New Security Considerations for Mobile Commerce
-
Upload
pragati-ogal-rai -
Category
Technology
-
view
982 -
download
1
description
Transcript of New Security Considerations for Mobile Commerce
![Page 1: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/1.jpg)
New Security Considerations in Mobile Commerce
Pragati Ogal RaiMobile Technology Evangelist
X.commerce (an eBay Inc. Company)
![Page 2: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/2.jpg)
X.commerce: Largest Ecosystem of Commerce Capabilities
04/12/2023 2
Consumer Products
Merchant Products
Platform Products
Capabilities
Other Storefronts
X.commerce Fabric
MerchantProducts
OVER 800,000 DEVELOPERSCommunity
![Page 3: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/3.jpg)
Agenda
What is m-commerce?
M-commerce ecosystem
Use cases & security analysis
Standards
Best Practices
![Page 4: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/4.jpg)
Mobile is Changing Commerce
Promotions & coupons
Mobile commerce
Payments
Location-based services
In-store research
Self-scanning & self-checkout
Social commerce
Loyalty
Mobile shopping lists
![Page 5: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/5.jpg)
Mobile is Changing Commerce
Pre-transaction
In-store
Transaction
Post transaction
End-to-end security
![Page 6: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/6.jpg)
So what’s different with m-commerce?
Too many expectations
New market players and dynamics
Limitations of client devices
Portability
Pervasive computing
Location aware devices
Merchant machines
Standardization & approvals
![Page 7: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/7.jpg)
Infrastructure
Clients Merchants
M-commerce Ecosystem
![Page 8: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/8.jpg)
Disconnected: Off-line m-commerce
• Disconnected
• Privacy
• Integrity of State
![Page 9: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/9.jpg)
Partial Connectivity: Infrastructure Centric Model
![Page 10: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/10.jpg)
Partial Connectivity: Merchant Centric Model
![Page 11: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/11.jpg)
Partial Connectivity: Client Centric Model
![Page 12: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/12.jpg)
Partial Connectivity: Security Analysis
End to end security
Privacy
Client-merchant identification
Communication authentication
More points of attack
![Page 13: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/13.jpg)
Full Connectivity
• End to end security
![Page 14: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/14.jpg)
PCI Standard
Standard for payment industry
PCI PTS approved add-on devices
PA DSS approved applications
Working with mobile vendors for further solutions around
mobile payments
![Page 15: New Security Considerations for Mobile Commerce](https://reader033.fdocuments.net/reader033/viewer/2022052523/555ea4fad8b42a6d068b598b/html5/thumbnails/15.jpg)
Best Practices
Understand what mobile means for your business
Security asset identification/ threat analysis
Technology analysis
Be aware of emerging standards
Risk and fraud algorithms