Chapter 5 Security Threats to Electronic Commerce

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Chapter 17: WEB COMPONENTS
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Security Threats to Electronic Commerce
Security Threats to Electronic Commerce.
Unit 18 Data Security 1.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Chapter 10: Electronic Commerce Security
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
12/15/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 5: Security Threats Insup Lee Department of Computer and Information Science University of Pennsylvania.
4/20/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 5: Security Threats Insup Lee Department of Computer and Information Science University of Pennsylvania.
Chapter 10: Electronic Commerce Security
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Security Threats to Electronic Commerce
Computer Security and Penetration Testing
E-Commerce: The Second Wave Fifth Annual Edition
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Data Security.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.
Chapter 5 Security Threats to Electronic Commerce
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
PLUG IT IN SIX Protecting Your Information Assets.
Chapter 7: E-Commerce Security and Payment system
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
Topic 5: Basic Security.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chap1: Is there a Security Problem in Computing?.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
WEB SERVER SOFTWARE FEATURE SETS
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Implementing Security for Electronic Commerce
Chapter 5 Electronic Commerce | Security
Chapter 5 Electronic Commerce | Security
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Chapter 5 Security Threats to Electronic Commerce

Objectives Important computer and electronic commerce security terms Why secrecy, integrity, and necessity are three parts of any security program The roles of copyright and intellectual property and their importance in any study of electronic commerce

Objectives Threats and counter measures to eliminate or reduce threats Specific threats to client machines, Web servers, and commerce servers Enhance security in back office products, such as database servers How security protocols plug security holes Roles encryption and certificates play

Security Overview Many fears to overcome Intercepted e-mail messages Unauthorized access to digital intelligence Credit card information falling into the wrong hands Two types of computer security Physical - protection of tangible objects Logical - protection of non-physical objects

Security Overview Figure 5-1 Countermeasures are procedures, either physical or logical, that recognize, reduce, or eliminate a threat

Computer Security Classification Secrecy Protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source Integrity Preventing unauthorized data modification Necessity Preventing data delays or denials (removal)

Copyright and Intellectual Property Protecting expression Literary and musical works Pantomimes and choreographic works Pictorial, graphic, and sculptural works Motion pictures and other audiovisual works Sound recordings Architectural works

Copyright and Intellectual Property The ownership of ideas and control over the tangible or virtual representation of those ideas U.S. Copyright Act of 1976 Protects previously stated items for a fixed period of time Copyright Clearance Center Clearinghouse for U.S. copyright information

Copyright Clearance Center Home Page Figure 5-2

Security Policy and Integrated Security Security policy is a written statement describing what assets are to be protected and why, who is responsible, which behaviors are acceptable or not Physical security Network security Access authorizations Virus protection Disaster recovery

Specific Elements of a Security Policy Authentication Who is trying to access the site? Access Control Who is allowed to logon and access the site? Secrecy Who is permitted to view selected information

Specific Elements of a Security Policy Data integrity Who is allowed to change data? Audit What and who causes selected events to occur, and when?

Intellectual Property Threats The Internet presents a tempting target for intellectual property threats Very easy to reproduce an exact copy of anything found on the Internet People are unaware of copyright restrictions, and unwittingly infringe on them Fair use allows limited use of copyright material when certain conditions are met

The Copyright Website Home Page Figure 5-3

Intellectual Property Threats Cybersquatting The practice of registering a domain name that is the trademark of another person or company Cybersquatters hope that the owner of the trademark will pay huge dollar amounts to acquire the URL Some Cybersquatters misrepresent themselves as the trademark owner for fraudulent purposes

Electronic Commerce Threats Client Threats Active Content Java applets, Active X controls, JavaScript, and VBScript Programs that interpret or execute instructions embedded in downloaded objects Malicious active content can be embedded into seemingly innocuous Web pages Cookies remember user names, passwords, and other commonly referenced information

Java, Java Applets, and JavaScript Java is a high-level programming language developed by Sun Microsystems Java code embedded into appliances can make them run more intelligently Largest use of Java is in Web pages (free applets can be downloaded) Platform independent - will run on any computer

Java Applet Example Figure 5-4

Sun’s Java Applet Page Figure 5-5

Java, Java Applets, and JavaScript Java sandbox Confines Java applet actions to a security model-defined set of rules Rules apply to all untrusted applets, applets that have not been proven secure Signed Java applets Contain embedded digital signatures which serve as a proof of identity

ActiveX Controls ActiveX is an object, called a control, that contains programs and properties that perform certain tasks ActiveX controls only run on Windows 95, 98, or 2000 Once downloaded, ActiveX controls execute like any other program, having full access to your computer’s resources

ActiveX Warning Dialog box Figure 5-6

Graphics, Plug-ins, and E-mail Attachments Code can be embedded into graphic images causing harm to your computer Plug-ins are used to play audiovisual clips, animated graphics Could contain ill-intentioned commands hidden within the object E-mail attachments can contain destructive macros within the document

Netscape’s Plug-ins Page Figure 5-7

Communication Channel Threats Secrecy Threats Secrecy is the prevention of unauthorized information disclosure Privacy is the protection of individual rights to nondisclosure Theft of sensitive or personal information is a significant danger Your IP address and browser you use are continually revealed while on the web

Communication Channel Threats Anonymizer A Web site that provides a measure of secrecy as long as it’s used as the portal to the Internet http://www.anonymizer.com Integrity Threats Also known as active wiretapping Unauthorized party can alter data Change the amount of a deposit or withdrawal

Anonymizer’s Home Page Figure 5-8

Communication Channel Threats Necessity Threats Also known as delay or denial threats Disrupt normal computer processing Deny processing entirely Slow processing to intolerably slow speeds Remove file entirely, or delete information from a transmission or file Divert money from one bank account to another

Server Threats The more complex software becomes, the higher the probability that errors (bugs) exist in the code Servers run at various privilege levels Highest levels provide greatest access and flexibility Lowest levels provide a logical fence around a running program

Server Threats Secrecy violations occur when the contents of a server’s folder names are revealed to a Web browser Administrators can turn off the folder name display feature to avoid secrecy violations Cookies should never be transmitted unprotected

Displayed Folder Names Figure 5-9

Server Threats One of the most sensitive files on a Web server holds the username and password pairs The Web server administrator is responsible for ensuring that this, and other sensitive files, are secure

Database Threats Disclosure of valuable and private information could irreparably damage a company Security is often enforced through the use of privileges Some databases are inherently insecure and rely on the Web server to enforce security measures

Oracle Security Features Page Figure 5-10

Other Threats Common Gateway Interface (CGI) Threats CGIs are programs that present a security threat if misused CGI programs can reside almost anywhere on a Web server and therefore are often difficult to track down CGI scripts do not run inside a sandbox, unlike JavaScript

Other Threats Other programming threats include Programs executed by the server Buffer overruns can cause errors Runaway code segments The Internet Worm attack was a runaway code segment Buffer overflow attacks occur when control is released by an authorized program, but the intruder code instructs control to be turned over to it

Buffer Overflow Attack Figure 5-11

Computer Emergency Response Team (CERT) Housed at Carnegie Mellon University Responds to security events and incidents within the U.S. government and private sector Posts CERT alerts to inform Internet users about recent security events

CERT Alerts Figure 5-12