tailieunhanh - Lecture E-commerce (7/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver
Chapter 5 - Online security and payment systems. The topics discussed in this chapter are: What is the difference between hacking and cyberwar? Why has cyberwar become more potentially devastating in the past decade? What percentage of computers have been compromised by stealth malware programs? Will a political solution to MAD be effective enough? | E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. seventh edition Copyright © 2011 Pearson Education, Inc. Copyright © 2010 Pearson Education, Inc. Slide 5- Chapter 5 Online Security and Payment Systems Copyright © 2011 Pearson Education, Inc. Cyberwar: Mutually Assured Destruction Class Discussion What is the difference between hacking and cyberwar? Why has cyberwar become more potentially devastating in the past decade? What percentage of computers have been compromised by stealth malware programs? Will a political solution to MAD be effective enough? Slide 5- The E-commerce Security Environment Overall size and losses of cybercrime unclear Reporting issues 2009 CSI survey: 49% of respondent firms detected security breach in last year Of those that shared numbers, average loss $288,000 Underground economy marketplace: Stolen information stored on underground economy servers Slide 5- Types of Attacks Against Computer Systems (Cybercrime) Slide 5- Figure , Page 266 SOURCE: Based on data from Computer Security Institute, 2009 What Is Good E-commerce Security? To achieve highest degree of security New technologies Organizational policies and procedures Industry standards and government laws Other factors Time value of money Cost of security vs. potential loss Security often breaks at weakest link Slide 5- The E-commerce Security Environment Figure , Page 269 Slide 5- Table , Page 270 Slide 5- The Tension Between Security and Other Values Ease of use: The more security measures added, the more difficult a site is to use, and the slower it becomes Public safety and criminal uses of the Internet Use of technology by criminals to plan crimes or threaten nation-state Slide 5- Security Threats in the E-commerce Environment Three key points of vulnerability: Internet communications channels Server level Client level Slide 5- A Typical E-commerce . | E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. seventh edition Copyright © 2011 Pearson Education, Inc. Copyright © 2010 Pearson Education, Inc. Slide 5- Chapter 5 Online Security and Payment Systems Copyright © 2011 Pearson Education, Inc. Cyberwar: Mutually Assured Destruction Class Discussion What is the difference between hacking and cyberwar? Why has cyberwar become more potentially devastating in the past decade? What percentage of computers have been compromised by stealth malware programs? Will a political solution to MAD be effective enough? Slide 5- The E-commerce Security Environment Overall size and losses of cybercrime unclear Reporting issues 2009 CSI survey: 49% of respondent firms detected security breach in last year Of those that shared numbers, average loss $288,000 Underground economy marketplace: Stolen information stored on underground economy servers Slide 5- Types of Attacks Against .
đang nạp các trang xem trước