Copyright 2008-12 1 COMP 3410 – I.T. in Electronic Commerce eSecurity Mobile Security Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U.

Slides:



Advertisements
Similar presentations
A Risk Assessment Framework for Mobile Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong Kong, Cyberspace.
Advertisements

Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Copyright COMP 3410 – I.T. in Electronic Commerce eTrading 2 Technologies Underlying eTrading Roger Clarke Xamax Consultancy, Canberra Visiting.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
1
Copyright COMP 3410 / 6341 – I.T. in Electronic Commerce E-Trading 3.Electronic Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor,
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Copyright, Issues from Internet Technologies 1 – Internet Connected Devices Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW
Copyright A Risk Assessment Framework for Mobile Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science at.
Distributed Systems Architectures
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
European Consumer Summit 2014 On-line and mobile payments Dr Florent Frederix Trust & Security Unit, DG CONNECT, European Commission 1 th of April 2014.
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
Impressive Star Softwares (P) Ltd. Presents User Wise Restricted Day Book Access ( 1.0 )
Impressive Star Softwares (P) Ltd. Presents Sent Item Box-Detail of Mails from Tally ( 1.0 )
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
1 Daily ATM/Debit Maintenance through CU*BASE A Preview of ATM and Debit Card Maintenance Screens Prepared June 24, 2009.
The ABCs of Credit Card Finance Essential Facts for Students 2012 Carol A. Carolan, Ph.D.
Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014.
1 CIFTlab1.2 Software for Clinical Diagnostic Laboratories 1.
Activity 1………….Why Do You Need A Bank?
Activity 1………….Why Do You Need A Bank? Activity 2………The Many Services of a Bank Activity 3…The ABCs of a Chequing Account Activity 4………Opening a Chequing.
A sample problem. The cash in bank account for J. B. Lindsay Co. at May 31 of the current year indicated a balance of $14, after both the cash receipts.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Discovering Computers Fundamentals, 2012 Edition
PP Test Review Sections 6-1 to 6-6
Employee & Manager Self Service Overview
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
Results from a Mobile Finance Survey. 2 2 Second survey sponsored by CheckFree with fieldwork in April 2008; First survey completed in March ,007.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 Presenter: Josh Stuckey, Manager Harris County Permits Northwest Freeway Suite 120 Houston, Texas
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
Analyzing Genes and Genomes
Essential Cell Biology
Information Security Management Chapter “We Have to Design It for Privacy and Security.” Copyright © 2014 Pearson Education, Inc. Publishing.
PSSA Preparation.
Chapter 11: E-Commerce.
Essential Cell Biology
Energy Generation in Mitochondria and Chlorplasts
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Introduction to computer
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright COMP 2410 – Networked Information Systems SC3 – Mobile Security Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Copyright, COMP 3410 – I.T. in Electronic Commerce eSecurity Security of Information and IT Roger Clarke Xamax Consultancy, Canberra Visiting.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Mobile Payment Protocol 3D by Using Cloud Messaging
Can Mobile Payments be 'Secure Enough'
Presentation transcript:

Copyright COMP 3410 – I.T. in Electronic Commerce eSecurity Mobile Security Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. ETSecy4 {.html,.ppt} ANU RSCS, 16 October 2012

Copyright Mobile Security Agenda 1.Mobile Technology Devices Wireless Comms 2.Mobile Technology Users 3.Mobile Payments 4.Risk Assessment for Mobile Payments 5.Risk Assessment for Contactless Chips

Copyright Mobile Devices 'Any device that provides users with the capacity to participate in Transactions with Adjacent and Remote devices by Wireless Means' Mobiles / Smartphones Handheld Computing Devices PDAs, games machines, music-players, 'converged' / multi-function devices, Tablets esp. iPad but now many followers Processing Capabilities in Other 'Form Factors' Credit-cards, RFID tags, subcutaneous chips Wearable Computing Devices Watches, finger-rings, key-rings, glasses, necklaces, bracelets, anklets, body-piercings ? Nomadic / Untethered PCs

Copyright Wireless Comms and Mobile Security in 2011 Wide Area Networks – Satellite Geosynchronous (2 second latency) Low-Orbit (Iridium) Wide Area Networks – WiMax / IEEE ; iBurst Wide Area Networks – Cellular (0.5 to 20km per cell) 1 – Analogue Cellular, e.g. AMPS, TACS 2 – Digital Cellular, e.g. GSM, CDMA 3 – GSM/GPRS/EDGE, CDMA2000, UMTS/HSPA 4G – LTE, with preliminary versions imminent Local Area Networks – WiFi / x (10-100m radius) Personal Area Networks – Bluetooth (1-10 m radius) Contactless Cards / RFID Tags / NFC (1-10cm radius)

Copyright Mobile Technology Users Dimensions of Differentiation Education, Income, Wealth Infrastructure Availability Technical Capability

Copyright Mobile Technology Users Dimensions of Differentiation Education, Income, Wealth Infrastructure Availability Technical Capability Opportunity-Awareness Leadership / Followership Risk-Awareness, Risk-Aversion

Copyright Mobile Technology Users Dimensions of Differentiation Education, Income, Wealth Infrastructure Availability Technical Capability Opportunity-Awareness Leadership / Followership Risk-Awareness, Risk-Aversion Age / 'Generation'

Copyright The 'Generations' of Computing Consumers Indicative Indicative GenerationBirth-YearsAge in 2011 Silent / Seniors Baby Boomers – Early Baby Boomers – Late Generation X Generation Y The iGeneration

Copyright Generational Differences Baby Boomers (45-65) Handshake/phone, PCs came late, had to adapt to mobile phones Work is Life, the team discusses / the boss decides, process-oriented GenXs (30-45) Grew up with PCs, and mobile phones, hence multi-taskers Work to Have More Life, expect payback from work, product-oriented GenYs (15-30) Grew up with IM/chat, texting and video-games, strong multi-taskers Life-Work Balance, expect fulfilment from work, highly interactive iGens (to 15) Growing up with texting, multi-media social networking, networked games, multi-channel immersion / inherent multi-tasking ?Life before Work, even more hedonistic, highly (e-)interactive

Copyright Mobile Payments Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC)

Copyright Mobile Payments Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC) eCommerce Purchases of physical goods and services at virtual points of sale (Internet, Cellular phone)

Copyright Mobile Payments Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC) eCommerce Purchases of physical goods and services at virtual points of sale (Internet, Cellular phone) MCommerce Purchases of digital goods and services, such as image, audio and video, and location-specific data

Copyright Mobile Payments Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC) eCommerce Purchases of physical goods and services at virtual points of sale (Internet, Cellular phone) MCommerce Purchases of digital g&s, such as image, audio and video, and location-specific data Consumer-to-Consumer (C2C) Transfers of value between individuals

Copyright Risk Assessment for Mobile Payments (0)The Mainstream Security Model (1)The Technical Architecture (2)The Commercial Architecture (3)The Transaction Process Aspect (4)The Harm Aspect (5)The Vulnerability Aspect (6)The Threat Aspects (7)The Safeguards Aspect

Copyright (0)The Mainstream Security Model Abstract Threats Become Actual Threatening Events, Impinge on Vulnerabilities, Overcome Safeguards & Cause Harm Security is a (desirable) condition in which Harm does not arise because Threats are countered by Safeguards

Copyright (1)The Technical Architecture Indicative Model

Copyright (2)Commercial Architecture Customer/Payer Seller/Payee Payment Handler Delivery Handler Customer Support Internet Online Trading Protocol (IOTP):

Copyright (2)Commercial Architecture Customer/Payer Seller/Payee Payment Handler Delivery Handler Customer Support BUT ALSO... Internet Access Providers (IAPs) Carriage Service Providers (CSPs) Commercial Intermediaries, e.g. Paypal Transaction Service Providers e.g. banks and credit-card companies Payment Services Providers, e.g. deposit-holders, lenders and insurers Regulators and complaints bodies e.g. financial services ombudsmen Consumer Rights representative and advocacy organisations Consumer Segments, e.g. the mobility- disadvantaged, the sight-impaired, people with limited financial assets Internet Online Trading Protocol (IOTP):

Copyright (3)The Transaction Process Aspect From Herzberg (2003), p. 56

Copyright (4)The Harm Aspect Injury to Persons Damage to Property Loss of Value of an Asset

Copyright (4)The Harm Aspect Injury to Persons Damage to Property Loss of Value of an Asset Breach of Personal Data Security, or Privacy more generally Financial Loss

Copyright (4)The Harm Aspect Injury to Persons Damage to Property Loss of Value of an Asset Breach of Personal Data Security, or Privacy more generally Financial Loss Inconvenience and Consequential Costs arising from Identity Fraud Serious Inconvenience and Consequential Costs arising from Identity Theft Loss of Reputation and Confidence

Copyright (5)The Vulnerability Aspect The Environment Physical Surroundings Organisational Context Social Engineering The Device Hardware, Systems Software Applications Server-Driven Apps (ActiveX, Java, AJAX, HTML5) The Device's Functions: Known, Unknown, Hidden Software Installation Software Activation Communications Transaction Partners Data Transmission Intrusions Malware Vectors Malware Payloads Hacking, incl. Backdoors, Botnets

Copyright (5)Threat Aspects – Second-Party Situations of Threat: Banks Telcos / Mobile Phone Providers Toll-Road eTag Providers Intermediaries Devices Safeguards: Terms of Contract Risk Allocation Enforceability Consumer Rights

Copyright (6)Threat Aspects – Third-Party, Within- System (Who else can get at you, where, and how?) Points-of-Payment Physical: Observation Coercion Points-of-Payment Electronic: Rogue Devices Rogue Transactions Keystroke Loggers Private Key Reapers Network Electronic Interception Decryption Man-in-the- Middle Attacks Points-of-Processing Rogue Employee Rogue Company Error

Copyright (6)Threat Aspects – Third-Party, Within-Device Physical Intrusion Social Engineering Confidence Tricks Phishing Masquerade Abuse of Privilege Hardware Software Data Electronic Intrusion Interception Cracking / Hacking Bugs Trojans Backdoors Masquerade Distributed Denial of Service (DDOS) Infiltration by Software with a Payload

Copyright (6)Threat Aspects – Third-Party, Within-Device Infiltration by Software with a Payload Software (the Vector) Pre-Installed User-Installed Virus Worm... Payload Trojan: Spyware Performative Communicative Bot / Zombie Spyware: Software Monitor Adware Keystroke Logger...

Copyright Key Threat / Vulnerability Combinations Unauthorised Conduct of Transactions Interference with Legitimate Transactions

Copyright Key Threat / Vulnerability Combinations Unauthorised Conduct of Transactions Interference with Legitimate Transactions Acquisition of Identity Authenticators e.g. Cr-Card Details (card-number as identifier, plus the associated identity authenticators) e.g. Username (identifier) plus Password/PIN/ Passphrase/Private Signing Key (id authenticator) e.g. Biometrics capture and comparison

Copyright Key Threat / Vulnerability Combinations Unauthorised Conduct of Transactions Interference with Legitimate Transactions Acquisition of Identity Authenticators e.g. Cr-Card Details (card-number as identifier, plus the associated identity authenticators) e.g. Username (identifier) plus Password/PIN/ Passphrase/Private Signing Key (id authenticator) e.g. Biometrics capture and comparison Use of a Consumer Device as a Tool in a fraud perpetrated on another party

Copyright Risk Assessment of Contactless Chips RFID / NFC chip embedded in card Wireless operation, up to 5cm from a terminal Visa Paywave and MasterCard PayPass Up to $100 (cf. original $25)

Copyright Contactless Chip-Cards as Payment Devices RFID / NFC chip embedded in card Wireless operation, up to 5cm from a terminal Visa Paywave and MasterCard PayPass Up to $100 and $35 resp. (cf. original $25) Presence of chip in card is not human-visible, but Logo / Brand may be visible No choice whether it's activated Operation of chip in card is not human-apparent No action required when within 5cm range, i.e. automatic payment No receipt is the norm Used as Cr-Card: Unauthenticated auto-lending Used as Dr-Card: PIN-less charge to bank account

Copyright Authentication – None / A Non-Secret / / For Higher-Value Transactions Only / Always UK RingGo Parking Payment Scheme – last 4 digits Act of Consent – None / Unclear / Clear e.g. Tap the Pad in Response to Display of Fare Notification – None / Audio / Display If 'None', then enables surreptitious payment extraction Receipt / Voucher – None / Option or Online / Y Octopus, Drive-Through eTags for Road-Tolls UK RingGo Parking Payment Scheme Key Safeguards for Chip Payment Schemes

Copyright Authentication – None / A Non-Secret (but Yes, for Transactions >$100 Only) Act of Consent – None? / Unclear? / Clear? If the card is within 5cm of a device, whether seen or not Notification – None? / Audio? / Display? If 'None', then enables surreptitious payment extraction Receipt / Voucher – None? / Option? / Y? Visa PayWave and MCard Paypass

Copyright The (In)Security Profile of Contactless Chip-Card Payment Transactions Non-Authentication, or mere possession: presentation of the card within a device's field, when that device is ready to charge money for something Vulnerable to card-capture, rogue devices, rogue transactions by legitimate devices,... Relies on: general levels of honesty among merchants and FIs (consumer reconciliation is infeasible – no vouchers, and either very long statements or no statements) (fraudulent transactions are obscured) self-insurance by consumers

Copyright Key Safeguards Required Choice of Activation or Not Two-Sided Device Authentication, i.e. by Payees Chip of Payers Chip by Payers Chip of Payees Chip Notification to Payer of: Fact of Payment (e.g. Audio-Ack) Amount of Payment At least one Authenticator Protection of the Authenticator(s) A Voucher (Physical and/or Electronic) Regular Account Reconciliation by Payers

Copyright The Status of Consumer Protection EFT Code of Conduct – phasing out as-amended-from-1-July-2012.pdf ePayments Code – phasing in by 30 March Code?openDocument Soft regulation of such things as receipts, risk apportionment, complaints, privacy,... The banks have sought to weaken the protections (In NZ they succeeded, but were beaten back by the tide of public opinion, and withdrew the changes) The Code's provisions apply to contactless-card transactions – but with a lot of 'buts'

Copyright Payments in the Network Era Initially Wired, Increasingly Unwired Secure Models ATMs EFTPOS – Dr Tx Internet Banking Debit Tx over the Internet Insecure Models EFTPOS – Cr Tx Credit Card Tx over the Internet (CNP / MOTO) Highly Insecure Models Contactless-Chip/ RFID / NFC

Copyright Mobile Security Agenda 1.The Motivation 2.Mobile Technology 3.Mobile Technology Users 4.Mobile Payments 5.Risk Assessment for Mobile Payments 6.Risk Assessment for Contactless Chips

Copyright COMP 3410 – I.T. in Electronic Commerce eSecurity Mobile Security Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W. ETSecy4 {.html,.ppt} ANU RSCS, 16 October 2012