Security and Encryption
Security and Encryption
Need for Security and Encryption in Ecommerce
Security is an essential part of any
transaction that takes place over the internet. Customers will lose his/her
faith in e-business if its security is compromised. Following are the essential
requirements for safe e-payments/transactions −
Confidentiality − Information
should not be accessible to an unauthorized person. It should not be
intercepted during the transmission.
Integrity − Information
should not be altered during its transmission over the network.
We all have the one common
question, whether we have received the same data that the sender has sent. Now
it is the duty for integrity for the correctness of the information
that has been transmitted or received or displayed on a website over the
internet.
Integrity can ensure
that information on the internet has not been altered in any way
by an unauthorized party. It maintains the consistency, accuracy, and
trustworthiness of the information over its entire life cycle.
Customer
perspective on integrity: Is the information I have transmitted or
received is altered?
Merchant
perspective on integrity: Is the information present on the website is altered without an
authorization? Is the information received from the customer is valid or
not?
Example: The most
common threat will be “would any unauthorized person will intercept and
redirect payment into a different account” since ecommerce sites prefer online
transfer mostly.
Let us consider a subscription
model, where you will give credit card details for a bill payment to the
merchant. If someone added extra cost on your credit card bill
without both yours or merchant’s knowledge, then you need to pay
extra money for something you haven't purchased.
Availability − Information
should be available wherever and whenever required within a time limit
specified.
Continuous availability of the
data is the key to provide a better customer experience in ecommerce. The
continuous availability of the ecommerce website increases online visibility,
search engine rankings, and site traffic. Data which is present on the website
must be secured and available 24x7x 365 for the customer without
downtime. If it is not, it will be difficult to
gain a competitive edge and survive in the digital world.
Customer
perspective: Can I access the site at any time from anywhere?
Merchant
perspective: Whether my site is operating without any downtime?
Example: An ecommerce
website can be flooded with useless traffic that causes to shut down your site,
making impossible for the user to access the site.
Authenticity − There should
be a mechanism to authenticate a user before giving him/her an access to the
required information.
In
ecommerce, since both the customer and seller need to
trust each other, they must remain as who they are in real. Both the
seller and buyer must provide proof of their original identity so that the
ecommerce transaction can happen securely between them.
Every
ecommerce site uses authenticity as a tool to ensure the
identity of the person over the internet. In ecommerce, fraudulent
identity and authentication are also possible, which makes identity
a difficult process. Some common ways to ensure a person's identity are
customer log in using a password.
Customer
perspective: Who am I dealing with? Who can I assure the person I am dealing
with is who they claim to be?
Merchant
perspective: Is the customer that I am communicating are a real person? If
not, what could be their identity?
Example: Some
users can use a fake email address to access any of the ecommerce
services.
Non-Repudiability − It is the
protection against the denial of order or denial of payment. Once a sender
sends a message, the sender should not be able to deny sending the message.
Similarly, the recipient of message should not be able to deny the receipt.
Good business depends on both
buyers and sellers. They must not deny any facts or rules once they accept
that there should not be any repudiation.
Non-repudiation
confirms whether the information sent between the
two parties was received or not. It ensures that the purchase
cannot be denied by the person who completed the transaction. In other words,
it’s an assurance that anyone cannot deny the validity
of transaction.
Mostly non-repudiation uses a
digital signature for online transactions because no one can deny the
authenticity of their signature on a document.
Customer
perspective: Can a party take action on me if I have denied the action?
Merchant
perspective: It’s possible for a customer to deny a product after
ordering it.
Example: When a
merchant doesn’t have enough proof of customers who have ordered with
them during a credit card payment transaction, it will not
be processed further to the merchant.
Sometimes customers claim that
they haven't ordered the product from a particular merchant if they
disliked the product later.
Encryption − Information
should be encrypted and decrypted only by an authorized user.
Auditability − Data should
be recorded in such a way that it can be audited for integrity requirements.
Confidentiality
Confidentiality refers
to protecting information from being accessed by an unauthorized person
on the internet. In other words, only the people who are authorized
can gain access to view or modify or use the sensitive data of any customer or
merchants.
According
to Juniper Research, nearly 146 billion records will be exposed by
criminal data breaches between 2018 and 2023.
One confidentiality
breach will be sniffing. It's a program that steals all the important files of
the company, individual identity or email message or personal report of the
internet user.
Customer perspective: Can
someone other than the intended recipient or a person read my
message?
Merchant perspective: Whether information
on my site can be accessed by the unauthorized person without knowledge?
Example: Ecommerce
uses a user name and password to login to their account. Let’s consider
this case for resetting the password, where an ecommerce site sends a one-time
password to their customer in email or phone number if someone else reads
it.
Privacy
Where confidentiality is
a concern about the information present during
communication, privacy is concerned with personal details.
In general, privacy is used to control the usage of
information by the customers that they have given to the
merchant.
According to Fortune, 1.16
billion email address and passwords are exposed in
2019 through security breaches.
Privacy is a major
threat to any online transaction or internet user since personal information
has been revealed and there is no way back to disclose them.
Customer perspective: Can
I control the usage of information about myself that I have transmitted to the
ecommerce site?
Merchant perspective: What
if anyone else uses personal data collected as part of the
ecommerce transaction? Is there any unauthorized person to access
a customer’s personal data?
Example: If a hacker
breaks into the ecommerce site, they can gain access to the customer
credit card details or any other customer information. This
also violates information confidentiality and personal privacy.
Measures to ensure
Security
Major security measures are following −
Encryption − It is a very
effective and practical way to safeguard the data being transmitted over the
network. Sender of the information encrypts the data using a secret code and
only the specified receiver can decrypt the data using the same or a different
secret code.
Digital Signature − Digital
signature ensures the authenticity of the information. A digital signature is
an e-signature authenticated through encryption and password.
Security
Certificates −
Security certificate is a unique digital id used to verify the identity of an
individual website or user.
Security Protocols
in Internet
We will discuss here some of the popular
protocols used over the internet to ensure secured online transactions.
Secure Socket Layer
(SSL)
It is the most commonly used protocol and is
widely used across the industry. It meets following security requirements −
Authentication
Encryption
Integrity
Non-reputability
"https://" is to be used for HTTP
urls with SSL, where as "http:/" is to be used for HTTP urls without
SSL.
Secure Hypertext
Transfer Protocol (SHTTP)
SHTTP extends the HTTP internet protocol with
public key encryption, authentication, and digital signature over the internet.
Secure HTTP supports multiple security mechanism, providing security to the
end-users. SHTTP works by negotiating encryption scheme types used between the
client and the server.
Secure Electronic
Transaction
It is a secure protocol developed by
MasterCard and Visa in collaboration. Theoretically, it is the best security
protocol. It has the following components −
Card Holder's
Digital Wallet Software −
Digital Wallet allows the card holder to make secure purchases online via point
and click interface.
Merchant Software − This software
helps merchants to communicate with potential customers and financial
institutions in a secure manner.
Payment Gateway
Server Software −
Payment gateway provides automatic and standard payment process. It supports
the process for merchant's certificate request.
Certificate
Authority Software −
This software is used by financial institutions to issue digital certificates
to card holders and merchants, and to enable them to register their account
agreements for secure electronic commerce.
Comments
Post a Comment