范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

Slides:



Advertisements
Similar presentations
CS5038 The Electronic Society
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 E-Commerce Security. © Prentice Hall Learning Objectives 1.Document the rapid rise in computer and network security attacks. 2.Describe.
1 An Overview of Computer Security computer security.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Securing Information Systems
Chapter 10 E-Commerce Security.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Secure Electronic Transaction (SET)
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Securing Information Systems
Securing Information Systems
Pertemuan 20 Materi : Buku Wajib & Sumber Materi :
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 5 Electronic Commerce | Security
Securing Information Systems
Chapter 5 Electronic Commerce | Security
INFORMATION SYSTEMS SECURITY and CONTROL
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

范錚強 1 E-Commerce Security

范錚強 2 The Security Threats Computer Crime and Security Survey % computers exposed to security violations 40% computers detected external intrusions 25 % in % computers detected virus How do companies protect itselves from this hostile environment? Source: Computer Security Institute (CSI)

范錚強 3 Myths of Information Security Protection against hackers Protection against virus Segregation of external threats …

范錚強 4 Brute Force Credit Card Attack Story The Problem Spitfire Novelties usually generates between 5 and 30 transactions per day On September 12, 2002 in a “brute force” credit card attack, Spitfire’s credit card transaction processor processed 140,000 fake credit card charges worth $5.07 each (62,000 were approved)

范錚強 5 Brute Force Credit Card Attack (cont.) The total value of the approved charges was around $300,000 Spitfire found out about the transactions only when they were called by one of the credit card owners who had been checking his statement online and had noticed the $5.07 charge

范錚強 6 Brute Force Credit Card Attack (cont.) Brute force credit card attacks require minimal skill Hackers run thousands of small charges through merchant accounts, picking numbers at random When the perpetrator finds a valid credit card number it can then be sold on the black market Some modern-day black markets are actually member-only Web sites like carderplanet.com, shadowcrew.com, and counterfeitlibrary.com

范錚強 7 Brute Force Credit Card Attack (cont.) Relies on a perpetrator’s ability to pose as a merchant requesting authorization for a credit card purchase requiring A merchant ID A password Both

范錚強 8 Brute Force Credit Card Attack (cont.) Online Data’s credit card processing services, all a perpetrator needed was a merchant’s password in order to request authorization Online Data is a reseller of VeriSign Inc. credit card gateway services VeriSign blamed Online Data for the incident Online Data blamed Spitfire for not changing their initial starter password

范錚強 9 Brute Force Credit Card Attack Story (cont.) In April 2002 hackers got into the Authorize.Net card processing system (largest gateway payment system on the Internet) Executed 13,000 credit card transactions, of which 7,000 succeeded Entry into the Authorize.Net system required only a log-on name, not a password

范錚強 10 Brute Force Solution Online Data should assign strong passwords at the start Customers should modify those passwords frequently Authorization services such as VeriSign and Authorize.Net should have built-in safeguards that recognize brute force attacks

范錚強 11 Brute Force Credit Card Solution (cont.) Signals that something is amiss: A merchant issues an extraordinary number of requests Repeated requests for small amounts emanating from the same merchants

范錚強 12 Brute Force Credit Card Attack (cont.) The Results VeriSign halted the transactions before they were settled, saving Spitfire $316,000 in charges Authorize.Net merchants were charged $0.35 for each transaction The criminals acquired thousands of valid credit card numbers to sell on the black market

范錚強 13 Brute Force Credit Card Attack (cont.) What we can learn… Any type of EC involves a number of players who use a variety of network and application services that provide access to a variety of data sources A perpetrator needs only a single weakness in order to attack a system

范錚強 14 Brute Force What We Can Learn Some attacks require sophisticated techniques and technologies Most attacks are not sophisticated; standard security risk management procedures can be used to minimize their probability and impact

范錚強 15 Accelerating Need for E-Commerce Security Annual survey conducted by the Computer Security Institute and the FBI Organizations continue to experience cyber attacks from inside and outside of the organization

范錚強 16 Accelerating Need for E-Commerce Security (cont.) The types of cyber attacks that organizations experience were varied The financial losses from a cyber attack can be substantial It takes more than one type of technology to defend against cyber attacks

范錚強 17 Accelerating Need for E-Commerce Security (cont.) According to the statistics reported to CERT/CC over the past year (CERT/CC 2002) The number of cyber attacks skyrocketed from approximately 22,000 in 2000 to over 82,000 in 2002 First quarter of 2003 the number was already over 43,000 Computer Emergency Response Team (CERT): Group of three teams at Carnegie Mellon University that monitors incidence of cyber attacks, analyze vulnerabilities, and provide guidance on protecting against attacks

范錚強 18 Security Is Everyone’s Business Security practices of organizations of various sizes Small organizations (10 to 100 computers) The “haves” are centrally organized, devote a sizeable percentage of their IT budgets to security The “have-nots” are basically clueless when it comes to IT security

范錚強 19 Security Is Everyone’s Business (cont.) Medium organizations (100 to 1,000 computers) Rarely rely on managerial policies in making security decisions, and they have little managerial support for their IT policies The staff they do have is poorly educated and poorly trained—overall exposure to cyber attacks and intrusion is substantially greater than in smaller organizations

范錚強 20 Security Is Everyone’s Business (cont.) Large organizations (1,000 to 10,000 computers) Complex infrastructures and substantial exposure on the Internet While aggregate IT security expenditures are fairly large, their security expenditures per employee are low IT security is part-time and undertrained—sizeable percentage of the large organizations suffer loss or damage due to incidents Base their security decisions on organizational policies

范錚強 21 Security Is Everyone’s Business (cont.) Very large organizations (more than 10,000 computers) extremely complex environments that are difficult to manage even with a larger staff rely on managerial policies in making IT security decisions only a small percentage have a well- coordinated incident response plan

范錚強 22 Security Issues From the user’s perspective: Is the Web server owned and operated by a legitimate company? Does the Web page and form contain some malicious or dangerous code or content? Will the Web server distribute unauthorized information the user provides to some other party?

范錚強 23 Security Issues (cont.) From the company’s perspective: Will the user not attempt to break into the Web server or alter the pages and content at the site? Will the user will try to disrupt the server so that it isn’t available to others?

范錚強 24 Security Issues (cont.) From both parties’ perspectives: Is the network connection free from eavesdropping by a third party “listening” on the line? Has the information sent back and forth between the server and the user’s browser been altered?

范錚強 25 Security Requirements Authentication The process by which one entity verifies that another entity is who they claim to be Authorization The process that ensures that a person has the right to access certain resources Auditing The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions

范錚強 26 Security Requirements (cont.) Confidentiality Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes Integrity As applied to data, the ability to protect data from being altered or destroyed in an unauthorized or accidental manner

范錚強 27 Security Issues (cont.) Non-repudiation The ability to limit parties from refuting that a legitimate transaction took place, usually by means of a signature

范錚強 28 Information Security Vulnerabilities IntentionalUnintentional or Natural Causes Hardware exposure Thefts, vandalism, criminal acts Natural disasters, fire, floods, disk crash Information exposure Alteration of data, systematic updates Incompetence of programmers, missing Disclosure of information Unauthorized copy, network interception, fraud Careless Network intrusions Theft of information, alteration of data, use of computers as a crime tool ──

范錚強 29 Safeguarding information Assess exposure and risk Identification and protect any possible threats and vulnerabilities Technical and procedural preventions Understanding the characteristics of security technologies SOP: Standard Operations Procedure The strength of a chain is the strength of the weakest link

范錚強 30 Basic Security Concepts Security is never ABSOLUTE The balance between security and ease of use Security is costly What is your exposure and potential loss? How much are you willing to pay? There are technical and social dimensions in security issues All perpetrators are human beings Mostly internal employees

范錚強 31 Security and Ease of Use What will you end up doing, if every time… You have to unlock 10 locks to get home You have to lock 10 door before you leave Risk and Security measures should be balanced

范錚強 32 A simple case When you take a vacation, you supervisor asks you to provide your password.. Should you comply? Can you refuse? On what basis?

范錚強 33 Business Environment Legal Environment Insurance Security Plan Company Process Control Personnel Control Document Control User Control Recovery Plan Security Policy Application Input and output controls Program Control Audit Trail Access Control Physical Segregation Operations Control The Onion of Security Hardware Comms. Control International Standards

范錚強 34 Some Basic Security Measures Virus protection Encryption PKI/CA

范錚強 35 Virus Protection Programs Files Analyze Program Look for virus Anti-Virus S/W Virus code Fix or SegregatePass

范錚強 36 Encryption – general concept Eg. My Phone number: Simple multiplication Multiply by 13— I send it to you and you devide by 13… A simpler scheme Key: we have to protect the encryption rule ──Is there any secrete?

范錚強 37 Encrypted Message Symmetry Key Encryption Message Encrypted Message Encrypt Message Decrypt S R

范錚強 38 The concept of two keys You open a SAFE in a bank Open Account Verification of Identity Get a key – Private Key Use Verification of Identity, log Bank officer take a public key, together with your private key, open the safe Are you safe? Why?

范錚強 39 Asymmetric Key Encryption RSA scheme Invented by three mathematicians with last names starts with R/S/A. Mathematically generate a pair of “keys”, KA and KB Generated simultaneously. KA and KB are independent, one cannot be derived from another. A file encrypted by key KA can only be decrypted by KB and not A, and vice versa KA is kept private, and KB is open publicly

范錚強 40 Asymmetric Key Encryption for Confidentiality Message Encrypted Message Encrypt with Public Key Encrypted Message S R Decrypt with Private Key

范錚強 41 Asymmetric Key Encryption for Non-repudiation Message Encrypted Message R Public Encrypt Encrypted Message S RR Public Decrypt S Private Decrypt S Private Encrypt

范錚強 42 PKI/CA PKI – Public Key Infrastructure Encryption scheme based on RSA encryption An infrastructure for effective operations CA – Certificate Authority Issuance of Keys Trusted third party Hierarchical structure of reference

范錚強 43 Issuance of Certificate by CA Issuer Issue Date Holder Public Keu Open for Public Identification John X509 XXXX Contract Elec. Document Digital Signature CA Certificate Private KeyPublic Key Issuance of Certificate by CA