E-COMMERCE SECURITY ELECTRONIC COMMERCE. E-Commerce Security Successful e-tailing requires addressing online security and privacy fears of your online.

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Chapter 11 E-Commerce Security.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Chapter 11 E-Commerce Security
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 E-Commerce Security. © Prentice Hall Learning Objectives 1.Document the rapid rise in computer and network security attacks. 2.Describe.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Chapter 11 E-Commerce Security. Electronic CommercePrentice Hall © Learning Objectives 1.Document the trends in computer and network security attacks.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Chapter 10 E-Commerce Security.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security and Control Brian Mennecke. Planning for Security and Control In today’s net-enabled environment, an increasingly important part of IT planning.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
E-Commerce Security.
C8- Securing Information Systems
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Types of Electronic Infection
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Information Security in Distributed Systems Distributed Systems1.
Chap1: Is there a Security Problem in Computing?.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Chapter 8 E-Commerce Security. Objectives Understand the basic elements of EC security. Explain the basic types of network security attacks.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Pertemuan 20 Materi : Buku Wajib & Sumber Materi :
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Chapter 9 E-Commerce Security and Fraud Protection
Security.
Operating System Concepts
Presentation transcript:

E-COMMERCE SECURITY ELECTRONIC COMMERCE

E-Commerce Security Successful e-tailing requires addressing online security and privacy fears of your online customers 2

The Continuing Need for E- Commerce Security According to the 2014 CyberSecurity Watch Survey; Organizations have experienced significantly more attacks than in previous years. Only 56% of the participants have a plan for reporting and responding to a cybercrime. Insider incidents are more costly than external breaches, according to 67% of respondents 3

The Need for E-Commerce Security (cont…) Survey results (cont…); Almost three-quarters (72%), on average, of the insider incidents are handled internally without legal action. 4

The Need for E-Commerce Security (cont…) 5 Table. Factors Discouraging Consumer for Online Payment

Basic Security Issues What kinds of security questions arise? –From the user’s perspective: How can the user be sure that the Web server is owned and operated by a legitimate company? How does the user know that the Web page and form do not contain some malicious or dangerous code or content? How does the user know that the owner of the Web site will not distribute the information the user provides to some other party? 6

Basic Security Issues (cont…) What kinds of security questions arise? –From the company’s perspective: How does the company know the user will not attempt to break into the Web server or alter the pages and content at the site? How does the company know that the user will not try to disrupt the server so that it is not available to others? 7

Basic Security Issues (cont…) What kinds of security questions arise? –From both parties’ perspectives: How do both parties know that the network connection is free from eavesdropping by a third party “listening” on the line? How do they know that the information sent back-and- forth between the server and the user’s browser has not been altered? 8

Top Security Threats 9

Basic Security Issues (cont…) authentication The process by which one entity verifies that another entity is who he, she, or it claims to be authorization The process that ensures that a person has the right to access certain resources 10

Basic Security Issues (cont…) auditing The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions confidentiality (privacy) Information that is private or sensitive should not be disclosed to unauthorized individuals, entities, or computer software processes 11

Basic Security Issues (cont…) integrity The ability to protect data from being altered or destroyed in an unauthorized or accidental manner is called integrity nonrepudiation The ability to limit parties from refuting that a legitimate transaction took place 12

Figure. General Security Issues at EC Sites 13

Types of Threats and Attacks There are two types: - Nontechnical attack - Technical attacak 14

Types of Threats and Attacks (c…) nontechnical attack An attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network 15

Types of Threats and Attacks (cont…) Nontechnical Attacks: Social Engineering social engineering A type of nontechnical attack that uses social pressures to trick computer users into compromising computer networks to which those individuals have access 16

Types of Threats and Attacks (cont…) Nontechnical Attacks: Social Engineering (cont…) A multipronged approach should be used to combat social engineering Education and training Policies and procedures Penetration testing 17

Types of Threats and Attacks (cont…) technical attack An attack perpetrated using software and systems knowledge or expertise 18

Types of Threats and Attacks (cont…) common (security) vulnerabilities and exposures (CVEs) Publicly known computer security risks, which are collected, listed, and shared by a board of security- related organizations (cve.mitre.org) Among them two has affected the lives of millions: –Distributed denial of service (DDoS) –Malicious code 19

Types of Threats and Attacks (cont…) denial-of-service (DoS) attack An attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources distributed denial-of-service (DDoS) attack A denial-of-service attack in which the attacker gains illegal administrative access to as many computers on the Internet as possible and uses the multiple computers to send a flood of data packets to the target computer 20

Figure. Using Zombies in a Distributed Denial-of-Service Attack 21

Anonymous – January 20,2012 Anonymous has launched distributed denial-of- service attacks against government and corporate sites, including US Department of Justice, FBI and Universal Music. Typically, supporters download software called Low Orbit Ion Canon (LOIC) that directs their computer to repeatedly try to connect to a target Web site. So many digital knocks on the door were shut a site down so no one can get in. 22

Types of Threats and Attacks (cont…) malware A generic term for malicious software A number of factors have contributed to the overall increase in malicious code. Among these factors, the following are paramount: –Mixing data and executable instructions –Increasingly homogenous computing environments –Larger clueless user base 23

Types of Threats and Attacks (cont…) –As the number of attacks increases, the following trends in malicious code are emerging: Increased speed and volume of attacks Reduced time between the discovery of a vulnerability and the release of an attack to exploit the vulnerability Remotely-controlled robot networks E-commerce is the most frequently targeted industry Attacks against Web application technologies are increasing 24

Types of Threats and Attacks (cont…) virus A piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it requires that its host program be run to activate it worm A software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine 25

Managing EC Security Common mistakes in managing security risks: –Undervalued information –Narrowly defined security boundaries –Reactive security management –Dated security management processes –Lack of communication about security responsibilities 26

Managing EC Security (cont…) Security Risk Management A systematic process for determining the likelihood of various security attacks and for identifying the actions needed to prevent or mitigate those attacks –Three phases: Asset identification Risk assessment Implementation 27

Securing EC Communications (cont…) access control (authorization) The process that ensures that a person has the right to access certain resources authentication The process by which one entity verifies that another entity is who he, she, or it claims to be Two-factor authentication 28

Securing EC Communications passive tokens Storage devices (e.g., magnetic strips) that contain a secret code used in a two-factor authentication system active tokens Small, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system 29

Securing EC Communications (cont…) biometric systems Authentication systems that identify a person by measurement of a biological characteristic, such as fingerprints, iris (eye) patterns, facial features, or voice 30

Securing EC Communications (cont…) public key infrastructure (PKI) A scheme for securing e-payments using public key encryption and various technical components encryption The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time- consuming for an unauthorized person to unscramble (decrypt) it 31

Securing EC Communications (cont…) Credit card number is encrypted while it travels through the network (plaintext) - A number is added to each number in the card (encryption algorithm) - For example, add 4 (the key) to each number - The original number becomes (chippertext) 32

Securing EC Communications (cont…) Digital Signatures digital signature An identifying code that can be used to authenticate the identity of the sender of a document 33

Securing EC Communications (cont…) digital certificate Verification that the holder of a public or private key is who he or she claims to be certificate authorities (CAs) Third parties that issue digital certificates 34

Securing EC Communications (cont…) Secure Socket Layer (SSL) Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality Transport Layer Security (TLS) As of 1996, another name for the SSL protocol 35

36 Digital Certificate - VeriSign

37

Summary of Security Efforts Digital Certificate –Verification of a legitimate Web site SSL – Encyrption of sensitive information while travelling through the Web Digital signature – Verification of the identity of the data sender (including ) https – Indication of a secure Web site 3D Secure – Verification of the identity of the card holder 38

Securing EC Networks The selection and operation of available technologies should be based on certain design concepts, including: –Layered security –Controlling access –Role-specific security –Monitoring –Keep systems patched –Response team 39

Figure. Layered Security 40

Securing EC Networks (cont…) firewall A network node consisting of both hardware and software that isolates a private network from a public network packets Segments of data and requests sent from one computer to another on the Internet; consist of the Internet addresses of the computers sending and receiving the data, plus other identifying information that distinguish one packet from another 41

Securing EC Networks (cont…) packet filters Rules that can accept or reject incoming packets based on source and destination addresses and the other identifying information packet-filtering routers Firewalls that filter data and requests moving from the public Internet to a private network based on the network addresses of the computer sending or receiving the request 42

Securing EC Networks (cont…) –Some examples of rules are as follows; Block all packets sent from a given Internet address Block any packet coming from the outside that has the address of a computer on the inside 43

44

Securing EC Networks (cont…) personal firewall A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card. 45

Securing EC Networks (cont…) intrusion detection systems (IDSs) A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees 46

Securing EC Networks (cont…) demilitarized zone (DMZ) Network area that sits between an organization’s internal network and an external network (Internet), providing physical isolation between the two networks that is controlled by rules enforced by a firewall 47

Securing EC Networks (cont…) honeynet A way to evaluate vulnerabilities of an organization by studying the types of attacks to which a site is subjected using a network of systems called honeypots honeypots Production systems (e.g., firewalls, routers, Web servers, database servers) designed to do NO real work but that are watched and studied as network intrusions occur 48

49 Security Threats and Precautions