1 Pertemuan 6 eBusiness Security and Controls Systems Matakuliah: F0662/ Web Based Accounting Tahun: 2005 Versi: 1/0.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Cryptography and Network Security
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
1 Pertemuan 6 Transaksi Dokumen dan pembayaran Elektronik Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Traditional and Electronic Payment Methods Chapter 3.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 Chapter 8: Security in Electronic Commerce IT357 Electronic Commerce.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Secure Electronic Transaction (SET)
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Traditional and Electronic Payment Methods Chapter 3.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Electronic Banking & Security Electronic Banking & Security.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
BY GAWARE S.R. DEPT.OF COMP.SCI
Electronic Payment Security Technologies
Module 4 System and Application Security
Presentation transcript:

1 Pertemuan 6 eBusiness Security and Controls Systems Matakuliah: F0662/ Web Based Accounting Tahun: 2005 Versi: 1/0

2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Menjelaskan potensi resiko dan sistem pengendalian intern yang seharusnya ada (TIK-6) Type threats and attacks (TIK-6)

3 Outline Materi Materi 1 Menjelaskan potensi resiko dan sistem pengendalian intern yang seharusnya ada. Materi 2 Type threats and attacks (TIK-6)

4 Internet Security and Electronic Payment Services

5 Internet Security Firewalls Intranets Extranets Secure Transmission SSL Digital Certificates Digital Signatures Electronic Payments

6 Typical Computer Network Security Problems Network transmissions can be intercepted No proof of sender Data Integrity Non-repudiation

7 Firewalls Are systems that establish control policies among networks. They can permit different users to perform different operations according to their authorisation. Two general types –Packet Level firewalls –Application Level Firewalls

8 Firewalls

9 LAN with individual internet access Internet

10 Firewalls LAN With Internet access through a firewall Internet firewall

11 Intranets A private network within a business used to share company information and computing resources among employees A client-server application use TCP/IP, HTTP communication protocols and HTML publishing May consist of interlinked local area networks, also use leased lines in the wide area network Typically includes connections through one or more gateway computers to the outside Internet

12 Intranets

13 Extranets Part of an enterprise's Intranet extended to users outside the company A private network for suppliers, vendors, partners and customers rather than the general public Uses the Internet for transmission but needs passwords for access

14 Extranets

15 Who can read my ? LAN Secure Transmission

16 Private Key Encryption

17 Public Key Encryption

18 Secure Transmission PGP (Pretty Good Privacy) Message Integrity SSL Provides data authentication, message integrity, and optional client authentication. Digital Certificate Authentication Digital Signature

19 Secure Transmission SSL encrypts and then decrypts any packets of information being transmitted. essential for sensitive corporate data or financial transactions. May not authenticate the receiver of encrypted data. Is currently implemented on –Netscape navigator –Internet Explorer Uses the widely used RSA public key cryptography

20 Secure Transmission Digital Certificates contains : –your name, –a serial number, –expiration dates, –a copy of the certificate holder's public key (used for decrypting messages and digital signatures), and –the digital signature of the certificate-issuing authority (a digital Passport) Morley E (October 12, 1999) digital certificate

21 Secure Transmission Digital Certificates can be kept in registries so that authenticated users can look up other users' public keys Morley E (October 12, 1999) digital certificate

22 Secure Transmission 6 Without a Digital Certificate ?

23 Secure Transmission 7 With a Digital Certificate !

24 Secure Transmission Digital Signature authenticate the identity of the sender the receiver can check that the message or document being sent is unchanged can be automatically time-stamped can be used with encrypted or normal messages can also used be with digital certificates

25 Secure Transmission (summary) Security Technology What it doesEffectiveness and Limitations FirewallAuthorizes access. Filters/rejects users based on access rights on server Authorizes access, but cannot authenticate identity of user. Password based, so open to many associated problems. Digital Certificate Authenticates identity of user Certificates are vulnerable to system crash or deletion. Can be compromised if computer stolen. Cannot stop certificate and key being shared. Encryption / SSL Protects data confidentiality Only encrypts data. Does not authenticate. Encryption is compromised by using passwords or certificates.

26 Electronic and Digital Signatures From a legal point of view, hand writing one’s name on paper has been the principle means of signature for centuries. In today's electronic world the legal concept of a signature could include: –Digitised images of paper signatures. –Typed notations. –Letterheads or origination headers.

27 Electronic and Digital Signatures However there is a difference between these types of electronic signatures and digital signatures.

28 Electronic Signature Definition DEFINITION OF ELECTRONIC SIGNATURE: Sec. 4(4). Electronic signature.-- The term "electronic signature'' means an electronic sound, symbol, or process, attached to or logically associated with a (contract or other) record and executed or adopted by a person with the intent to sign the record.

29 Electronic Transactions The digital signature is revolutionizing e- commerce and corporate document management systems. Legislative bodies nationwide and internationally are rewriting the definition of "signature" to include electronic signatures, and passing laws and regulations to accommodate electronic signatures on legal documents and in filings. Utah Digital Signatures Act. Singapore : Electronic Transactions act (Act25 of 1998).

30 Digital Signature Technology Digital signatures are created and verified by means of cryptography. Two different keys are generally used: –One for creating or transforming the data into a unintelligible form. –One for verifying a digital signature or returning the message to its original form. This is usually referred to as “Asymmetric cryptosystem.” The keys are usually referred to as the “private key” which is only known to the signer, and the “Public Key” which is usually more widely known and and used to verify the digital signature.

31 Digital Signatures The process of creating a digital signature and verifying it accomplish the essential effects desired of a signature: Signer Authentication –If a private key and a public key is associated with an identified signer, a digital signature by a private key effectively identifies the signer with the message Message authentication –The process of digitally signing also identifies the matter to be signed with greater certainty and precision than paper signatures

32 Digital Signatures Affirmative act –Creating a digital signature requires the signer to provide a private key and invoke a software function to create a digital signature. Efficiency –The process of creating and verifying a digital signature provides a high level of assurance that the digital signature is genuinely the signer’s and is almost entirely automated or capable of automation

33 Digital Signatures and Certification Authorities To ensure that parties using digital signatures are identified with a particular key pair, A trusted third party termed a “certification authority” is used to associate an identified person on one end of a transaction with the key pair creating the digital signature at the other end. Verisign. Society for Worldwide Interbank Funds Transfers (SWIFT)Society for Worldwide Interbank Funds Transfers (SWIFT). E-Club of the International Chamber of Commerce (ICC)E-Club of the International Chamber of Commerce (ICC). Identrus LLCIdentrus LLC. WISeKey S.A.

34 Digital Signatures costs and benefits Costs. –Institutional overhead. Cost of establishing and utilising certification authorities etc. –Product cost. Software may be expensive. Certification authority charges for issuing certificates. Verification software. Access to certificate repository.

35 Digital Signatures Costs and Benefits Benefits. –Imposters. Minimize risk of dealing with impostors. –Message corruption. Minimize the risk of message tampering. –Formal legal requirements. Legal requirements of writing, signature and an original document are satisfied. –Open systems. Retention of a high degree of information security when information is sent over open, insecure internet channels.

36 Electronic Payment Instruments and Systems To be attractive to consumers and businesses: –Should save money –Reduce costs in current systems –Enable consumers to spend their money more cheaply

37 Electronic Payment Instruments and Systems Cost of Transactions –Financial Institution Teller generated $1.07 –ATM$0.27 –Swiping a Credit card$ $.015 –Dipping a smart card $0.01 Can squeeze as much as $1.06 out of each of the trillions 0f financial services transactions that occur each year Good reason why electronic instruments and systems will change!!

38 Electronic Payments Credit cards SET (Secure Electronic Transactions) Payment Services, Merchant Gateways Micropayments (DigiCash, e-Cash, NetPay) Mondex (SmartCards)

39 Electronic Payments: How credit cards work Visa Net Acquirer Issuer Merchant Duncan Unwin, QSI Payments Inc., 2000

40 Electronic Payments: SET: Visa, Mastercard A specification which use public-key and private-key cryptography authenticate cardholders and merchants using digital certification provide confidentiality of payment data –merchant does not see the credit card number

41 Electronic Payments: Payment Services, Merchant Gateways 3rd Party Service –Camtech, Surelink, QSI Bank Service –CBA, ANZ, NAB, Westpac, St George Duncan Unwin, QSI Payments Inc., 2000

42 Electronic Payments: Micropayments: Small electronic cash payment systems –DigiCash, e-Cash, NetPay See W3C for the first public working draft of the "Common Markup for Web Micropayment Systems”, at URL Markup

43 MilliCent

44 eCash Website

45 Checkfree Website

46 Electronic Cash systems Provide a direct electronic equivalent of cash –Clickshare –Mondex –Bpay

47 Mondex Website

48 Electronic Payments: Mondex (Smart Cards) 1 Members - –licensed to issue Mondex cards to cardholders and merchants. Merchants - –Retailers, service companies and other business that enter into an agreement with Members to enable them to accept Mondex electronic cash as payment for goods and services.

49 Electronic Payments: Mondex (Smart Cards) 1 Cardholders - –provided with a Mondex Card by a Member which enables them to pay for goods and services from Merchants and transfer money to/from other Cardholders.

50 Electronic Payments: Mondex (Smart Cards) Home Banking - –download value from your bank account to your card. Buying on the Internet - –buy low value goods and services on the Internet that aren't normally chargeable. Privacy - –no record held of the transaction, – privacy normally only afforded with physical cash. –real-time verification of funds.

51 Clickshare

52 Bpay

53 Bibliography Schneider and Perry, Electronic Commerce Chapter 7 ommerce/ch07.html

54 Summary Mahasiswa diwajibkan membuat summary