E-Commerce Safeguards

Mark S. Merkow, University of Phoenix Online

Introduction

Consumer Concerns About E-Commerce Transactions

E-Commerce Risk Assessment Principles and Recommendations

Recommendations for Home Office E-Commerce Merchants

E-Commerce Safeguards Begin With Building Trust

A Secure Payment Processing Technical Environment

Additional Server Controls

Recapping Network Security Responsibilities

Software Support

Configuration Management

Backups

Controls

Documentation

Maintenance

Interdependencies

Cost Considerations

Payment Card Best Practices

Conclusion

Glossary

Cross References

Further Reading

INTRODUCTION

Consumer identity and payment card data are under attack. The very connectedness that enables e-commerce also threatens its existence. Between the new hoards of personal identifying data collected for the electronic ex-change of goods and services and the organized attacks and attackers trying to separate consumers from their money, effective e-commerce safeguards are needed more than ever. Although some online merchants continue to have an “it can't happen to me” mentality and ignore or treat casually the handling of consumer information and transaction information, e-commerce will remain vulnerable, and without sufficient self-enforcement activities in place, the credit card associations and governments around the world will mandate and impose regulations that may be a cure worse than the original disease.

Although safeguarding e-commerce is a set of activities and ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.