyTheInternetSilkRoad*Keystrokelogging(keylogging)TheExplosionofSocialNetworkingTheDynamicNatureofECSystemsandtheActsofInsidersTheSophisticationoftheAttacksTheCostofCyberCrimeBasicE-CommerceSecurityIssuesandLandscapeBasicSecurityTerminology*Businesscontinuityplan*Cybercrime*Cybercriminal*Exposure*Fraud*Malware(malicioussoftware)*Phishing*Risk*Socialengineering*Spam*Vulnerability*ZombieBasicE-CommerceSecurityIssuesandLandscapeTheECSecurityBattlegroundTheattacks,theattackers,andtheirstrategiesTheassetsthatarebeingattacked(thetargets)invulnerableareasThesecuritydefense,thedefenders,andtheirmethodsandstrategyTheECSecurityBattlegroundBasicE-CommerceSecurityIssuesandLandscapeTheThreats,Attacks,andAttackersUnintentionalThreatsHumanErrorEnvironmentalHazardsMalfunctionsintheComputerSystemIntentionalAttacksandCrimesTheCriminalsandMethods*Hacker*CrackerBasicE-CommerceSecurityIssuesandLandscapeTheTargetsoftheAttacksinVulnerableAreasVulnerableAreasAreBeingAttackedVulnerabilityInformationAttackingE-MailAttackingSmartphonesandWirelessSystemsTheVulnerabilityofRFIDChipsTheVulnerabilitiesinBusinessITandECSystemsPiratedVideos,Music,andOtherCopyrightedMaterialBasicE-CommerceSecurityIssuesandLandscapeECSecurityRequirements*Authentication*AuthorizationAuditingAvailability*NonrepudiationBasicE-CommerceSecurityIssuesandLandscapeTheDefense:Defenders,Strategy,andMethodsECDefenseProgramsandStrategy*ECsecuritystrategy*Deterrentmethods*Preventionmeasures*Detectionmeasures*Informationassurance(IA)PossiblePunishmentDefenseMethodsandTechnologiesRecoveryTechnicalMalwareAttackMethods:FromVirusestoDenialofServiceTechnicalandNontechnicalAttacks:AnOverviewTheMajorTechnicalAttackMethodsMalware(MaliciousCode):Viruses,Worms,andTrojanHorses*

Viruses*

WormsTheMajorTechnicalSecurityAttackMethodsTechnicalMalwareAttackMethods:FromVirusestoDenialofService*Macrovirus(macroworm)*TrojanhorseSomeRecentSecurityBugs:HeartbleedandCrytolocker*Denial-of-service(DoS)attackWebServerandWebPageHijacking*Pagehijacking*

BotnetsMalvertisingHowaComputerVirusCanSpreadNontechnicalMethods:FromPhishingtoSpamandFraudSocialEngineeringandFraudSocialPhishing*Phishing*PharmingFraudandScamsonTheInternetExamplesofTypicalOnlineFraudAttacksE-MailScamsTop10AttacksandRemedies*IdentityTheftandIdentifyFraudCyberBankRobberiesSocialEngineering:FromPhishingtoFinancialFraudandCrimeHowPhishingIsAccomplishedNontechnicalMethods:FromPhishingtoSpamandFraudSpamAttacks*E-mailspamTypicalExamplesofSpamming*SpywareSocialNetworkingMakesSocialEngineeringEasyHowHackersAreAttackingSocialNetworksSpaminSocialNetworksandintheWeb2.0Environment*Searchenginespam*Splog*DataBreach(Leak)TheInformationAssuranceModelAndDefenseStrategyConfidentiality,Integrity,andAvailability*Confidentiality*Integrity*AvailabilityAuthentication,Authorization,andNonrepudiationTheInformationAssuranceModelAndDefenseStrategyE-CommerceSecurityStrategyThePhasesofSecurityDefensePreventionanddeterrence(preparation)InitialresponseDetectionContainment(containthedamage)EradicationRecoveryCorrectionAwarenessandcomplianceSecuritySpendingVersusNeedsGapE-CommerceSecurityStrategyFrameworkTheInformationAssuranceModelAndDefenseStrategyTheDefenseSideofECSystemsDefendingaccesstocomputingsystems,dataflow,andECtransactionsDefendingECnetworksGeneral,administrative,andapplicationcontrolsProtectionagainstsocialengineeringandfraudDisasterpreparation,businesscontinuity,andriskmanagementImplementingenterprisewidesecurityprogramsConductavulnerabilityassessmentandapenetrationtestAssessingVulnerabilitiesandSecurityNeeds*Vulnerabilityassessment*Penetrationtest(pentest)TheDefenseI:AccessControl,Encryption,andPKI*AccessControlAuthorizationandAuthenticationBiometricSystems*Biometricauthentication*BiometricsystemsEncryptionandtheOne-Key(Symmetric)System*Encryption*Plaintext*Ciphertext*Encryptionalgorithm*Key(keyvalue)*Keyspace*Symmetric(Private)KeyEncryptionSymmetric(Private)KeyEncryptionTheDefenseI:AccessControl,Encryption,andPKI*Publickeyinfrastructure(PKI)*Public(asymmetric)keyencryption*Publickey*PrivatekeyThePKIProcess:DigitalSignaturesandCertificateAuthorities*Digitalsignatures*Hashfunction*Messagedigest*Digitalenvelope*Certificateauthorities(CAs)SecureSocketLayer(SSL)OtherTopicsandMethodsofDefenseDigitalSignatureTheDefenseII:SecuringE-CommerceNetworks*Firewalls*PacketsTheDualFirewallArchitecture:TheDMZ*PersonalFirewalls*Virtualprivatenetwork(VPN)*Protocoltunneling*IntrusionDetectionSystems

(IDS)CloudComputingPreventsDoSAttacksHoneynetsandHoneypots*Honeynet*HoneypotsE-MailSecurityTheTwoFirewalls:DMZArchitectureTheDefenseIII:GeneralControls,Spam,PopUps,Fraud,AndSocialEngineeringControls*Generalcontrols*ApplicationcontrolsGeneral,Administrative,andOtherControlsPhysicalControlsAdministrativeControlsProtectingAgainstSpam*CAN-SPAMActMajorDefenseControlsTheDefenseIII:GeneralControls,Spam,PopUps,Fraud,AndSocialEngineeringControlsProtectingYourComputerfromPop-UpAdsToolsforStoppingoratLeastMinimizingPop-UpsProtectingagainstOtherSocialEngineeringAttacksProtectingagainstPhishingProtectingagainstMalvertisingProtectingAgainstSpywareProtectingAgainstCyberwarsTheDefenseIII:GeneralControls,Spam,PopUps,Fraud,AndSocialEngineeringControlsFraudProtectionBusinessContinuity,DisasterRecovery,andRiskManagementRisk-ManagementandCost-BenefitAnalysisBusinessContinuityServicesandITRecoveryProcessImplementingEnterprisewideE-CommerceSecurityTheDriversofECSecurityManagementSeniorManagementCommitmentandSupportECSecurityPoliciesandTrainingCyberThreatIntelligence(CTI)ECRiskAnalysisandEthicalIssues*Businessimpactanalysis(BIA)EthicalIssuesEnterprisewide

ECSecurityandPrivacyModelImplementingEnterprisewideE-CommerceSecurityWhyIsItDifficulttoStopInternetCrime?MakingShoppingInconvenientLackofCooperationbyBusinessPa

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论