Security Threats to Electronic Commerce.

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

Chapter 17: WEB COMPONENTS
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
14.1 © 2004 by Prentice Hall INFORMATIONSYSTEMS SECURITY AND CONTROL.
Crime and Security in the Networked Economy Part 4.
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Security Threats to Electronic Commerce
Chapter 5 Security Threats to Electronic Commerce
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Implementing Electronic Commerce Security
Chapter 5 Security and Encryption
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Securing Information Systems
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Chapter 5 Security Threats to Electronic Commerce
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Dimensions of E – Commerce Security
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Chapter 7: E-Commerce Security and Payment system
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
IT in Business Issues in Information Technology Lecture – 13.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chap1: Is there a Security Problem in Computing?.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Chapter 10: Electronic Commerce Security
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
Chapter 5 Electronic Commerce | Security
Copyright © 2002 Pearson Education, Inc.
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

Security Threats to Electronic Commerce

Objectives Important computer and electronic commerce security terms Why secrecy, integrity, and necessity are three parts of any security program The roles of copyright and intellectual property and their importance in any study of electronic commerce

Objectives Threats and counter measures to eliminate or reduce threats Specific threats to client machines, Web servers, and commerce servers Roles encryption and certificates play

Security Overview Many fears to overcome Intercepted e-mail messages Unauthorized access to digital intelligence Credit card information falling into the wrong hands Two types of computer security Physical - protection of tangible objects Logical - protection of non-physical objects

Security Overview Countermeasures: physical or logical procedures that recognize, reduce, or eliminate a threat

Computer Security Classification Secrecy/Confidentiality Protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source Privacy The ability to ensure the use of information about oneself Integrity Preventing unauthorized data modification by an unauthorized party Necessity Preventing data delays or denials (removal)

Computer Security Classification Nonrepudiation Ensure that e-commerce participants do not deny (i.e., repudiate) their online actions Authenticity The ability to identify the identity of a person or entity with whom you are dealing on the Internet

Copyright and Intellectual Property Protecting expression Literary and musical works Pantomimes and choreographic works Pictorial, graphic, and sculptural works Motion pictures and other audiovisual works Sound recordings Architectural works

Copyright and Intellectual Property The ownership of ideas and control over the tangible or virtual representation of those ideas U.S. Copyright Act of 1976 Protects previously stated items for a fixed period of time Copyright Clearance Center Clearinghouse for U.S. copyright information

Intellectual Property Threats The Internet presents a tempting target for intellectual property threats Very easy to reproduce an exact copy of anything found on the Internet People are unaware of copyright restrictions, and unwittingly infringe on them Fair use allows limited use of copyright material when certain conditions are met

MANAGEMENT CHALLENGES Designing systems that are neither over-controlled nor under-controlled Applying quality assurance standards in large systems projects

Why Systems are Vulnerable Advances in telecommunications and computer software Unauthorized access, abuse, or fraud Hackers Denial of service attack Computer virus

Telecommunication Network Vulnerabilities Figure 14-1

Concerns for System Builders and Users Disaster Destroys computer hardware, programs, data files, and other equipment Security Prevents unauthorized access, alteration, theft, or physical damage

Concerns for System Builders and Users Errors Cause computers to disrupt or destroy organization’s record-keeping and operations

System Quality Problems: Software and Data Bugs Program code defects or errors Maintenance Nightmare Maintenance costs high due to organizational change, software complexity, and faulty system analysis and design

Points in the Processing Cycle where Errors can Occur Figure 14-2

Data Quality Problems Caused due to errors during data input or faulty information system and database design

The Cost of Errors over the Systems Development Cycle Figure 14-3

Overview Controls Methods, policies, and procedures Ensures protection of organization’s assets Ensures accuracy and reliability of records, and operational adherence to management standards

General Controls and Application Controls Establish framework for controlling design, security, and use of computer programs Include software, hardware, computer operations, data security, implementation, and administrative controls

Security Profiles for a Personnel System Figure 14-4

General Controls and Application Controls Unique to each computerized application Include input, processing, and output controls

Protecting the Digital Firm On-line transaction processing: Transactions entered online are immediately processed by computer Fault-tolerant computer systems: Contain extra hardware, software, and power supply components

Protecting the Digital Firm High-availability computing: Tools and technologies enabling system to recover from a crash Disaster recovery plan: Runs business in event of computer outage Load balancing: Distributes large number of requests for access among multiple servers Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption Clustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing

Security Threats in the E-commerce Environment Three key points of vulnerability the client communications pipeline the server

Vulnerable Points in an E-commerce Environment

Electronic Commerce Threats Client Threats Active Content Java applets, Active X controls, JavaScript, and VBScript Programs that interpret or execute instructions embedded in downloaded objects Malicious active content can be embedded into seemingly innocuous Web pages -- launched when you use your browser to view the page

Electronic Commerce Threats Client Threats -- Cookies remember user names, passwords, and other commonly referenced information Exercise Go to “cookie FAQs” on text links page or: http://www.cookiecentral.com/faq/ Are cookies dangerous? How did they get to be called “cookies?” What are the benefits of cookies?

Graphics, Plug-ins, and E-mail Attachments Code can be embedded into graphic images causing harm to your computer Plug-ins are used to play audiovisual clips, animated graphics Could contain ill-intentioned commands hidden within the object E-mail attachments can contain destructive macros within the document

Communication Channel Threats Secrecy Threats Secrecy is the prevention of unauthorized information disclosure - technical issue Privacy is the protection of individual rights to nondisclosure - legal issue regarding rights Theft of sensitive or personal information is a significant danger Your IP address and browser you use are continually revealed while on the web

Communication Channel Threats Anonymizer A Web site that provides a measure of secrecy as long as it’s used as the portal to the Internet http://www.anonymizer.com Check out “Here’s what we know about you” Integrity Threats Also known as active wiretapping Unauthorized party can alter data Change the amount of a deposit or withdrawal

Communication Channel Threats Necessity Threats Also known as delay or denial threats Disrupt normal computer processing Deny processing entirely Slow processing to intolerably slow speeds Remove file entirely, or delete information from a transmission or file Divert money from one bank account to another

Server Threats The more complex software becomes, the higher the probability that errors (bugs) exist in the code Servers run at various privilege levels Highest levels provide greatest access and flexibility Lowest levels provide a logical fence around a running program

Server Threats Contents of a server’s folder names are revealed to a Web browser Cookies should never be transmitted unprotected Sensitive files such as username and password pairs or credit card numbers Hacking and Cracking -- the Web server administrator is responsible for ensuring that all sensitive files, are secure

Database Threats Once a user is authenticated to a database, selected database information is visible to the user. Security is often enforced through the use of privileges Some databases are inherently insecure and rely on the Web server to enforce security measures

Other Threats Common Gateway Interface (CGI) Threats CGIs are programs that present a security threat if misused CGI programs can reside almost anywhere on a Web server and therefore are often difficult to track down CGI scripts do not run inside a sandbox, unlike JavaScript

Other Threats Other programming threats include Programs executed by the server Buffer overruns can cause errors Runaway code segments The Internet Worm attack was a runaway code segment Buffer overflow attacks occur when control is released by an authorized program, but the intruder code instructs control to be turned over to it

Tools Available to Achieve Site Security

Encryption Transforms plain text or data into cipher text that cannot be read by anyone outside of the sender and the receiver. Purpose: to secure stored information to secure information transmission. Cipher text text that has been encrypted and thus cannot be read by anyone besides the sender and the receiver Symmetric Key Encryption DES standard most widely used

Encryption Public key cryptography uses two mathematically related digital keys: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. A key used to encrypt a message, cannot be used to unencrypt the message

Public Key Cryptography - A Simple Case

Public Key Cryptography with Digital Signatures

Public Key Cryptography: Creating a Digital Envelope

Securing Channels of Communications Secure Sockets Layer (SSL) is the most common form of securing channels Secure negotiated session client-server session where the requested document URL, contents, forms, and cookies are encrypted. Session key is a unique symmetric encryption key chosen for a single secure session

Secure Negotiated Sessions Using SSL

Securing Channels of Communications Secure Hypertext Transfer Protocol (S-HTTP) secure message-oriented communications protocol for use with HTTP. Virtual Private Networks (VPN) remote users can securely access internal networks via Point-to-Point Tunneling Protocol (PPTP)

Protecting Networks Firewalls Proxy server software applications that act as a filter between a private network and the Internet Proxy server server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization

Policies, Procedures, and Laws Developing an e-commerce security plan perform a risk assessment develop a security policy develop an implementation plan create a security organization perform a security audit

Tension Between Security and Other Values Ease of use Often security slows down processors and adds significantly to data storage demands. Too much security can harm profitability; not enough can mean going out of business. Public Safety & Criminal Use claims of individuals to act anonymously vs. needs of public officials to maintain public safety in light of criminals or terrorists.

Security Policy and Integrated Security Security policy is a written statement describing what assets are to be protected and why, who is responsible, which behaviors are acceptable or not Physical security Network security Access authorizations Virus protection Disaster recovery

Specific Elements of a Security Policy Authentication Who is trying to access the site? Access Control Who is allowed to logon and access the site? Secrecy Who is permitted to view selected information Data integrity Who is allowed to change data? Audit What and who causes selected events to occur, and when?

Computer Emergency Response Team (CERT) Housed at Carnegie Mellon University Responds to security events and incidents within the U.S. government and private sector

Some questions Can internet security measures actually create opportunities for criminals to steal? How? Why are some online merchants hesitant to ship to international addresses? What are some steps a company can take to thwart cyber-criminals from within a business? Is a computer with anti-virus software protected from viruses? Why or why not? What are the differences between encryption and authentication? Discuss the role of administration in implementing a security policy?

Group Exercise Given the shift to m-commerce, identify and discuss the new security threats to this type of technology? What are some of the non-security impacts on society? Select a reporter and give a brief synopsis of your views to the class.