Protecting Your E-Commerce Business. Analysis on Cyber Security Threats
Downloads
This paper aims to gather complete information needed for a retailer running an e-commerce website, with the intention of presenting some of the most common cyber security threats, such as malware, ransomware, SQL injection, and phishing, as well as ways to prevent them from happening and ways to manage the aftermath of a full-scale attack being carried out. Some best practices will be noted as a process that should always be considered when setting up an e-commerce business, and a risk management strategy will be outlined. An analysis will be performed on a data breach with one of the biggest number of victims in the last decade, which affected the Microsoft Exchange Servers.
Downloads
M. Mclean, 2023 Must-Know Cyber Attack Statistics and Trends, 2023, Available online at: https://www.embroker.com/blog/cyber-attack-statistics/. Accessed on 14.03.2023.
R. Zhang, L. Fang, X. He, C. Wei, E-commerce and E-commerce Security, in The Whole Process of E-commerce Security Management System: Design and Implementation, Singapore, 2023, pp 1-4.
Schatz, D., Bashroush, R., and Wall, J. (2017). Towards a more representative definition of cyber security. J. Digit. Forensics Secure. Law 12, 1558–7215.
BigCommerce, „What You Need to Know About Securing Your Ecommerce Site Against Cyber Threats”, 2020 [Online]. Available online at: https://www.bigcommerce.com/articles/ecommerce/ecommerce-website-security/. Accessed on 05.03.2023.
Galov, N. (2022). 17+ sinister social engineering statistics for 2022. Available online at: https://webtribunal.net/blog/social-engineering-statistics/#gref. Accessed on 10.03.2023.
CH. Sireesha, V. Sowjanya, Dr K. Venkataramana, „Cyber security in E-commerce” in International Journal of Scientific & Engineering Research, 2017, pp 187-193.
Adobe Experience Cloud Blog, “Ecommerce security - what it means, common threats, and modern best practices”. Available online at: https://business.adobe.com/blog/basics/learn-about-ecommerce-security#:~:text=Ecommerce%20security%20is%20a%20set,need%20to%20defend%20against%20cyberattacks. Accessed on 10.03.2023.
M. Abomhara, G. M. Køien, „Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks” in Journal of Cyber Security, 2015, pp 65-88.
Hyperproof, “Cybersecurity Risk Management: Frameworks, Plans, & Best Practices”, 2023. Available online at: https://hyperproof.io/resource/cybersecurity-risk-management-process/#:~:text=and%20manage%20risk.-,What%20is%20Cybersecurity%20Risk%20Management%3F,has%20a%20role%20to%20play. Accessed on 13.03.2023.
Information security, cybersecurity and privacy protection — Information security management systems - Requirements, International Standard ISO/IEC 27001; Geneva, 2022. Available online at http://www.itref.ir/uploads/editor/2ef522.pdf. Accessed on 13.03.2023.
Framework for Improving Critical Infrastructure Cybersecurity, National Institute of Standards and Technology, 2016. Available online at https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf. Accessed on 13.03.2023.
Microsoft, Security Update Guide, 2023, Available online at: https://msrc.microsoft.com/update-guide/vulnerability. Accessed on 15.03.2023.
Microsoft, Microsoft Exchange Server Remote Code Execution Vulnerability, 2021. Available online at: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855. Accessed on 15.03.2023.