Task 4 - Report of The Security Issues
Task 4 - Report of The Security Issues
1.0 Introduction
However, immediately after the emergence of internet, the battle between angels and
devils - ‘Internet Users/Programmers Versus Conmen/Hackers’ has never been
alleviated, but only to evolve into higher level in every minute. In spite of all the
positives, there are some downsides of E-commerce. Hackers can attack websites at
will from anywhere in the world. They can deface WebPages, knock a site down with
a denial of Service (DoS) attack, or penetrate the web servers (Smith, 2004). In many
case, they can download credit card and other sensitive information to use in frauds or
simply to embarrass an organization. They can also plant viruses and Trojan programs
on the machines, install back doors, and steal client passwords (Smith, 2004).
1. Authenticity and validity: It means that the transaction identity must be real
and applicable.
2. Integrity: The action to prevent the information from being created, modified
and deleted as well as avoid the loss and repetition of the information during
the
3. Confidentiality: it is indispensable to take suitable security solutions to prevent
the commercial secret revelation.
4. Reliability and non-repudiation: to guarantee validated users’ access to the
information and the resources will not be rejected
Before developing a e-commerce platform, Razvan and Eduard (2010) suggested that
the company must take an overview on the service-side problems, transaction
problems, client-side problems and legal and regulatory problems which may appear
in the transactions (Razvan and Eduard, 2010). Transaction issue is essential for
building consumer confidence in an E-commerce site. Transaction issues include the
organization’s ability to ensure privacy, authenticity, integrity, availability and the
blocking of unwanted intrusions (Marchany and Tront, 2002).
According to Turban et al (2008), the attacks in the E-commerce world can be divided
into two types – nontechnical and technical. Example of nontechnical attacks is
‘Social engineering’ is a type of attack that uses some tricks to make users into
disclosing private information or performing an action that compromises a computer
or network. For instance, phishing could rely on social engineering by posting links of
fake websites on the social networks.
Software and systems knowledge are used to impose technical attacks (Turban et al,
2008). These attacks can be classified into several types which are: Denial of service,
Zombies, phishing, web server hijacking, virus, worm, spyware and etc. For
examples, a malicious spyware may work behind a user’s computer for certain
purpose.
DoS can make a particular website running at a very low speed and condemn the
availability. For example of one of the attacking style, ICMP Flood (Smurf Attack) –
where perpetrators will send large numbers of IP packets with the source address
faked to appear to be the address of the victim. The network's bandwidth is quickly
used up, preventing legitimate packets from getting through to their destination.
Distributed Denial of Service (DDoS) attacks are the greatest security fear for –
commerce owners. Within a few minutes, tons of zombie computers can flood the
victim website by choking legitimate traffic (Tariq et al., 2006). A distributed denial
of service attack (DDoS) occurs when multiple compromised systems flood the
bandwidth or resources of a targeted system, usually one or more web servers. The
most famous DDoS attacks occurred in February 2000 where websites including
Yahoo, Buy.com, eBay, Amazon and CNN were attacked and left unreachable for
These can be done by using server redirecting technique. The unsuspecting users will
be control and redirected to a scam or phishing site. This exploit allows any Web
master such as the criminal to have his or her “virtual page’ rank for pages belonging
to the original ones (Turban et al, 2008).
The technology that helps securing the E-commerce can be divided into two major
groups which are: those designed to secure the communication across the network and
those to protect the servers and clients on the network (Turban et al, 2008).
Network is the basis for E-commerce systems, so the network service layer is the first
of E-commerce security system. Secondly, encryption and authentication methods are
the essential to ensure the E-commerce security. Thirdly, the security protocol layer is
the comprehensive use and perfect for encryption technology and security control
technology. The various layers are interdependent and interrelated and they achieve
the security of E-commerce systems together (Qingping et al, 2009).
4.0 Conclusion
To solve the security problem of E-commerce and develop a sound E-commerce
security system, security technology alone is not enough. E-commerce regulation and
law, social credibility as well as the ethics and education standards throughout society
are influential to the business. Therefore, it is essential for the E-commerce owners to
regularly update their system and expertise to ensure that the system is always
keeping up to the opponents – hackers and scammers.