Thursday, 5 May 2016

EMBARCING CYBER SECURITY

CYBER SECURITY

Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. 
Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks. 
  
PAST, PRESENT OF CYBER SECURITY
  • Cyber security is a young and immature field
  • The attackers are more innovative than defenders
  • Defenders are mired in FUD (fear, uncertainty and doubt) and fairy tales
  • Attack back is illegal or classified
FUTURE OF CYBER SECURITY
  • Cyber security will become a scientific discipline
  • Cyber security will be application and technology eccentric
  • Cyber security will never be “solved” but will be “managed”
  • Attack back will be a integral part of cyber security
 
http://www.techtodaystuff.com/wp-content/uploads/2016/01/protection-cybersecurity-2.jpg?8250cd


Types of computer-related crimes.
  • Identity Theft
  • Transmitting child pornography
  • Theft of intellectual property 
  • Cyber-stalking 
  • Unlawful coping and distribution of computer programs 
  • Unauthorized access to computer (s)
  • Computer sabotage 
  • Computer forgery 
  • Bank card fraud
  • Credit card fraud etc

E-Commerce Security

E-commerce revenue is constantly increasing, but the number of fraud cases, as well as the percentage of fraud in online transactions, is increasing faster still. What types of fraud exist and more importantly how can we protect ourselves against them?
 data breach hacker
Card-based paymentsInternet payment fraud is constantly increasing, and is, apparently, unstoppable. The number of fraud cases has increased by 19 percent compared to 2013. Fraud is not exclusive to credit card payments, however. Criminals are becoming more sophisticated in their use of malware to command online banking logins via phones, tablets and computers, using the stolen bank account details to make fraudulent payments.

Identity Theft -  In traditional identity theft, the criminals’ goal is to carry out transactions using a different identity. Instead of having to come up with a completely new identity to do this, they simply take over an existing one. This is easier to do—and usually much faster. In order to commit identity theft or appropriate someone’s identity, fraudsters target personal information, such as names, addresses and email addresses, as well as credit card or account information. This enables them, for example, to order items online under a false name and pay using someone else’s credit card information or by debiting another person’s account.

Friendly Fraud - using this method, customers order goods or services and pay for them – preferably using a “pull” payment method like a credit card or direct debit. Then, however, they deliberately initiate a chargeback, claiming that their credit card or account details were stolen. They are reimbursed—but they keep the goods or services. This fraud method is particularly prevalent with services, such as those in the gambling or adult milieus. Friendly fraud also tends to be combined with re-shipping. This is where criminals who use stolen payment data to pay for their purchases don’t want to have them sent to their home addresses. Instead, they use middlemen whose details are used to make the purchases and who then forward the goods.

 
 Clean Fraud -  The basic principle of clean fraud is that a stolen credit card is used to make a purchase, but the transaction is then manipulated in such a way that fraud detection functions are circumvented. Much more know-how is required here than with friendly fraud, where the only goal is to cancel the payment once a purchase has been made. In clean fraud, criminals use sound analyses of the fraud detection systems deployed, plus a great deal of knowledge about the rightful owners of their stolen credit cards. A great deal of correct information is then entered during the payment process so that the fraud detection solution is fooled. Before clean fraud is committed, card testing is often carried out. This involves making cheap test purchases online to check that the stolen credit card data works.

Affiliate Fraud - There are two variations of affiliate fraud, both of which have the same aim: to glean more money from an affiliate program by manipulating traffic or signup statistics. This can be done either using a fully automated process or by getting real people to log into merchants’ sites using fake accounts. This type of fraud is payment-method-neutral, but extremely widely distributed.

Triangulation Fraud - During triangulation fraud, the fraud is carried out via three points. The first is a fake online storefront, which offers high-demand goods at extremely low prices. In most cases, additional bait is added, like the information that the goods will only be shipped immediately if the goods are paid for using a credit card. The falsified shop collects address and credit card data – this is its only purpose. The second corner of the fraud triangle involves using other stolen credit card data and the name collected to order goods at a real store and ship them to the original customer. The third point in the fraud triangle involves using the stolen credit card data to make additional purchases. The order data and credit card numbers are now almost impossible to connect, so the fraud usually remains undiscovered for a longer period of time, resulting in greater damages.

Merchant Fraud - It’s very simple: goods are offered at cheap prices, but are never shipped. The payments are, of course, kept. This method of fraud also exists in wholesale. It is not specific to any particular payment method, but this is, of course, where no-chargeback payment methods (most of the push payment types) come into their own.

Taking into account the weak security due to the lack of two-factor authentication amongst almost all online services, the problem is only going to get worse until there is a more rigorous standard adopted. This security standard for e-Commerce vendors would remediate the online risks of doing business with vendors of every size, and be mediated by the government, the credit card companies, or both.

10 tips for preventing breaches and hacks and keeping customer data safe for E-Commerce platforms 

1. Educate employees on cyber security
2. Make sure your hosting company is a trusted provider for hosting services 
3. Use a secure ecommerce platform.
4. Deploy SSL encryption.
5. Make sure your ecommerce site is PCI DSS compliant.
6. Utilize Web Application Firewalls (WAFs).
7. Have employees regularly change their passwords
8. Use multi-factor authentication. 
9. Keep up-to-date on security patches, especially for open source platforms
10. Make sure to back up your site regularly.        
 


26 comments:

  1. Excellent and very cool idea and the subject at the top of magnificence and I am happy to this post..Interesting post! Thanks for writing it. What's wrong with this kind of post exactly? It follows your previous guideline for post length as well as clarity..

    Corporate Training in Chennai

    ReplyDelete
    Replies
    1. Thank you. Privacy and security issues is the next frontier in technology

      Delete
  2. What an awesome post, I just read it from start to end. Learned something new after a long time.


    SAP SD training in Chennai

    ReplyDelete
  3. ya it is really i had a fun and auspicious time by reading your blog thus it makes me to be proud to get many more credentials. thus i had a good time with your blog it attracts me with large types of collections.




    Best Informatica Training Institute in Chennai

    ReplyDelete

  4. Really very nice blog information for this one and more technical skills are improve,i like that kind of post.

    Best Java J2ee training institutes in chennai

    ReplyDelete
  5. Thank you for taking time to read. A career development in IT is the best.

    ReplyDelete
  6. Thanks Suseela for suggesting my blog will be doing my next update on "BITCOIN-The faith-based currency"

    ReplyDelete
  7. Superb i really enjoyed very much with this article here. Really its a amazing article i had ever read. I hope it will help a lot for all. Thank you so much for this amazing posts and please keep update like this excellent article.

    Best Dental Clinic In Vellore

    ReplyDelete
  8. I simply want to tell you that I’m all new to blogs and truly liked you’re blog site. Very likely I’m likely to bookmark your site .You surely come with remarkable articles. Cheers for sharing your website page.

    MSBI Training in Chennai

    ReplyDelete
  9. Great post! I am see the programming coding and step by step execute the outputs.I am gather this coding more information. It's helpful for me my friend. Also great blog here with all of the valuable information you have.
    House Cleaning Service in Chennai



    ReplyDelete
  10. Really make an impression the way Ilinktours.com. Supportive staff all ways Makkah to Madinah, Nice accommodation during the hajj, although I was not feeling well, terrible fever, but I Link Tours staff cares me a lot, very supportive staff.. Thanks hajj accommodation

    ReplyDelete
  11. This comment has been removed by the author.

    ReplyDelete
  12. I am really very happy to find this particular site. I just wanted to say thank you for this huge read!! I absolutely enjoying every petite bit of it and I have you bookmarked to test out new substance you post.

    angularjs interview questions and answers

    angularjs-Training in pune

    angularjs Training in bangalore

    angularjs Training in bangalore

    angularjs Training in chennai

    ReplyDelete
  13. I am really impressed with your efforts and really pleased to visit this post.
    online Python training
    python training in chennai

    ReplyDelete
  14. This blog is the general information for the feature. You got a good work for these blog.We have a developing our creative content of this mind.Thank you for this blog. This for very interesting and useful.
    Java training in Chennai | Java training in Omr

    Oracle training in Chennai

    Java training in Chennai | Java training in Annanagar

    Java training in Chennai | Java training institute in Chennai | Java course in Chennai

    ReplyDelete
  15. Superb. I really enjoyed very much with this article here. Really it is an amazing article I had ever read. I hope it will help a lot for all. Thank you so much for this amazing posts and please keep update like this excellent article. thank you for sharing such a great blog with us.
    Data Science training in rajaji nagar | Data Science Training in Bangalore
    Data Science with Python training in chennai
    Data Science training in electronic city
    Data Science training in USA
    Data science training in pune

    ReplyDelete

  16. Whoa! I’m enjoying the template/theme of this website. It’s simple, yet effective. A lot of times it’s very hard to get that “perfect balance” between superb usability and visual appeal. I must say you’ve done a very good job with this.

    Advanced AWS Training in Bangalore | Best Amazon Web Services Training Institute in Bangalore
    Advanced AWS Training Institute in Pune | Best Amazon Web Services Training Institute in Pune
    Advanced AWS Online Training Institute in india | Best Online AWS Certification Course in india

    ReplyDelete

  17. Whoa! I’m enjoying the template/theme of this website. It’s simple, yet effective. A lot of times it’s very hard to get that “perfect balance” between superb usability and visual appeal. I must say you’ve done a very good job with this.

    Advanced AWS Training in Bangalore | Best Amazon Web Services Training Institute in Bangalore
    Advanced AWS Training Institute in Pune | Best Amazon Web Services Training Institute in Pune
    Advanced AWS Online Training Institute in india | Best Online AWS Certification Course in india

    ReplyDelete
  18. All are saying the same thing repeatedly, but in your blog I had a chance to get some useful and unique information, I love your writing style very much, I would like to suggest your blog in my dude circle, so keep on updates.
    Python Online training
    python Training in Chennai
    Python training in Bangalore

    ReplyDelete
  19. All are saying the same thing repeatedly, but in your blog I had a chance to get some useful and unique information, I love your writing style very much, I would like to suggest your blog in my dude circle, so keep on updates.
    Data Science Course in Indira nagar
    Data Science Course in btm layout
    Data Science course in Indira nagar
    Data Science Course in Marathahalli
    Data Science Course in BTM Layout
    Data science course in bangalore

    ReplyDelete
  20. Thank you for sharing such a nice post!

    Looking for Best Training Institute in Bangalore , India. Softgen Infotech is the best one to offers 85+ computer training courses including IT Software Course in Bangalore , India. Also, it provides placement assistance service in Bangalore for IT.

    ReplyDelete
  21. Such a great word which you use in your article and article is amazing knowledge. thank you for sharing it.

    Learn SAP from the Industry Experts we bridge the gap between the need of the industry. eTechno Soft Solutions provide the Best IT Training in Bangalore .

    ReplyDelete
  22. An effective setup could be venues providing testing infrastructure and sending data to the event app. event marketing and post conference email

    ReplyDelete
  23. I have truly enjoyied reading through your nicely written post. It looks like you spend a great deal of effort and time on your blog. I have bookmarked it and I am looking forward to looking at new content articles. Keep up the good work! security management services charlotte

    ReplyDelete