CYBER SECURITY
Computer security, also known as cyber security or IT security,
is the protection of information systems from theft or damage to the
hardware, the software, and to the information on them, as well as from
disruption or misdirection of the services they provide.
Cyber-safety
is a common term used to describe a set of practices, measures and/or actions
you can take to protect personal information and your computer from
attacks.
PAST, PRESENT OF CYBER SECURITY
- Cyber security is a young and immature field
- The attackers are more innovative than defenders
- Defenders are mired in FUD (fear, uncertainty and doubt) and fairy tales
- Attack back is illegal or classified
FUTURE OF CYBER SECURITY
- Cyber security will become a scientific discipline
- Cyber security will be application and technology eccentric
- Cyber security will never be “solved” but will be “managed”
- Attack back will be a integral part of cyber security
Types of computer-related crimes.
- Identity Theft
- Transmitting child pornography
- Theft of intellectual property
- Cyber-stalking
- Unlawful coping and distribution of computer programs
- Unauthorized access to computer (s)
- Computer sabotage
- Computer forgery
- Bank card fraud
- Credit card fraud etc
E-Commerce Security
E-commerce revenue is constantly increasing, but the number of fraud
cases, as well as the percentage of fraud in online transactions, is
increasing faster still. What types of fraud exist and more
importantly how can we protect ourselves against them?
Card-based payments - Internet payment fraud is constantly increasing, and is, apparently,
unstoppable. The number of fraud cases has increased by 19 percent compared to 2013. Fraud is not exclusive to credit card payments, however. Criminals are
becoming more sophisticated in their use of malware to command online
banking logins via phones, tablets and computers, using the stolen bank
account details to make fraudulent payments.
Identity Theft - In traditional identity theft, the criminals’ goal is to carry out
transactions using a different identity. Instead of having to come up
with a completely new identity to do this, they simply take over an
existing one. This is easier to do—and usually much faster. In order to commit identity theft or appropriate someone’s identity,
fraudsters target personal information, such as names, addresses and
email addresses, as well as credit card or account information. This
enables them, for example, to order items online under a false name and
pay using someone else’s credit card information or by debiting another
person’s account.
Friendly Fraud - using this method, customers order goods or services and pay for them –
preferably using a “pull” payment method like a credit card or direct
debit. Then, however, they deliberately initiate a chargeback, claiming
that their credit card or account details were stolen. They are reimbursed—but they keep the goods or services. This fraud method is
particularly prevalent with services, such as those in the gambling or
adult milieus. Friendly fraud also tends to be combined with
re-shipping. This is where criminals who use stolen payment data to pay
for their purchases don’t want to have them sent to their home
addresses. Instead, they use middlemen whose details are used to make
the purchases and who then forward the goods.
Clean Fraud - The basic principle of clean fraud is that a stolen credit card is used
to make a purchase, but the transaction is then manipulated in such a
way that fraud detection functions are circumvented. Much more know-how
is required here than with friendly fraud, where the only goal is to
cancel the payment once a purchase has been made. In clean fraud,
criminals use sound analyses of the fraud detection systems deployed,
plus a great deal of knowledge about the rightful owners of their stolen
credit cards. A great deal of correct information is then entered
during the payment process so that the fraud detection solution is
fooled. Before clean fraud is committed, card testing is often carried
out. This involves making cheap test purchases online to check that the
stolen credit card data works.
Affiliate Fraud - There are two variations of affiliate fraud, both of which have the same
aim: to glean more money from an affiliate program by manipulating
traffic or signup statistics. This can be done either using a fully
automated process or by getting real people to log into merchants’ sites
using fake accounts. This type of fraud is payment-method-neutral, but
extremely widely distributed.
Triangulation Fraud - During triangulation fraud, the fraud is carried out via three points.
The first is a fake online storefront, which offers high-demand goods at
extremely low prices. In most cases, additional bait is added, like the
information that the goods will only be shipped immediately if the
goods are paid for using a credit card. The falsified shop collects
address and credit card data – this is its only purpose. The second
corner of the fraud triangle involves using other stolen credit card
data and the name collected to order goods at a real store and ship them
to the original customer. The third point in the fraud triangle
involves using the stolen credit card data to make additional purchases.
The order data and credit card numbers are now almost impossible to
connect, so the fraud usually remains undiscovered for a longer period
of time, resulting in greater damages.
Merchant Fraud - It’s very simple: goods are offered at cheap prices, but are never
shipped. The payments are, of course, kept. This method of fraud also
exists in wholesale. It is not specific to any particular payment
method, but this is, of course, where no-chargeback payment methods
(most of the push payment types) come into their own.
Taking into account the weak security due to the lack of two-factor
authentication amongst almost all online services, the problem is only
going to get worse until there is a more rigorous standard adopted. This
security standard for e-Commerce vendors would remediate the online
risks of doing business with vendors of every size, and be mediated by
the government, the credit card companies, or both.
10 tips for preventing breaches and hacks and keeping customer data safe for E-Commerce platforms
1. Educate employees on cyber security
2. Make sure your hosting company is a trusted provider for hosting services
3. Use a secure ecommerce platform.
4. Deploy SSL encryption.
5. Make sure your ecommerce site is PCI DSS compliant.
6. Utilize Web Application Firewalls (WAFs).
7. Have employees regularly change their passwords
8. Use multi-factor authentication.
9. Keep up-to-date on security patches, especially for open source platforms
10. Make sure to back up your site regularly.
Excellent and very cool idea and the subject at the top of magnificence and I am happy to this post..Interesting post! Thanks for writing it. What's wrong with this kind of post exactly? It follows your previous guideline for post length as well as clarity..
ReplyDeleteCorporate Training in Chennai
Thank you. Privacy and security issues is the next frontier in technology
DeleteWhat an awesome post, I just read it from start to end. Learned something new after a long time.
ReplyDeleteSAP SD training in Chennai
ya it is really i had a fun and auspicious time by reading your blog thus it makes me to be proud to get many more credentials. thus i had a good time with your blog it attracts me with large types of collections.
ReplyDeleteBest Informatica Training Institute in Chennai
ReplyDeleteReally very nice blog information for this one and more technical skills are improve,i like that kind of post.
Best Java J2ee training institutes in chennai
Thank you for taking time to read. A career development in IT is the best.
ReplyDeleteThanks Suseela for suggesting my blog will be doing my next update on "BITCOIN-The faith-based currency"
ReplyDeleteSuperb i really enjoyed very much with this article here. Really its a amazing article i had ever read. I hope it will help a lot for all. Thank you so much for this amazing posts and please keep update like this excellent article.
ReplyDeleteBest Dental Clinic In Vellore
I simply want to tell you that I’m all new to blogs and truly liked you’re blog site. Very likely I’m likely to bookmark your site .You surely come with remarkable articles. Cheers for sharing your website page.
ReplyDeleteMSBI Training in Chennai
Great post! I am see the programming coding and step by step execute the outputs.I am gather this coding more information. It's helpful for me my friend. Also great blog here with all of the valuable information you have.
ReplyDeleteHouse Cleaning Service in Chennai
Really make an impression the way Ilinktours.com. Supportive staff all ways Makkah to Madinah, Nice accommodation during the hajj, although I was not feeling well, terrible fever, but I Link Tours staff cares me a lot, very supportive staff.. Thanks hajj accommodation
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteI am really very happy to find this particular site. I just wanted to say thank you for this huge read!! I absolutely enjoying every petite bit of it and I have you bookmarked to test out new substance you post.
ReplyDeleteangularjs interview questions and answers
angularjs-Training in pune
angularjs Training in bangalore
angularjs Training in bangalore
angularjs Training in chennai
Well you use a hard way for publishing, you could find much easier one!
ReplyDeleteangularjs interview questions and answers
angularjs-Training in pune
angularjs Training in bangalore
angularjs Training in bangalore
angularjs Training in chennai
I am really impressed with your efforts and really pleased to visit this post.
ReplyDeleteonline Python training
python training in chennai
This blog is the general information for the feature. You got a good work for these blog.We have a developing our creative content of this mind.Thank you for this blog. This for very interesting and useful.
ReplyDeleteJava training in Chennai | Java training in Omr
Oracle training in Chennai
Java training in Chennai | Java training in Annanagar
Java training in Chennai | Java training institute in Chennai | Java course in Chennai
Superb. I really enjoyed very much with this article here. Really it is an amazing article I had ever read. I hope it will help a lot for all. Thank you so much for this amazing posts and please keep update like this excellent article. thank you for sharing such a great blog with us.
ReplyDeleteData Science training in rajaji nagar | Data Science Training in Bangalore
Data Science with Python training in chennai
Data Science training in electronic city
Data Science training in USA
Data science training in pune
ReplyDeleteWhoa! I’m enjoying the template/theme of this website. It’s simple, yet effective. A lot of times it’s very hard to get that “perfect balance” between superb usability and visual appeal. I must say you’ve done a very good job with this.
Advanced AWS Training in Bangalore | Best Amazon Web Services Training Institute in Bangalore
Advanced AWS Training Institute in Pune | Best Amazon Web Services Training Institute in Pune
Advanced AWS Online Training Institute in india | Best Online AWS Certification Course in india
ReplyDeleteWhoa! I’m enjoying the template/theme of this website. It’s simple, yet effective. A lot of times it’s very hard to get that “perfect balance” between superb usability and visual appeal. I must say you’ve done a very good job with this.
Advanced AWS Training in Bangalore | Best Amazon Web Services Training Institute in Bangalore
Advanced AWS Training Institute in Pune | Best Amazon Web Services Training Institute in Pune
Advanced AWS Online Training Institute in india | Best Online AWS Certification Course in india
All are saying the same thing repeatedly, but in your blog I had a chance to get some useful and unique information, I love your writing style very much, I would like to suggest your blog in my dude circle, so keep on updates.
ReplyDeletePython Online training
python Training in Chennai
Python training in Bangalore
All are saying the same thing repeatedly, but in your blog I had a chance to get some useful and unique information, I love your writing style very much, I would like to suggest your blog in my dude circle, so keep on updates.
ReplyDeleteData Science Course in Indira nagar
Data Science Course in btm layout
Data Science course in Indira nagar
Data Science Course in Marathahalli
Data Science Course in BTM Layout
Data science course in bangalore
Thank you for sharing such a nice post!
ReplyDeleteLooking for Best Training Institute in Bangalore , India. Softgen Infotech is the best one to offers 85+ computer training courses including IT Software Course in Bangalore , India. Also, it provides placement assistance service in Bangalore for IT.
Such a great word which you use in your article and article is amazing knowledge. thank you for sharing it.
ReplyDeleteLearn SAP from the Industry Experts we bridge the gap between the need of the industry. eTechno Soft Solutions provide the Best IT Training in Bangalore .
Hai, this article is very informative..waiting for future updates.
ReplyDeleteJava training in Chennai | Certification | Online Course Training | Java training in Bangalore | Certification | Online Course Training | Java training in Hyderabad | Certification | Online Course Training | Java training in Coimbatore | Certification | Online Course Training | Java training in Online | Certification | Online Course Training
An effective setup could be venues providing testing infrastructure and sending data to the event app. event marketing and post conference email
ReplyDeleteI have truly enjoyied reading through your nicely written post. It looks like you spend a great deal of effort and time on your blog. I have bookmarked it and I am looking forward to looking at new content articles. Keep up the good work! security management services charlotte
ReplyDelete