WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

E-commerce capabilities assessment: -security of e-payment systems- case of the democratic republic of congo

( Télécharger le fichier original )
par Espérant Ngongo Mbuli
University of Walles - Master in Advanced information technology and Business Management 2013
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

VII.1 List of abbreviation

ACH Automatic clearing house

ATM Automated teller machine

AVS Address verification system

B2B Business-to-business e-commerce

B2C Business-to-consumer e-commerce

C Consumer-to-consumer e-commerce

CEO Chief executive officer

CIA Confidentiality, integrity, availability

COO Chief operation officer

CVN Card verification number

DBMS Database management system

DMZ Demilitarized zone

DOS Denial-of-service

DRC Democratic republic of Congo

E-CASH Electronic cash

E-CHECK Electronic check

E-COMMERCE Electronic commerce

ICT information and communication technologies

IDS Intrusion detection system

IEC International electro technical commission

IS Information systems

ISMS International security management system

ISO International standards organization

ISP Internet service provider

IT Information technology

LAN Local area network

M-payment Mobile payment

PDA Personal device assistant

PSP Processing service provider

VPN Virtual private network

Page | 58

VII.2. List of figures

Figure 1: From of e-commerce

Figure 2: E-commerce framework

Figure 3: Initial structure of IT capabilities

Figure 4: IT infrastructure components

Figure 5: Level of acceptable security for e-commerce

Figure 6: Layered security

Figure 7: DMZ deployment

Figure 8: Processing of card transaction

Figure 9: E-checking processing using Authorize..net

VII.3. List of tables

Table 1: Qualitative vs quantitative research methodologies

Table 2: Types of central tendency measures

Table 3: Repartition of respondents per working experience

Table 4: Repartition of respondents per position

Table 5: E-payment methods reported

Table 6: List of issues faced by e-payment systems

Table 7: Confidentiality elements

Table 8: Score of Integrity check of the firewall configuration

Table 9: Frequency table of integrity check of firewall configuration

Table 10: System integrity result

Table 11: Report of unauthorized attempts to sensitive data

Table 12: Additional physical access control score

Table 13: Frequency distribution of physical access control

Table 14: Availability capabilities

Table 15: Summary of the security capabilities

P a g e | 59

VII.4. Data Collection questionnaire

Brief Overview

The aim of this questionnaire is to assess the security of the e-payment systems in Democratic republic of Congo in accordance to the confidentiality, integrity and availability concepts of the security of an information system. Because it's for an academic dissertation, only a sample of relevant questions has been selected for quantitative analysis purpose.

Select only one response unless otherwise stated A. Generality

Question 1

Are you interested by the result of this assessment?

1: No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 2: Personal information

Position in the company:

Sex :

Years of experience:

Company name:

Question 3

Are you familiar with electronic payment systems?

1 : No 2 : Not sure 3 : Not applicable 4 : yes 5 : Most familiar

Question 4

Does your organization used or commercialize an e-payment system?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 5 (select all which applied)

Which product are you offering to your clients?

1 : None 2: Not sure 3 : Visa card 4: Mastercard 5 : electronic check

6 : electronic cash 7 : Online banking (e-banking) 8: Mobile payment (M-payment)

9 : Other : (cite) ----------------------------------------------------------------------------------------------------------

Question 6

During the last past twelve months, have you faced some issues related to the use of one of the e-products you are offering to your clients?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 7 (select all which applied)

Please select which issue have you encountered

1 : Fraud 2 : Not sure 3:Theft 4 : service unavailability

5 : disclosure of confidential information 6 : misuse of information 7 : falsification

8 : Other (cite) ------------------------------------------------------------------------------------------------------

Page | 60

Question 8

Does any written security policy exist related to electronic transaction?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 9

Is the written security policy shared to your clients?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

B. Confidentiality

Question 10

Are all connections between the organization's networks and external third party or public wide area IP networks made via a formally authorized firewall (or have equivalent approved controls over the data and protocols which are allowed through)?

1 : No 2 : Not sure 3:No firewall used 4 : Not applicable 5 : No external connection
6 : yes

Question 11

Does your main internet connection use a router?

1 : No 2 : Not sure 3 : Not applicable 4 : No internet connection 5 : yes

Question 12

Is remote access to the management port of the router or firewall strictly restricted?

1: No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 13

How often is the router or firewall configuration checked for integrity?

1 : Never 2: Not sure 3 : monthly 4 : weekly 5 : Not applicable 6 : Daily

Question 14

Are the firewalls configured to default to reject everything, only accepting those protocols that are explicitly required, to those IP addresses which specifically require them?

1 : No 2 : Not sure 3 : No opinion 4 : Not applicable 5 : Yes

Question 15

Is the logical access to firewalls (admin user logons, etc) subject to tight restrictions and authentication... and is this regularly reviewed?

1 : No 2 : not sure 3 : No opinion 4 : partially 5 : Yes

Page | 61

Question 16

How is encryption being applied on your network infrastructure?

1 : No encryption 2 : Not sure 3 : LAN and PC resident program

4 : Hardware Cryptographic Device 5 : hardware cryptographic device and software resident
program

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Entre deux mots il faut choisir le moindre"   Paul Valery