Page 76 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 76

Unit 6:  Security Framework



               5.   Non-repudiability: The sender and the recipient should  not deny about the transactions made
                    earlier. The communicated transaction information and its acknowledgement must synchronize
                    with the sender and receiver.

                               Consider that you make a call to a list of five people from your phone. When the
                               service provider sends the bill and you deny making any such calls, then it is
                               termed as non-repudiability.

               6.   Auditability: The information about the transactions made must be constantly reviewed to check
                    if they comply with the information confidentiality and integrity requirements.
               6.1.1   Types of Security Vulnerabilities in E-Commerce Systems

               Today, almost all transactions are carried out online. This has resulted in a  sharp increase of virus
               attacks and information hacking in online payment systems. The hackers utilize vulnerabilities
               published in reusable third party components such as, shopping cart  software commonly used by
               online shopping Web sites.  Other hackers make use of possible vulnerabilities that commonly occur in
               Web applications like Structured Query Language (SQL) injection or cross-site scripting.
               Following are some of the security vulnerabilities that occur in e-commerce systems:

               1.   SQL Injection:  This is a type of security vulnerability  wherein the attackers insert certain SQL
                    Meta characters in the user input. Generally, attackers check if a site’s security features are weak
                    enough to get affected. They perform this check by sending a single quote character (‘) embedded
                    in the user input.  When the site responds, the attacker’s queries execute in the back-end database.
                    Then, the attackers modify the query to a Boolean value that is always true and thus, gain access to
                    the restricted areas of the site.


                               E-Commerce Web sites such as Guess.com and PetCo.com were found more
                               vulnerable to SQL injection attack. A 20-year old programmer in Orange County,
                               California, found that it is possible to access highly sensitive  data  such as, credit
                               card numbers and transaction details from these Web sites using specially created
                               URLs consisting of SQL Meta characters.

                    The Web sites are attacked  using SQL injection  technique depending  on the type of back-end
                    database being used for the site. SQL injection technique on an Oracle database can be attacked
                    using the UNION keyword. Attacking an application that uses Oracle as back-end is very difficult
                    when compared to attacking  an application that uses MS  SQL Server as back-end. In  MS SQL
                    server, the queries are terminated with a semicolon and hence, it makes easy for the attackers to
                    insert a Meta character in the query.

                               SQL injection  vulnerabilities  were discovered in  shopping cart software like VP-
                               ASP Shopping Cart, iGeneric Free shopping cart, Web Merchant services, and
                               Storefront shopping cart. It  was found that in Storefront shopping cart, the SQL
                               injection vulnerability was detected in login.asp page  allowing the  attacker to
                               execute malicious database queries without authenticating the Web site.

               2.   Price Manipulation: This type of security vulnerability is common in online shopping Web sites
                    and payment  gateways. When a consumer purchases a commodity online, the price is stored
                    dynamically in a HTML hidden field. An attacker can modify the payable amount by using a Web
                    application proxy when information flows from the user's browser to the Web server. When the
                    number of transactions is more, the modification made to the price often goes unnoticed. Frequent
                    attacks of this type will reduce the credibility of online merchant.





                                                      LOVELY PROFESSIONAL UNIVERSITY                                                 69
   71   72   73   74   75   76   77   78   79   80   81