Assalamualaikum, Ahlan Wa Sahlan.
Annyeonghaseyo. Bienvenidos. Huan Ying.
Welcome to our blog!!!!
For E-Ticketing System, the biggest security threats are from internal threats (empolyees), hardware and software failure.
- Internal Threats from employees where employees have access to privileged information, and in the presence of internal sloppy security procedures, they are often able to roam throughout the organization's system without leaving a trace.
- Hardware failure causes from electrostatic discharge when open supercomputer to install new hardware, dust, overheat and bad hard disk sectors.
- Software failure causes from bug. The main source of bug is the complexity of decision-making code. Important programs within E-Ticketing system is usually much larger, containing tens of thousands or millions of lines of codes, each with many times the choices and paths of the smaller programs.
The solutions for these security threats of E-Ticketing system are:
- For internal threats, KTB SDN. BHD. strictly need to ensure which of the employees should have the access to privileged information. They also can implement the system which can trace who are accessing the information automatically.
- For hardware failure, to prevent ESD is to use a grounding wrist strap or stand on a grounding mat when open the supercomputer's case. Put the hardware in the disclosure space and clean up regularly with specific standard. Put extra cooling parts in the hardware components and have proper maintenance to prevent bad hard disk sectors.
- For software failure, KTB Sdn. Bhd. can request to the software vendor creates small pieces of software called PATCHES to repair the flaws without disturbing the proper operation of the software.
For corporate server such as bank and agents, the security threats are hacking, fraud and Denial-of-Service Attacks (DoS).
- The outsider intends to gain unauthorized access to a computer system. They unauthorized access by finding weakness in the security protections employed (agents and bank) by Web sites and computer systems. They also often taking advantage of various features of the Internet that make it an open system and easy to use.
- For DoS, hackers flood a network server of Web server with many thousand of false communications or request for services to crash the network. They often cause a Web site to shut down, making it impossible for legitimate users to access the site.
- Fraud happens when the bank system cannot trace serial number of the credit card during the transaction of the payment. So that, the bank approve the transaction of the payment.
The solutions for these security threats of the agents and banks :
- The systems using by agents should have password protected. It prevent the hackers to hack into the systems and steal data. Further more, they should using biometric authentication such as finger prints to identify person incharge for the systems.
- Preventing DoS Attacks, the agents can use dotDefender web application firewall. It can inspects the HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications from being exploited.
- The bank should have better security system in order to detect the fake credit card. If the customer purchase the online ticket with the fake credit card, during the transaction the bank should be able to detect within faster time and block the transaction and approval of purchasing ticket.
For customer, security threats facing by them are spyware,computer virus, and sniffing:
- Customers at the client layer can cause harm by spyware such as Keyloggers. Keyloggers record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to e-mail accounts, to obtain password to protected computer system, or to pick up personal information such as credit card numbers. This is because some customer used credit card to pay their online ticket.
- Besides that, customer at the client layer can cause harm by computer virus. A computer virus is rogue software program that attaches itself to other software program or data files in order to be executed, usually without user knowledge or permission. Sometime viruses can attack on customer e-mail. Examples of viruses are,Trojan horses, email viruses, network virus.
- Sniffer is a type of eavesdropping program that monitor information traveling over a network. When used for criminal purposes, they can be damaging and very difficult to detect. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential report.
The solutions for these security threats of the spyware,computer virus, and sniffing:
- To prevent Keylogger threat, customers can install anti-spyware programs. Good anti-spyware will protect your computer from Keylogger.
- Customers can install anti-virus in their computers and mobile phones to prevent this problem. Customers also should update their anti-virus for effective virus protection.
- Then, to overcome the last threat is establish an encrypted tunnel between your computers and a trusted network. for example VPN. this encrypts any and all traffic from your computers to any destination over the untrusted part of it's journey. Use only applications that encrypt their communication like HTTPS. this encrypts your communications with just that application over the whole journey.
That's all from us for this project assignment. We have learning a lot about the information system and how it works to the company to run their business.
Thanks very much for Dr. Saadiatul Ibrahim for the guidances and suppots in completing this project. We hope what we have learned in this subject and project will help us to be a better person as well as we can help our organization when we are working later.
Adios. Maasalama. Goodbye!!!! <3
Thanks very much for Dr. Saadiatul Ibrahim for the guidances and suppots in completing this project. We hope what we have learned in this subject and project will help us to be a better person as well as we can help our organization when we are working later.
See you again... :))))
Zai Jian. Annyeonghigeseyo.
Adios. Maasalama. Goodbye!!!! <3
" Do not judge a person from what he/she is doing because you also have to know the reason why he/she did it"
Publish by : Zhu Qi Long















