18

Click here to load reader

Threats of Database in ECommerce

Embed Size (px)

Citation preview

Page 1: Threats of Database in ECommerce

Presentation Of Database Management System

Page 2: Threats of Database in ECommerce

Introduction

• Name: MD. Wasim Akram• ID: UG 02 22 09 016• Department: CSE

Page 3: Threats of Database in ECommerce

Topic

• Threats of Database In E-Commerce

Page 4: Threats of Database in ECommerce

What Is Commerce

• Commerce

• CCommerce: Exchange of Goods / Services

• SContracting parties: Buyer and Seller

• CFundamental principles: Trust and Security

• S

Page 5: Threats of Database in ECommerce

What is E Commerce

• E-Commerce

• EAutomation of commercial transactions using computer and communication technologies

• t Facilitated by Internet and WWW

• F Business-to-Business: EDI

• BBusiness-to-Consumer: WWW retailing

Page 6: Threats of Database in ECommerce

Continued

• CSome features:

• –Easy, global access, 24 hour availability

• –Customized products and services• –Back Office integration

• –Additional revenue stream

Page 7: Threats of Database in ECommerce

Problems of E-Commerce

Page 8: Threats of Database in ECommerce

E-Commerce risks

• ECustomer's risks

• –Stolen credentials or password

• –Dishonest merchant• –Disputes over transaction

• –Inappropriate use of transaction details

• - Merchant’s risk

Page 9: Threats of Database in ECommerce

Continued

• Forged or copied instruments

• –Disputed charges

• –Insufficient funds in customer’s account• –Unauthorized redistribution of purchased

items

• i Main issue: Secure payment scheme

Page 10: Threats of Database in ECommerce

Overview

• Levels of data security• Authorization in databases• Application Vulnerabilities• Summary and References

Page 11: Threats of Database in ECommerce

Levels of Data Security

• Human level: Corrupt/careless User

• Network/User Interface

• Database application program• Database system

• Operating System

• Physical level

Page 12: Threats of Database in ECommerce

Database Threats

• Disclosure of valuable and private information could irreparably damage a company

• Security is often enforced through the use of privileges

• Some databases are inherently insecure and rely on the Web server to enforce security measures

Page 13: Threats of Database in ECommerce

Continued

• Threats to database result in the loss or degradation of some or all of the following security goals: integrity, availability, and confidentially.– Loss of integrity– Loss of availability– Loss of confidentially

Page 14: Threats of Database in ECommerce

Explanation Of Threats in Database

• 1. Privilege abuse: When database users are provided with privileges that exceeds their day-to-day job requirement, these privileges may be abused intentionally or unintentionally.

• 3. Database rootkits: A database rootkit is a program or a procedure that is hidden inside the database and that provides administrator-level privileges to gain access to the data in the database. These rootkits may even turn off alerts triggered by Intrusion Prevention Systems (IPS).

• 4. Weak authentication: Weak authentication models allow attackers to employ strategies such as social engineering and brute force to obtain database login credentials and assume the identity of legitimate database users.

Page 15: Threats of Database in ECommerce

Different AuthorizationDifferent authorizations for different users

Accounts clerk vs.Accounts manager vs.End users

Page 16: Threats of Database in ECommerce

Database/Application Security

• Ensure that only authenticated users can access the system

• And can access (read/update) only data/interfaces that they are authorized to access

Page 17: Threats of Database in ECommerce

How to protect databaseHow to protect database

• To protect database against these types of 4 kinds of countermeasures can be implemented:– Access control

– Inference control– Flow control– Encryption

Page 18: Threats of Database in ECommerce

Conclusion

• Thank you my Honorable Teacher for giving me the privilege for this Presentation………

• Any questions?????