狠狠撸

狠狠撸Share a Scribd company logo
Security Threats, Challenges and
Best Practices in ecommerce
Presented at CIO roundtable on Secure
the breach ( New Delhi, India)
12th Aug 2015
By Dinesh Aggarwal
VP-IT & CISO
Payu Payments Pvt Ltd
What are the treats and
challenges to ecommerce and
online industry today ?
1. New Vulnerabilities and zero
days
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
Solution ??
1.Patching
How do I know when these latest
patches and vulnerabilities comes
Regular scanning, at least once
a quarter- Nessus
US-CERT
2. Virtual patching
Security threats, challenges and best practices in ecommerce
Solution ??
? DDOS mitigation service from local
service provider
? In-house solution ??
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
More names ??
Security threats, challenges and best practices in ecommerce
Solution ??
? Application firewalls
? Application penetration testing-in-
house, outsourced. Detailed POC
? Secure code review, secure SDLC
? IDS/IPS
What do hackers get
with all this hacking and
what is their purpose??
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
Security threats, challenges and best practices in ecommerce
More often than not, a Hacker's ultimate goal is Data theft.
Ever wonder what does he/she do with the data? Experts say -
Data theft can be for purposes of blackmail,
espionage, economic gain and more.
The data that is stolen can be financial data (such as
credit card numbers, bank account credentials), personal
data that can further be used for profit (SSN, DOB, etc.),
credentials, private keys and passwords, medical
records, intellectual property (source code, trade secrets,
etc.), the list goes on
Can anyone of us claim
that they are un hackable
?
Solution ??
Secure leak
We have got 2
friends
Encryption
and hashing
How to achieve this
and common
mistakes
Security threats, challenges and best practices in ecommerce
In real world, key is kept
securely not with
treasure
NO ?
Principle 1
? Always keep key
separate
? Use hash wherever possible
Principle 2
Lock should open with
3/multiple keys
? Multi administrator authentication for
critical tasks
Principle 3
Key destroys itself if someone
tries to steal it.
? Use a key encryption box with in built
Physical security.
Principle 4
Even treasure owner cannot see key and
take out key with him but still use it
? Key export disable
? Key not visible from naked eyes
Result ???
Secure leak
Thank You
Happy
mitigating
?

More Related Content

Security threats, challenges and best practices in ecommerce