Implementing Security for Electronic Commerce

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

Implementing Electronic Commerce Security Gary Schneider, 2003
Enabling Secure Internet Access with ISA Server
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
5/4/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of Pennsylvania.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Implementing Electronic Commerce Security
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 10: Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Implementing Security for Electronic Commerce
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Implementing Security for Electronic Commerce
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Chapter 10: Electronic Commerce Security
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Security Threats to Electronic Commerce
12/15/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
1 E-Commerce Security Part II – Security Techniques.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security on the Internet and the Web
Chapter 40 Internet Security.
TOPIC: HTTPS (Security protocol)
Chapter 5 Electronic Commerce | Security Threats - Solution
Digital Signatures.
Instructor Materials Chapter 5 Providing Network Services
SSL Certificates for Secure Websites
Secure Sockets Layer (SSL)
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security Threats - Solution
Using SSL – Secure Socket Layer
12 E-Commerce Overview.
* Essential Network Security Book Slides.
Pooja programmer,cse department
Process-to-Process Delivery:
The Secure Sockets Layer (SSL) Protocol
AbbottLink™ - IP Address Overview
Chinese wall model in the internet Environment
Chapter 7 Network Applications
Electronic Payment Security Technologies
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

Implementing Security for Electronic Commerce

Protecting Electronic Commerce Assets You cannot hope to produce secure commerce systems unless there is a written security policy What assets are to be protected What is needed to protect those assets Analysis of the likelihood of threats Rules to be enforced to protect those assets

Protecting Electronic Commerce Assets Both defense and commercial security guidelines state that you must protect assets from Unauthorized disclosure Modification Destruction Typical security policy concerning confidential company information Do not reveal company confidential information to anyone outside the company

Minimum Requirements for Secure Electronic Commerce Figure 6-1

Protecting Intellectual Property The dilemma for digital property is how to display and make available intellectual property on the Web while protecting those copyrighted works

Companies Providing Intellectual Property Protection Software ARIS Technologies (part of verance.com) Digital audio watermarking systems Embedded code in audio file uniquely identifying the intellectual property Digimarc Corporation Watermarking for various file formats Controls software and playback devices

Companies Providing Intellectual Property Protection Software SoftLock Services Allows authors and publishers to lock files containing digital information for sale on the Web Posts files to the Web that must be unlocked with a purchased ‘key’ before viewing Digitalgoods.com infrastructure and integrated services necessary to securely market and distribute multimedia digital content to its maximum audience

Protecting Client Computers Active content, delivered over the Internet in dynamic Web pages, can be one of the most serious threats to client computers Threats can hide in Web pages Downloaded graphics and plug-ins E-mail attachments

Protecting Client Computers Cookies Small pieces of text stored on your computer and contain sensitive information that is not encrypted Anyone can read and interpret cookie data Do not harm client machines directly, but potentially could still cause damage Misplaced trust Web sites that aren’t really what they seem and trick the user into revealing sensitive data

Digital Certificates Also known as a digital ID An attachment to an e-mail message Embedded in a Web page Serves as proof that the holder is the person or company identified by the certificate Encoded so that others cannot read or duplicate it

VeriSign -- A Certification Authority Figure 6-3

VeriSign Oldest and best-known Certification Authority (CA) Offers several classes of certificates Class 1 (lowest level) Bind e-mail address and associated public keys Class 4 (highest level) Apply to servers and their organizations Offers assurance of an individual’s identity and relationship to a specified organization

Structure of a VeriSign Certificate Figure 6-4

Microsoft Internet Explorer Provides client-side protection right inside the browser Reacts to ActiveX and Java-based content Authenticode verifies the identity of downloaded content The user decides to ‘trust’ code from individual companies

Security Warning and Certificate Validation Figure 6-5

Internet Explorer Zones and Security Levels Figure 6-6

Internet Explorer Security Zone Default Settings Figure 6-7

Netscape Navigator User can decide to allow Navigator to download active content User can view the signature attached to Java and JavaSript Security is set in the Preferences dialog box Cookie options are also set in the Preferences dialog box

Setting Netscape Navigator Preferences

A Typical Netscape Navigator Java Security Alert Figure 6-9

Viewing a Content Provider’s Certificate Figure 6-10

Dealing with Cookies Can be set to expire within 10, 20, or 30 days Retrievable only by the site that created them Collect information so that the user doesn’t have to continually enter usernames and passwords to access Web sites Earlier browsers simply stored cookies without comment Today’s browsers allow the user to Store cookies without permission or warning Receive a warning that a cookie is about to be stored Unconditionally disallow cookies altogether

Protecting Electronic Commerce Channels Protecting assets while they are in transit between client computers and remote servers Providing channel security includes Channel secrecy Guaranteeing message integrity Ensuring channel availability Authentication

Providing Transaction Privacy Encryption The coding of information by using a mathematically based program and secret key to produce unintelligible characters Steganography Makes text invisible to the naked eye Cryptography Converts text to strings that appear to have no meaning

Encryption 40-bit keys are considered minimal,128-bit keys provide much more secure encryption Encryption can be subdivided into three functions Hash Coding Calculates a number from any length string Asymmetric (Public-key) Encryption Encodes by using two mathematically related keys Symmetric (Private-key) Encryption Encodes by using one key, both sender and receiver must know

Hash Coding, Private-key, and Public-key Encryption Figure 6-11

Significant Encryption Algorithms and Standards Figure 6-12

Guaranteeing Transaction Delivery Neither encryption nor digital signatures protect packets from theft or slowdown Transmission Control Protocol (TCP) is responsible for end-to-end control of packets TCP requests that the client computer resend data when packets appear to be missing

Protecting the Commerce Server Access control and authentication Controlling who and what has access to the server Requests that the client send a certificate as part of authentication Server checks the timestamp on the certificate to ensure that it hasn’t expired Can use a callback system in which the client computer address and name are checked against a list

Protecting the Commerce Server Usernames and passwords are the most common method of providing protection for the server Usernames are stored in clear text, while passwords are encrypted The password entered by the user is encrypted and compared to the one on file

Logging On With A Username And Password Figure 6-16

Operating System Controls Most operating systems employ username and password authentication A common defense is a firewall All traffic from inside to outside and outside to inside must pass through it Only authorized traffic is allowed The firewall itself must be immune to penetration

Firewalls Should be stripped of any unnecessary software Categories of firewalls include Packet filters Examine all packets flowing through the firewall Gateway servers Filter traffic based on the requested application Proxy servers Communicate on behalf of the private network Serve as a huge cache for Web pages

Firewalls ftp: 21 OSI ftp: 21 telnet: 23 smtp: 25 http: 80 Site 1 Traffic Cop Internet Site 1 ftp: 21 Site 2 OSI ftp: 21 Application telnet: 23 Presentation Session smtp: 25 Transport Network Data Link http: 80 Physical

Check Point Software’s Firewall-1 Web Page Figure 6-17