Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Aashutosh Bansal, Tejna Khosla , Vinay Kumar Saini
DOI Link: https://doi.org/10.22214/ijraset.2023.53050
Certificate: View Certificate
A part of the information security framework, e-commerce security is used in areas like data security and computer security, among others. It covers safeguarding electronic commerce assets from unauthorized access, use, modification, or destruction of data. However, due to heightened awareness of attacks, the attackers use phoney websites and apps to circumvent the security of payment-related online activities. This article provides an overview of the many security issues that arise in e-commerce applications and discusses solutions. The study offers a survey of some methods used by different researchers. Due to the growth of e-commerce, most financial transactions now take place online.. They use websites or apps that are offered by businesses, making them more vulnerable to attacks and increasing the probability that attackers may use fake websites and apps. There are several methods that can be employed to defend against vulnerabilities. We have given a survey of the security measures used to protect banking transactions in this paper.
I. INTRODUCTION
E-Commerce, also known as electronic commerce or internet commerce, is an activity of buying and selling goods or services over the internet or open networks. So, any kind of transaction (whether money, funds, or data) is considered as E-commerce.
E-commerce models can generally be categorized into the following categories.
Since the previous decades, e-commerce has been used much more frequently, and as a result, there are now an exponentially greater number of payment transactions done on online platforms. In this regard, E-Commerce security is a part of the information security framework and gives guidelines for securing the networks and systems involved in the implementation.
II. LIFE CYCLE OF A DIGITAL E-COMMERCE ORDER
The majority of transactions are online due to expansion of E-Commerce. For customers to place their orders, the retailer offered apps. Some popular websites are Amazon, Flipkart, Ebay and much more. The life cycle of an order placed through an e-commerce platform is depicted in Fig. 1. It starts with a customer who places a request order via the client browser. The request is delivered to the merchant's web server, which then receives it. Both the client browser and merchant’s server are linked to the payment server like Stripe, Razorpay etc. where customer and merchant are verified, order information and payment information are reviewed, the order is confirmed or payment is denied. These payment servers are third party computers which uses multiple payment systems including Credit card (VISA or Mastercard), Bank Accounts (Debit Card or Online Banking), E-bill payments (UPI, PAYTM) etc. once the order is verified, the details are sent to the customer, merchant are warehouse and the shipping is done. The customer receives the product and the request is closed.
III. RECENT SECURITY CHALLENGES IN E-COMMERCE
E-Commerce security is categorized into 4 features:
Various researches show that to ensure a secure business transaction in the finance industries, the security challenges in e-commerce are a big concern. We have identified 3 types of security threats namely:
a. Denial of Service: In DOS majorly spamming and viruses are seen. Spamming includes sending unrequested commercial emails to everyone. The hackers place software agents in the third party system and keep sending requests to different targets. Sometimes thousands of email messages target a computer or network and are referred to as email bombing. Viruses are the programs that replicate itself to perform undesirable events.
b. Theft and Fraud: Theft and Fraud occurs whenever the data is stolen, used and modified. It can be a data theft, a software theft or a hardware theft.
c. Unauthorized Access: Accessing the systems or data illegally. The system can be modified and content can be used for destroying purposes. Masquerading involves sending a message from a different identity.
The studies demonstrate that there are a number of issues related to DOS, theft, fraud, and unauthorized access. Malware: In today's world, E-Commerce is especially susceptible to malware (viruses, trojans). Next comes, Account Takeover (ATO) in which cybercriminals take ownership of online accounts using stolen passwords and usernames. Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files until a ransom is paid . Phishing is the act of an attacker tricking a user into doing "the wrong thing," such as opening a malicious link or visiting a dubious website. Threats to SSL encryption include the ability for hackers to gain the private keys associated with SSL certificates, usernames, passwords and other private information undetected. An insider threat is a malicious danger to an organization that originates from individuals who work there, such as current or former employees, contractors, or business partners, and who have inside knowledge of the company's security procedures, customer information, and computer systems. Drive-by downloads are unintentional Internet software downloads. permitted drive-by downloads are downloads which a person has permitted but without knowing the repercussions.
Today, bots pose a serious security risk. These are some specialized programmes created by the attackers who often browse your website to gather data. To reduce the revenue generated, they can change the prices of the goods listed on your websites. or to decrease sales
Some Vicious Bots can be classified as:
The statistical analysis of these security challenges in 2021 that fall under the above-mentioned categories are shown in Fig.2.
The figure shows that Malware has the maximum impact out of all the challenges. It has a score of 4.01 on a scale of 5, which is 80.2% of all the challenges. Account takeover and Ransomware are 3.97 and 3.96, respectively. The lowest and most uncommon challenge is drive by downloads, which holds the score of 3.78 out of 5. Therefore, it can be concluded that there is a dire need to overcome these security issues.
IV. METHODS TO IMPROVE THE SECURITY CHALLENGES
The security dangers that an e-commerce business is likely to face were recently covered. There haven't been many solutions to these problems put up in the literature thus far. Among them are:
A. Authentication of Secure Payment Gateway
Payments are an essential component of your online business, so you must take care to ensure the security of the payment gateway.
There is no justification for not using a reputable payment gateway since most online store builders allow integration with dozens of well-known payment gateways like Paytm, Stripe, and other enterprise payment gateways. As a result, credit card and debit card theft affects numerous e-commerce enterprises. The only way to ensure safety is to use a secure payment channel. It can also be used in conjunction with other security measures.
B. Encryption
Dr. Varsha Namdeo's research, conducted by Amit Kumar Mandle. Every e-commerce website ought to use at least one degree of encryption. When you think about it, nearly every significant online retailer you can think of—companies like eBay come to mind first—have both at some point encountered a data breach. In other words, risk is constantly present in some form. As a result, your first step should be to make sure that any information collected about you in the case of a breach is essentially useless.
When encryption is turned on for an online store, user passwords are changed from "Normal Text" to a "Hashed Format" that is difficult to encode.
C. Securing Website with a SSL certificate
Using an SSL certificate is one of the best ways to protect your e-commerce company, according to Angamuthu Maheswaran and Rajaram Kanchana. An SSL certificate, when used properly, will encrypt all the information customers provide to your e-commerce website, making it more difficult for hackers to intercept this information or use it in any way.
Additionally, users are more likely to trust e-commerce websites that make use of wildcard SSL certificates, and Google generally gives SSL-enabled websites a higher ranking. Without one, a website would probably lose a lot of visitors. An SSL certificate will improve website traffic, raise conversion rates, and protect sensitive user data submitted there.
Some types of SSL are:
D. Secure Server
The objective is to create complex passwords using a range of characters. Furthermore, you must regularly replace them. Both specifying user roles and controlling user access are excellent practices. Don't let anyone use the admin panel unless it's absolutely necessary. For further security, have the panel alert you whenever a foreign IP tries to access it.
E. Multiple-Layer Security
A developer may employ an additional layer of protection, such as multi-factor authentication.
A decent authentication method is two-factor. When a user logs in, they should receive an OTP or token on their registered email address or, if they add a mobile number, on that number as well.
This procedure decreases the possibility of user information being compromised.
Fig 3. Below shows how Multi Factor Authentication (MFA) works.
But most companies using MFA still got hacked.
F. Ecommerce Security Plugins
A very easy way to improve website security protection is by using security plugins. These plugins offer defence against numerous malicious bots that attackers may occasionally introduce. Astra is among the most reliable and feature-rich security plugins. Your website will become more secure as a result, and software will be added to stop malicious requests.
G. Providing Client Education
There may not always be security concerns on our end, but clients may use passwords that are too simple or may divulge private information to a website that is under the control of hackers.
These issues can be solved by correctly educating or giving guidance to the consumers or the customers. Ask them to use a strong password including some special characters like “$, <, >, #, @” etc.
H. Regular Scanning
Keep an eye on your website, which means you should try to monitor each and every action that takes place there. Regular data scanning should be taken into consideration so that any errors may be fixed quickly.
I. Some good bots can be installed on the website.
That can be classified as below:
The study came to the final conclusion that data security is an important aspect of e-commerce in business industries. With regard to dealing with secure dangers when shopping online, modern technology enables safe website design. We also concentrated on a few important security factors that are expanding quickly to support the expansion of e-commerce. It\'s crucial to remember that security precautions provide a good sense of protection. To find vulnerabilities in commercial industries\' use of e-commerce, the security checks are also discussed.
[1] Polsani Jahnavi , Balla Manoj Kumar. “SURVEY PAPER ON THE VARIOUS SECURITY ALGORITHMS USED FOR E-COMMERCE SECURITY.” [2] Yeow Chong Larry Tan “Recent Technological Trends and Security Challenges in Trust-Building in E-Commerce.” [3] Latif, R. M. A., Umer, M., Tariq, T., Farhan, M., Rizwan, O., & Ali, G. (2019, January).” A smart methodology for analyzing secure e-banking and e-commerce websites. [4] Security issues in E-Commerce – How to Enhance Security: (https://www.cidm.co.in/security-issues-in-e-commerce/). Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press. [5] Nazmun Nessa Moon , Shaheena Sultana “A Literature Review of the Trend of Electronic Commerce” [6] Zwaas Vladmir “Electronic Commerce: Structures and Issues.” International Journal of Electronic Commerce / Spring 2003, Vol. 7. [7] Shahid Amin “A Review paper on E-Commerce”. Asian Journal of Technology & Management Research [8] Dr.(Smt) Rajeshwari M. Shettar “EMERGING TRENDS OF E-COMMERCE IN INDIA: AN EMPIRICAL STUDY“
Copyright © 2023 Aashutosh Bansal, Tejna Khosla , Vinay Kumar Saini. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET53050
Publish Date : 2023-05-26
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here