ASSIGNMENT
By
DHEERAJ
KUMAR
2022E1R068
Semester – 5th
BBALLB
Model Institute of Engineering & Technology (Autonomous) (Permanently Affiliated to the
University of Jammu, Accredited by NAAC with “A” Grade) Jammu, India
2024
Q1 Examine the preventive measures for common e-commerce security threats. Recommend a multi-layered
approach for enhanced security.
Introduction to E-Commerce Security Threats
E-commerce platforms face various security challenges that can jeopardize sensitive data and customer trust.
Addressing these threats is critical for a secure online shopping experience.
1. Common Security Threats in E-Commerce
2. Data Theft: Hackers stealing private information like credit card numbers.
3. Account Hijacking: Unauthorized access to customer accounts using stolen login credentials.
4. Payment Scams: Fraudulent transactions, such as fake purchases or card misuse without the physical presence of
the card.
4. Phishing: Deceiving users through fake communications to obtain personal or financial details.
The Need for a Multi-Layered Security Approach
1. Layered Protection: A multi-layered defense ensures that if one layer is compromised, others remain intact to provide
security.
2. Building Trust: Customers are more likely to trust platforms that prioritize safeguarding their personal and
financial data.
Multi-Layered Security Framework
1.SSL/TLS Encryption
Purpose: Prevents data interception during transmission.
How It Works: Encrypts the connection between the user's browser and the server.
Example: Websites using HTTPS ensure secure communication.
2.Multi-Factor Authentication (MFA)
Purpose: Prevents unauthorized access even if passwords are stolen.
How It Works: Requires additional verification steps, such as a one-time code or fingerprint.
3.Secure Payment Systems
Purpose: Protects against fraudulent transactions and misuse of payment details.
How It Works: Routes payments through trusted third-party systems, avoiding local storage of sensitive information.
4.Web Application Firewall (WAF)
Purpose: Defends against attacks like SQL injection, XSS, and DoS.
How It Works: Monitors and filters incoming traffic to block malicious activities.
5.Anti-Fraud and Anti-Malware Tools
Purpose: Detects and prevents fraudulent activities and malware infections.
How It Works: Leverages machine learning to identify suspicious behaviors and patterns.
5. Set Up Firewall Rules
Most routers have built-in firewalls that can block suspicious traffic. Ensure these are configured properly and turned on.
6. Regular Firmware Updates
Keep the router firmware updated regularly to protect against vulnerabilities.
centralized Security Management System
1.Monitoring: Oversees all incoming and outgoing traffic.
2.Threat Response: Reacts to real-time alerts and security incidents.
Encryption and Threat Detection Layer
1 Purpose: Ensures safe data handling and monitors for abnormal activities in real-time.
Conclusion
1 Comprehensive Protection: A multi-layered approach strengthens security across all touch points
2.Customer Trust: Enhanced security fosters user confidence and loyalty.
3.Adaptability: Regular updates to security protocols help mitigate emerging threats.
Q2 :- Evaluate the security practices for Wi-Fi networks in both home and corporate environments. What configurations are essential to
secure WiFi networks?
To evaluate the security practices for Wi-Fi networks in both home and corporate environments, it’s essential to break
down the key components that ensure a secure and reliable network setup. Below is an overview of the important Wi-Fi
security practices, configuration techniques.
Wi-Fi Network Security in Home and Corporate Environments
1. Home Wi-Fi Security Practices
In a home network, the main goal is to secure personal data and prevent unauthorized access to your Wi-Fi. The
following practices are vital:
Strong Passwords: Set a strong password for your Wi-Fi network. Use a mix of uppercase, lowercase, numbers, and
special characters. The password should be unique and not easily guessable.
Encryption: Use WPA3 (Wi-Fi Protected Access 3), which is the most secure encryption standard for home networks.
If your router doesn’t support WPA3, opt for WPA2.
SSID Management: Change the default SSID (Service Set Identifier) to a unique name that does not identify your
home or router model. Also, consider hiding the SSID, so it doesn’t broadcast to the public.
Disable WPS (Wi-Fi Protected Setup): WPS, although convenient, can be vulnerable to attacks. Disabling it adds an
extra layer of security.
Use a Guest Network: Set up a separate guest network for visitors to isolate their devices from your primary network.
This keeps your personal data and devices secure.
Firmware Updates: Regularly update your router’s firmware to patch vulnerabilities and improve overall security.
Network Monitoring: Monitor connected devices to ensure there are no unauthorized users. Some routers offer apps
to help with this.
2. Corporate Wi-Fi Security Practices
Corporate Wi-Fi environments require even stricter security due to the sensitive nature of the data and the number of
connected devices. The practices below should be followed:
Enterprise-Level Encryption (WPA2-Enterprise/WPA3-Enterprise): Unlike home networks that typically use WPA2 or
WPA3 personal encryption, corporate networks should use WPA2-Enterprise or WPA3-Enterprise, which involves using
RADIUS servers to authenticate users.
RADIUS Authentication: This centralized authentication system ensures that only authorized employees can connect to the
corporate Wi-Fi network. It is a more secure option than simple password-based methods.
Network Segmentation: Segmenting the network into different zones (e.g., separate networks for HR, finance, etc.)
prevents attackers from accessing sensitive data across the entire organization if one device is compromised.
VPN (Virtual Private Network): Corporate employees should be required to use a VPN when accessing the network
remotely to ensure data encryption and secure tunneling over the internet.
MAC Address Filtering: Corporate networks can limit access to specific devices by only allowing known MAC addresses.
However, this method is not foolproof as MAC addresses can be spoofed.
Regular Audits and Monitoring: Corporate networks should undergo regular audits to ensure compliance with security
policies. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) should be in place to detect and block
unauthorized access attempts.
Guest Network for Visitors: Just like in a home environment, it’s crucial to have a guest network for visitors or contractors.
It keeps external users from accessing critical company resources.
Strong Authentication and Access Control: Ensure that users are authenticated using multi-factor authentication (MFA)
where applicable. Restrict access to sensitive resources based on the user role.
Essential Configuration for a Secure Wi-Fi Network
1. Change Default Router Settings
Routers come with default usernames and passwords, which are well-known and easily exploitable. Always change them
immediately to a secure, custom configuration.
2. Use Strong Encryption
WPA3: The latest standard, offers the best security.
WPA2: If WPA3 is not available, WPA2 is the next best option.
3. Create a Strong Wi-Fi Password
A strong password should be at least 12-16 characters long, combining upper and lowercase letters, numbers, and symbols.
4. Disable Remote Management
If remote management is not necessary, it should be disabled to prevent external access to your router settings.
5. Set Up Firewall Rules
Most routers have built-in firewalls that can block suspicious traffic. Ensure these are configured properly and turned on.
6. Regular Firmware Updates
Keep the router firmware updated regularly to protect against vulnerabilities.
Understanding Wi-Fi Technology
Wi-Fi is a technology that allows devices to connect to the internet wirelessly using radio waves. It operates using the IEEE 802.11 standards, with
different versions offering varying speeds and ranges.
The Wi-Fi network typically involves the following components:
Router: This device connects to your internet service provider and allows devices to connect wirelessly.
Access Point (AP): The AP acts as the intermediary that broadcasts the Wi-Fi signal.
Devices: These include smartphones, laptops, tablets, and any other device that connects to the Wi-Fi network.
Wi-Fi operates on several frequency bands, including:
-2.4 GHz: This band offers a longer range but slower speeds.
-5 GHz: A faster band with a shorter range, typically used for devices that require high-speed internet.
Conclusion
In both home and corporate environments, Wi-Fi security is critical to ensure the protection of sensitive data and resources. By following best
practices such as strong encryption, password management, network segmentation, and device monitoring, both individuals and businesses can
ensure their Wi-Fi networks are secure from unauthorized access and potential attacks. Proper configuration of Wi-Fi routers and access points
further strengthens security and prevents common vulnerabilities.
Corporate Wi-Fi Security
Challenges in Corporate Wi-Fi
•Many devices and people make it easier for hackers to find a way in.
•Important business information is often sent through the Wi-Fi.
•There could be threats from inside the company or devices that have been hacked.
Best Practices for Corporate Wi-Fi Security
Enterprise Encryption (WPA2/WPA3-Enterprise)
•Use a RADIUS server for strong security checks.
Network Segmentation
•Create separate networks for different groups (like HR, IT, and Guests) to control who can access what.
Multi-Factor Authentication (MFA)
•Ask for MFA to verify devices and users trying to join the network.
Virtual Private Network (VPN)
•Use VPNs to protect data for employees working from home who need to access the company network.
Regular Audits and Monitoring
•Check security regularly and use tools to spot any unusual activity.
Guest Networks for Visitors
•Make sure visitors or contractors use separate networks so they can't access important information.
Essential Wi-Fi Security Configurations
1. Adjust Basic Settings
Change the Default Admin Login: Stop unauthorized users from accessing your router's settings.
Turn Off Remote Management: Only let changes to the network be made from inside your home network.
2. Choose Strong Security
WPA3 (Best Option): Provides strong encryption and protection against hacking attempts.
WPA2: Use this if WPA3 isn't available.
3. Keep Software Updated
Regularly update your router's software to fix problems and improve its performance.
4. Turn On Firewall
Use your router's firewall to block unwanted access.
5. Use MAC Address Control
Only let certain devices connect to your network. This isn't perfect, but it adds an extra security step.
6. Set Up Intrusion Detection
Watch for unusual activities, like unauthorized access attempts.
Conclusion
Summary of Key Points
Wi-Fi networks, whether for home or work, are important for staying connected but can be at risk if not protected.
For home networks, use strong passwords, WPA3 encryption, and set up guest networks.
For work networks, more advanced steps are needed, such as RADIUS authentication, dividing the network into parts, and regular checks.
Benefits of a Secure Wi-Fi Network
1. Safeguards important personal and business information.
2. Lowers the chances of unwanted access.
3. Builds trust among users in workplace settings.