Cyber Security Module 4 Notes
Cyber Security Module 4 Notes
1) What is E-Commerce?
E-commerce is a trading of goods and services with the help of telecommunication and
internet.
E-Commerce or Electronic Commerce means buying and selling of goods, products, or
services over the internet.
E-commerce is also known as electronic commerce or internet commerce.
Transaction of money, funds, and data are also considered as E-commerce.
These business transactions can be done in four ways: Business to Business (B2B), Business
to Customer (B2C), Customer to Customer (C2C), Customer to Business (C2B).
Page 1
3) Explain Elements of E-Commerce security?
1. Encryption:
Encrypting data ensures that sensitive information like credit card details,
personal information, and transaction data is encoded during transmission.
Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols
are commonly used to encrypt data.
2. Secure Payment Gateways: Using trusted and secure payment gateways ensures that
financial information is transmitted securely between the customer, merchant, and financial
institutions.
3. Firewalls and Security Software:
Implementing firewalls and up-to-date security software helps prevent
unauthorized access to the e-commerce website's network.
This includes protection against malware, viruses, and other cyber threats.
4. Authentication and Authorization: Employing strong user authentication methods, such
as two-factor authentication (2FA), helps verify the identity of users, reducing the risk of
unauthorized access.
5. Regular Updates and Patch Management: Ensuring that the e-commerce platform and
all associated software are regularly updated with the latest security patches helps mitigate
vulnerabilities that could be exploited by attackers.
6. Data Privacy and Compliance: Adhering to data privacy regulations (such as GDPR,
CCPA) and implementing privacy policies that protect customer data is crucial. This
includes proper handling and storage of personal information.
7. Risk Assessment and Monitoring:
Conducting regular security audits and risk assessments helps identify
potential vulnerabilities and threats.
Continuous monitoring of systems for suspicious activities is vital to detect
and respond to any security breaches promptly.
8. Customer Education: Educating customers about safe online practices, such as creating
strong passwords, avoiding public Wi-Fi for sensitive transactions, and being cautious of
phishing attempts, can significantly enhance overall e-commerce security.
9. Physical Security Measures: Ensuring physical security of servers and data centers where
customer information is stored is essential to prevent unauthorized access to hardware and
infrastructure.
10. Backup and Disaster Recovery: Implementing robust backup and disaster recovery plans
ensures that in case of a security breach or system failure, data can be recovered without
significant loss.
Page 2
4) Explain E-Commerce threats?
E-commerce platforms face various threats that can compromise security and disrupt operations.
Here are some common threats:
1. Data Breaches: These occur when sensitive customer information, such as credit card
details or personal data, is accessed or stolen by unauthorized individuals or
cybercriminals. Breaches can happen through hacking, phishing, or exploiting
vulnerabilities in the system.
2. Phishing Attacks: Cybercriminals use deceptive emails, messages, or websites that
mimic legitimate sources to trick users into revealing sensitive information like login
credentials, credit card numbers, or personal details.
3. Malware and Viruses: Malicious software can infect e-commerce websites,
compromising user data, stealing information, or disrupting operations. Malware can be
introduced through infected files, links, or vulnerable software.
4. DDoS Attacks: Distributed Denial of Service attacks aim to overwhelm a website's
servers with excessive traffic, causing it to become slow or unavailable, disrupting
business operations and potentially leading to financial losses.
5.SQL Injection: Attackers exploit vulnerabilities in the website's code to insert malicious
SQL queries, allowing them to access or manipulate the database, compromising
sensitive information.
6.Man-in-the-Middle (MITM) Attacks: Hackers intercept communication between a
user and an e-commerce website to eavesdrop, steal information, or manipulate data
during the transmission.
7.Identity Theft: Cybercriminals may steal user identities from e-commerce platforms to
make fraudulent purchases, access financial accounts, or commit other forms of fraud.
8.Supply Chain Attacks: Hackers target weaknesses in the supply chain to access the e-
commerce platform, compromising the security of transactions, customer data, or the
overall system.
9. Payment Frauds: Fraudulent activities during payment transactions, such as stolen
credit card information or unauthorized transactions, pose a significant threat to e-
commerce platforms and customers.
Page 3
7. Implement Firewalls and DDoS Protection: Install firewalls to monitor and control
incoming and outgoing traffic. Use DDoS (Distributed Denial of Service) protection to
prevent service disruption due to attacks.
Page 4
8. Train Employees: Educate your staff about security best practices, phishing attacks, and
how to handle sensitive information to prevent internal security breaches.
9. Privacy Policies and Compliance: Comply with data protection regulations (like
GDPR, CCPA) and clearly communicate your privacy policies to customers.
10. Monitor and Respond to Suspicious Activity: Implement monitoring systems to
detect unusual activity and respond promptly to security incidents.
11. Backup Data Regularly: Keep regular backups of your e-commerce data to ensure
you can recover in case of a security breach or data loss.
12. Limit Access to Data: Restrict access to sensitive data. Only grant access to those who
need it for their specific roles.
Page 5
8) Explain Introduction to Digital Payments?
Digital payments are payments done through digital or online modes, with no exchange of
hard cash being involved.
Such a payment, sometimes also called an electronic payment (e-payment),
It is the transfer of value from one payment account to another where both the payer and
the payee use a digital device such as a mobile phone, computer, or a credit, debit, or
prepaid card.
The payer and payee could be either a business or an individual.
This means that for digital payments to take place, the payer and payee both must have a
bank account, an online banking method, a device from which they can make the payment,
a medium of transmission, meaning that either they should have signed up to a payment
provider or an intermediary such as a bank or a service provider.
Stakeholders:
1. Customers/Users: Individuals or entities making payments or transactions using
digital payment methods.
2. Merchants/Retailers: Businesses or individuals selling goods or services and
accepting digital payments from customers.
3. Financial Institutions: Banks, credit unions, and other financial entities that provide
the infrastructure and accounts necessary for digital transactions.
4. Payment Service Providers (PSPs): Companies that offer services facilitating digital
payments for merchants, such as Stripe, Square, or Adyen.
5. Regulatory Bodies/Government Agencies: Entities responsible for creating and
Page 6
enforcing rules, regulations, and standards for digital payments to ensure security and
fairness.
6. Technology Providers: Companies developing and maintaining the technology and
software necessary for secure digital payment systems, including hardware
manufacturers and software developers.
7. Security Firms: Organizations specializing in ensuring the security of digital payment
systems by providing encryption, fraud detection, and cybersecurity services.
Page 7
by simply dialing *99# on any essential feature phone.
This number is operational across all Telecom Service Providers (TSPs) and allows
customers to avail of services including interbank account to account fund transfer,
balance inquiry, and availing mini statements. Around 51 leading banks offer USSD
service in 12 different languages, including Hindi & English.
5. Aadhar enabled payments system (AEPS):
AEPS is a bank-led model for digital payments that was initiated to leverage the
presence and reach of Aadhar.
Under this system, customers can use their Aadhaar-linked accounts to transfer
money between two Aadhaar linked Bank Accounts.
As of February 2020, AEPS had crossed more than 205 million as per NPCI data.
AEPS doesn’t require any physical activity like visiting a branch, using debit or credit cards
or making a signature on a document.
This bank-led model allows digital payments at PoS (Point of Sale / Micro ATM) via a
Business Correspondent (also known as Bank Mitra) using Aadhaar authentication.
11) Explain Digital Payments Related Common Frauds and Preventive Measures?
1. Phishing
Phishing scams are fake messages, emails, or websites that trick people into
providing their personal information, such as login credentials, credit card details, or
social security numbers. These scammers then use this information to access victims’
accounts and steal their funds.
Preventive Measures:
− Verify website URLs before entering any personal information.
− Never share personal or financial details via email or unsecured websites.
− Enable two-factor authentication for added security.
2. Identity Theft
Identity theft occurs when a fraudster steals someone’s personal information, such
as their name, address, or social security number, and uses it for fraudulent activities,
such as opening a new credit card or mobile payment account.
Preventive Measures:
− Use strong, unique passwords for each financial account.
− Regularly monitor your credit report for any suspicious activities.
− Be cautious while sharing personal information online.
3. Account Takeover
In an account takeover, a fraudster gains access to a user’s digital payment account
by stealing their login credentials or obtaining their personal information using
phishing scams. The attacker then uses the account to make unauthorized
transactions and transfer funds.
Preventive Measures:
− Use strong, unique passwords and change them regularly.
− Enable account alerts for any unusual activity.
− Consider using biometric authentication if available.
4.Card Skimming
Card skimming involves the illegal copying of a user’s credit or debit card
information using a skimming device when the card is swiped for payment. The
scammers then use the copied information to make fraudulent transactions.
Page 8
Preventive Measures:
− Check for tampering on card readers before using them.
− Use contactless payment methods where possible.
− Regularly monitor your account statements for any unauthorized charges.
5. Malware and Spyware:
Malicious software designed to steal financial information from devices.
Preventive Measures:
− Install and regularly update antivirus and anti-malware software.
− Avoid clicking on suspicious links or downloading unknown attachments.
− Keep your device's operating system and apps up to date.
6. Unauthorized Transactions:
Transactions made without the account holder's knowledge or consent.
Preventive Measures:
− Regularly check account statements for any unfamiliar transactions.
− Enable transaction notifications or alerts for your accounts.
− Report any unauthorized transactions to your bank or payment provider
immediately.
7. Social Engineering Attacks:
Manipulating individuals to reveal confidential information.
Preventive Measures:
− Be cautious of unsolicited calls or messages asking for personal information.
− Verify the identity of the person or organization before sharing any details.
− Educate yourself and your family about common social engineering tactics.
Page 9
suspicious activity as soon as possible to minimize their liability.
3.Dispute Resolution: There is a defined process for dispute resolution between the
customer and the bank regarding unauthorized transactions.
4.Reversal of Transactions: The RBI mandates that banks have to ensure prompt reversal
of any unauthorized transaction within a specified time frame once it is reported by the
customer.
1. Regulation of Payment Systems: The Act establishes the Reserve Bank of India
(RBI) as the regulatory authority for payment systems in India. It aims to ensure
the stability, efficiency, and integrity of payment systems.
2. Designation of Payment Systems: The RBI has the authority to designate systems
for the purpose of the Act, allowing it to regulate and supervise various payment
systems in the country.
3. Licensing of Payment System Operators: The Act outlines provisions for the
licensing and regulation of payment system operators, ensuring that entities involved
in payment systems meet certain criteria and adhere to specified norms.
4. Oversight and Monitoring: The RBI is empowered to oversee and monitor
payment systems to ensure their smooth functioning, stability, and compliance with
regulations.
5. Settlement Finality: The Act provides for settlement finality, meaning that once a
settlement in a payment system is deemed final, it cannot be revoked or reversed,
except in certain specified circumstances.
6. Establishment of Payment System Board: The Act establishes a Payment
System Board within the RBI to regulate and supervise payment systems more
effectively.
7. Penalties and Enforcement: Provisions for penalties and enforcement
mechanisms are outlined in the Act to ensure compliance with its provisions and
regulations set by the RBI.
Page
10