Kenneth C. Laudon
Carol Guercio Traver
Copyright © 2014 Pearson Education, Inc. Publishing as
Prentice Hall
Chapter 5
E-commerce Security and
Payment Systems
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall
Class Discussion
Cyberwar: MAD 2.0
What is the difference between hacking and
cyberwar?
Why has cyberwar become more potentially devastating in the past decade?
Why has Google been the target of so many cyberattacks? Is it possible to find a political solution to
MAD 2.0?
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall
Slide 5-3
What Is Good E-commerce Security?
To achieve highest degree of security
New technologies
Organizational policies and procedures
Industry standards and government laws
Other factors
Time value of money
Cost of security vs. potential loss
Security often breaks at weakest link
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall
Slide 5-4
The E-commerce Security Environment
Figure 5.1, Page 252
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall
Slide 5-5
Dimensions of E-commerce Security
Integrity ensures that info sent and received has not been altered by unauthorized party
Nonrepudiation ability to ensure that participants do not deny (repudiate)
Authenticity ability to identify the person’s identity with whom you are dealing with over the internet
Confidentiality authorized to be seen by those who should view it
Privacy ability to control who sees your info
Availability e-commerce site functions as intended
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall
Slide 5-6
Table 5.3, Page 254
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice
Hall
Slide 5-7
The Tension Between Security and Other Values
Ease of use
The more security measures added, the more
difficult a site is to use, and the slower it becomes