Hazards
and Risks in E-Commerce & Payment Card Industry
Introduction
to E-Commerce & Security Issues
In this modern
age, online transactions are becoming integral components in our daily life. We
all know that how much importance e-commerce has gained in recent years, but
along with the advantages, many companies also face lot of hazards. Most
important issue is that those companies don't have any privacy. Now-a-days, we
have been using Internet for the purpose of communication as well as to access
information and most importantly, to purchase goods and services. In order to
use goods and services consumers use smart cards, credit cards and debit cards.
There is always a risk of bogus credit card transactions and that is the main
barrier in the growth of e-commerce.
This barrier is affecting both the online traders/merchants and online
shoppers.
This short
report will look at frauds made in payment card industry and other security
issues companies’ face in data protection. I will also give a brief overview of
Data Security Standards (DSS) made by Payment Card Industry (PCI) in the end.
Frauds,
Frauds, Frauds
At Visa, there
is a highest amount of fraud and that is of “24 cents for every $100” spent.
During 2001, online fraud in just credit cards was about “$1.2 billion out of
sum of online Credit card transactions of $65 billion”. As a result of that
merchants are subjected to bear losses of all those kind of transactions by
law. The initiatives have been taken to reduce the risks in online
transactions. Recently, credit cards issuers have adopted the credit card
identification system by master card in order to decrease the rate of fraud.
[1]
Smart Cards
vs. Debit/Credit Cards
On the other
hand, smart cards are more protected for the misuse than the other cards. The
reason behind is that might be that Credit and Debit cards show account numbers
as well as signatures in front of the card.
Using
Bio-metrics to Secure Payments
The incidence of
September 11 has now increased the use of “Biometrics technology”. Let's first
define the Biometrics Technology.
“Biometrics
Technology encodes physical attributes of person's voice, eye, face, and hand +
finger prints and associate them with biological attributes stored in a
file.”[1]
US intelligence
CIA and FBI have been using the same technology for security and clearance
purposes. Now-a-days, the use of this technology is very rare for online
transactions because of two main reasons. Firstly, this technology is costly and
it can prove to be expensive to provide this technology with every customer for
the purpose of online transactions and secondly, because of privacy reasons and
it is difficult to get some biological attributes from every customer but i
personally believe that this kind of technology has to be used in our daily
life so that it will offer more security to citizens of the country. Nowadays,
what has been happening is Banks and other institutions like Banks are enjoying
by charging interests but now i personally believe that time has come for those
kind of institutions to do something special for their customers and provide
them with some kind of security.
Security
Issues Limit Scope of E-Commerce
As we have
discussed earlier that, more people are using Internet. For the customers, they
need to know the legitimacy of their merchants. In countries like Pakistan, we
all know that there is deficiency of more credible people as well as companies.
Therefore, we can say that the scope of e-commerce is more likely to get
affected by this factor and also in those areas where there is no such
implementation of such Laws.
Online
Auction Systems Scanned
In online
Auction, there is even more probability of frauds. According to national
Consumers League, “most of the frauds come from online Auction sites” where
different people interact individually for buying and selling of their own
goods and services. Moreover, there is no interference of sites in terms of
prices. Both buyer and seller negotiate there and set prices for their
transactions. No guarantee is given of quality or even delivery of products.
Furthermore, these kinds of auction sites are almost “50% of total auction
sites”. On the other hand there are such auction sites that offer both quality
and delivery. Therefore, they are offering lesser risks than others like eBay (www.ebay.com). [1]
Repercussions
of Loopholes in Security Systems in Firms
Coming back to
our original topic, there are severe consequences of not following security
guidelines. According to PCI DSS report, “a security breach and subsequent
compromise of payment card data has far-reaching consequences for affected
organizations, including:
1. Regulatory
notification requirements
2. Loss of
reputation,
3. Loss of
customers,
4. Potential
financial liabilities (for example, regulatory and other fees and fines), and
5. Litigation.
This is only
about payment cards; the threats are wide range encompassing hardware,
software, internal, websites and external threats. The consequences are severe
and are discussed with each of these major threats. [2]
Major
Consequences[2]
Companies have
suffered bad consequences for leaving their networks and systems unprotected.
Some of these include the following:
1. Data
Loss: which implies the competitive advantage of codified knowledge is gone
Wrong criminal charges: a clean person is exploited due to ID theft and
terrible things can be done under his name
2. Loss of customers: when a company lost its credit cards to hackers,
although customers were paid back, but more than 70% did not continue to
purchase from it
3. Monetary loss: due to data theft, companies can lose profits due to
loss of customers and reputation
4. Competitor gains key information: loss of emails to competitors with
strategic information can create grave strategic losses to a firm’s position
5. Hardware Failure
6. Software Failure
7. Reducing the performance of servers
8. Frauds
9. Tapping
10. Copying of data
11. Unauthorized access
12. Errors
13 Viruses and vandalism
Vulnerabilities
Internet Vulnerabilities
Internet is wide
open for anyone to access and breach into systems. Once that happens corporate
systems are highly vulnerable to penetration from outsiders. They hack whole
systems, get access to the data, and can even corrupt and destroy it your
personal data. Consider a university such as FC college; it has databases of
students’ records, fees, transcripts, IDs, etc. If someone can have access to
it and corrupts it – all transcript records and IDs are gone. Students are
finished. Business is over; at least in the short-run.
Wireless Security Challenges
Sniffer programs
are used by hackers who roam around a building
of different companies or agencies to penetrate into the system. This
has resulted in loss of databases on which a company so much depends. Things
can be manipulated, stolen, corrupted, etc.
Malicious Software Threats & Payment Card Security Standards
Case of “the
worst data theft ever”: Organizations are constantly threatened by such
malicious software as sniffers, viruses, worms etc. We’ll consider only one
such case where a vulnerable network containing credit and debit card databases
was hacked due to non-compliance to PCI DSS standards.
A firm called
T.J. Maxx had very loose and old encryption systems. Apart from this, due to
vulnerable wireless systems, hackers gained access to all databases of credit
and debit card holders. The hackers stole more than 41 million credit and debit
card numbers. They caused financial losses of more than $75 million. Hackers
got access into their systems by installing sniffer programs into retailer’s
networks. Moreover, TJX did not adhere to PCI DSS standards. For all of this
mess, TJX had to pay $40.9 million to banks; spent $202 million to deal with
litigation fees, etc. More than 75% of its buyers refused to continue shop from
it.[2]
Computer Crime
Following are
the consequences of vulnerable systems which cause various kinds of computer
crimes, including:
Breaching the confidentiality of protected computerized data
Accessing a computer system without authority
Using emails for threats and harassment
Unauthorized copying of software or intellectual property
Data transmission
Payment Card
Industry Data Security Standards (PCI DSS)
Companies using
payment systems in their businesses should comply to latest versions of PCI
security standards. We saw the case of T.J Maxx ruined due to non-compliance to
these standards. What are these standards? Following table summarizes major
standards of PCI DSS – but these are expounded at length in its documents on
its website:
Build and Maintain a Secure Network
|
1. Install and maintain a firewall configuration to protect
cardholder data
2. Do not use
vendor-supplied defaults for system passwords and other security parameters
|
|
||
Protect Cardholder Data
|
3. Protect stored cardholder data
4. Encrypt
transmission of cardholder data across open, public networks
|
|
||
Maintain a Vulnerability Management Program
|
5. Use and regularly update anti-virus software on all systems commonly
affected by malware
6. Develop and maintain secure systems and
applications
|
|
||
Implement Strong Access Control Measures
|
7. Restrict access to cardholder data by business need-to-know
8. Assign a
unique ID to each person with computer access
9. Restrict
physical access to cardholder data
|
|
||
Regularly Monitor and Test Networks
|
10. Track and monitor all access to network resources and cardholder
data 11. Regularly test security systems and processes
|
|
||
Maintain an Information Security Policy
|
12. Maintain a policy that addresses information security
|
|
||
Source of the whole table: [3]http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard#cite_note-2 &
[4]https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml
|
|
|
||
These standards
the bare minimum payment card industries must adhere to protect their systems
from various vulnerabilities that we’ve discussed in the report.
Let's talk about the minimum security level that one can easily opt to. A
secure system literally means that, information it contains and system itself
is secure from any theft, natural disaster, malicious software’s, cyber attack
and any kind of manipulation or tampering. Companies around the world spend
millions of dollars to make sure that their systems are secure and for this
purpose they have special teams who monitor system securities headed by top
official. But if the system is not secure, then it can have very negative
repercussions. These repercussions can affect firms and individuals drastically
and can have long lasting effects on operation of the system and business.
Different repercussions of unsecured systems, along with remedial measures for
these repercussions are discussed below. When systems are unsecured, it gives
an all out open invitation to all the malicious software’s to come and attack
the system. Malicious software’s like worms, Trojan horses, viruses and spy-ware
are also known as silent killers. These malicious creatures can affect the
system in big way. These viruses can completely stop system from working.
Malicious software’s can result in collapse of the whole system. Furthermore,
they can also cause loss of important data, files and information which can
inflict heavy losses to the firm as these files could be necessary for the
normal operation of the business. In order to stop these malicious software’s
from affecting the system; there should be a updated anti-virus software along
with a strong firewall. Furthermore, unsafe systems can be easily accessed by
anyone like hackers or a cracker, leading to identity theft which can easily
steal important information from the system, for example CNIC, drivers license
no, credit card numbers etc. Stolen information can be used by the competitor
of the firm, which can put danger to the future strategies of the company or
can finish a competitive advantage of a firm. In order to stop this, there
should be a strong firewall protecting the system. There should be also an
intrusion detection system to detect any intruder from accessing the system.
Unsecured system can also affect business badly by loss of sales. An unsecured
system can be stopped from working by malicious software, which will affect the
sales of the business which mainly operate through computers and can affect
E-commerce badly. An unsecured system will be easily affected through spoofing,
which will result in gathering important personal information and loss of
business. Another disadvantage of unsecured system is that it can disrupt the
working of website with the help of distributed denial-of-service. DDoS
attacks, using hundreds and thousands computers to inundate the network and
making it busy so that no one can access it and this strategy can be opted by
any of your competitor so that maximum of the customer will come to him.
Moreover,This can cause great loss to the e-commerce companies because their
customers who wanted to make online purchase won’t be able to access the
website. Proper remedy to these problems is again having an updated anti virus
with a strong firewall and investing in fault tolerant computers.
Some people believe that when they are forming a network within a company then their network is said to be a
safe one but answer to this is that systems are not only attacked by the
outside people but they can be attacked by the inside people, for example
employees. When there are no security standards present and systems are unsecured,
they can be easily accessed by any employee of the company who might extract
important piece of information from the computer. If security is not adequate
it can also result in the robbing of the physical system itself. In order to
get over this problem there should be an acceptable use policy for the
equipment of the company. Furthermore, there should be authorization management
systems which will determine the authorization of company employees to
different parts of the company and its corporate database.
When the system is unsecured, it can be easily be monitored by anyone.
This act is also called sniffing. A hacker can easily monitor what is being
done by the user of the system. In this process the hacker gets to know various
information, which can be used by him for various purposes. Such as black
mailing or buying something online. Many world governments invest heavily to
get rid of this problem. In order to get over this problem strong encryption
should be used to protect you from being monitored. For example Blackberry has
strong encrypted network in which no one can monitor the messages sent over
that network, this is why Blackberry is trusted by the corporate people around
the world. One of the corporate person i personally know is Mr Suffian Mazhar,
he is owner of software house based in Canada. Currently, he is teaching
courses related to MIS at School of management, FC college and for him teaching is more of a hobby.
Furthermore, he also thinks the same about the Blackberry and at his software house,
he is using MIS systems to take care of that from Pakistan . Firms can encrypt
their network through Secure Socket Layers (SSL) and Secure hypertext transfer
Protocol (S-HTTP).
In this age of technology, one should be aware from the electronic dangers
confronting firms. Firms should invest properly in the security of systems.
Because it is the way forward for the companies, especially for the e-commerce
companies. Also, companies should turn this point into their competitive
advantage.
It the end, to
finish the whole topic, i will say the words said by Miss. SAIRA ANWAR in CSCS
100, Section D, at FCCU; “Nothing is safe when more than one computers are
connected to form a network........”.
No comments:
Post a Comment