Security Threats to Electronic Commerce

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

Implementing Electronic Commerce Security Gary Schneider, 2003
5/4/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of Pennsylvania.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Security Threats to Electronic Commerce
Chapter 5 Security Threats to Electronic Commerce
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Security, Privacy, and Ethics Online Computer Crimes.
Implementing Electronic Commerce Security
Chapter 10: Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Implementing Security for Electronic Commerce
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Implementing Security for Electronic Commerce
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Chapter 10: Electronic Commerce Security
Computer Security and Penetration Testing
12/15/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of.
E-Commerce: The Second Wave Fifth Annual Edition
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PART THREE E-commerce in Action Norton University E-commerce in Action.
The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.
Chapter 5 Security Threats to Electronic Commerce
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
1 E-Commerce Security Part II – Security Techniques.
Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Chapter 7: E-Commerce Security and Payment system
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Information Security in Distributed Systems Distributed Systems1.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chap1: Is there a Security Problem in Computing?.
1 Lecture 1: Introduction Outline course’s focus intruder’s capabilities motivation for security worms, viruses, etc. legal and patent issues.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Chapter 10: Electronic Commerce Security
Security Issues in Information Technology
Security on the Internet and the Web
Chapter 40 Internet Security.
Implementing Security for Electronic Commerce
World Wide Web policy.
Presentation transcript:

Security Threats to Electronic Commerce Chapter 10 Security Threats to Electronic Commerce

Security Overview Computer security is the protection of assets from unauthorized access, use, alteration, or destruction. Two types of security: Physical security - includes tangible protection devices, such as alarms and guards. Logical security - protection of assets using nonphysical means.

Security Overview Any act or object that poses a danger to computer assets is known as a threat. Countermeasure is a procedure that recognizes, reduces, or eliminates a threat. Countermeasure dependent on impact of a threat and probability of occurrence.

Computer Security Classification Three computer security categories: Secrecy Integrity Necessity Security - protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source. Integrity - preventing unauthorized data modification. Necessity - preventing data delays or denials.

Computer Security Classification Eavesdropper - a person or device that can listen in on and copy Internet transmissions. Crackers of hackers - people who write programs or manipulate technologies to obtain unauthorized access to computers and network. A security policy - written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not. The first step an organization must take in creating a security policy is to determine what assets to protect and from whom.

Intellectual Property Threats Copyright is the protection of expression. Intellectual property is the ownership of ideas and control over the tangible or virtual representation of those ideas. Malaysia - Copyright Act. Copyright infringements on the Web occur because users are ignorant of what they can and cannot copy.

Domain Names Issues of intellectual property rights for Internet Domain Names: Cybersquatting - the practice of registering a domain name that is the trademark of another person or company in the hopes that the owner will pay huge amounts of money to acquire the URL. Name changing - occurs when someone registers purposely misspelled variations of well-known domain names - confusing to their customers. Name stealing - occurs when someone changes the ownership of the domain name assigned to another site and owner - after domain name ownership is changed the name stealer can manipulate the site.

Threats to the Security of Client Computers There are three types of electronic commerce threats: Client threats – from client computers Communication channel threats – to messages travelling Server threats – from hardware attached to the server

Client Threats Web pages were mainly static. The widespread use of active content has changed the function of Web pages. Sources of client threats: Active content Java, Java Applets, and JavaScript ActiveX Controls Graphics, plug-ins, and e-mail attachments

Active Content Active content refers to programs that are embedded transparently in Web pages and that cause actions to occur. Active content can display moving graphics, download and play audio, or implement Web-based spreadsheet programs. The best-known active content forms are Java applets, ActiveX controls, JavaScript, and VBScript. Active content also includes graphics and Web browser plug-ins.

Active Content A Trojan horse is a program hidden inside another program or Web page that masks its true purpose. A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers. Malicious ‘cookies’ can destroy files stored on client computers.

Active Content

Active Content Plug-ins are programs that interpret or execute instructions embedded in downloaded graphics, sounds, and other objects. Active content, including all forms, enables Web pages to take action. Active content gives life to static Web pages.

Java, Java Applets, and JavaScript Java adds functionality to business applications and can handle transactions and a wide variety of actions on the client computer.

Java, Java Applets, and JavaScript Java applets that are loaded from a local file system are trusted. Trusted applets have full access to system resources on the client computer. Signed Java applets contain embedded digital signatures from a trusted third party, which are proof of the identity of the source of the applet.

Java, Java Applets, and JavaScript JavaScript is a scripting language to enable Web page designers to build active content. JavaScript can invoke privacy and integrity attacks by executing code that destroys your hard disk. JavaScript programs do not operate under the restrictions of the Java sandbox security model.

ActiveX Controls ActiveX is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks. ActiveX controls run only on computers running Windows and only on browsers that support them. Because ActiveX controls have full access to your computer, they can cause secrecy, integrity, or necessity violations.

ActiveX Controls

Graphics, Plug-Ins, and E-mail Attachments Graphics, browser plug-ins, and e-mail attachments can harbor executable content. The code embedded in the graphic could be a potential threat. Plug-ins perform their duties by executing commands buried within the media they are manipulating. E-mail attachments provide a convenient way to send non-text information over a text-only system.

Virus A virus is software that attaches itself to another program and can cause damage when the host program is activated. Worm viruses replicate themselves on other machines. A macro virus is coded as a small program and is embedded in a file.

Communication Channel Threats The Internet is not at all secure. Messages on the Internet travel a random path from a source node to a destination node. Internet channel security threats include: secrecy integrity necessity

Secrecy Threats Secrecy is the prevention of unauthorized information disclosure. Privacy is the protection of individual rights to nondisclosure. Secrecy is a technical issue requiring sophisticated physical and logical mechanisms. Privacy protection is a legal matter.

Secrecy Threats Web users are continually revealing information about themselves when they use the Web. Several Web sites offer an “anonymous browser” service that hides personal information from sites that you visit. One of these sites, Anonymizer, provides a measure of secrecy to Web surfers who use the site as a portal.

Integrity Threats An integrity threat exists when an unauthorized party can alter a message stream of information. Cyber vandalism is an example of an integrity violation – deface Web site

Necessity Threats The purpose of a necessity threat is to disrupt normal computer processing or to deny processing entirely. Necessity threat is also known as a delay, denial, or denial-of-service (DOS) threats – the server is purposely bombarded with false requests and the server is unable to response to real request. Unauthorized user gain access to9 a server as an administrator – modify Web pages or copy data stored in server.

Server Threats Servers have vulnerabilities that can be exploited to cause destruction or to acquire information illegally. Server threats include: Web server threats - the contents of a server’s folder names are revealed to a Web browser. database threats - databases connected to the Web contain information that could damage a company if it were disclosed or altered. common gateway interface threats other programming threats - come from programs executed by the server, mail bomb (thousands of people send a message to a particular address).

Implementing Electronic Commerce Security Chapter 11 Implementing Electronic Commerce Security

Protecting Electronic Commerce Assets Security is a serious issue. Customers engaging in electronic commerce need to feel confident that their transactions are secure from prying eyes safe from alteration. The security policy must be regularly revised as threat conditions change. A security policy must protect a system’s privacy, integrity, and availability and authenticate users.

Protecting Intellectual Property Digital intellectual properties, including art, logos, and music posted on Web sites, are protected by laws. The U.S. Department of Justice maintains the Cybercrime site to provide information and updates on hacking, software piracy, and the latest security information, as well as the latest information on cyber crime prosecutions.

Protecting Intellectual Property Several methods being tested but provide partial protection. Promising – digital watermark. Watermark – digital code embedded undetectably in a digital image or audio file – encrypted to protect contents, or hidden behind bits.

Organizations Providing Digital Watermarking Verance Corporation Blue Spike Secure Digital Music Initiative Digimarc Corporation

Protecting Privacy Cookies – small pieces of text stored on client computers - contain private information that can include credit card data, passwords, and login information. 2 types – session cookie and persistent cookie. Anyone with access to that computer can read and interpret unencrypted cookies. Cookies – save information about a Web user from one session to another. The best way to protect your privacy is to disable cookies entirely.

Protecting Client Computers Client computers must be protected from threats. Active contents can be one of the most serious threats to client computers. Another threat to client computers is a malevolent server site masquerading as a legitimate Web site.

Monitoring Active Content Netscape Navigator and Microsoft Internet Explorer browsers are equipped to recognize when they are about to download Web page containing active content. When a user downloads Web pages and runs programs that are embedded in them, it gives the user a chance to confirm that the programs are from a known and trusted source.

Digital Certificates Digital certificate – attachment to an email message or an embedded program in a Web page that verifies that a user or Web site is who they claim to be. The digital certificate contains a means for sending an encrypted message to the entity that sent the original Web page or e-mail message. Digital signature – signed message or code. A Web site’s digital certificate is a shopper’s assurance that the Web site is the real store.

Digital Certificates

Digital Certificates

Certification Authority (CA) A certification authority issues a digital certificate to an organization or individual. A key is usually a long binary number to be used with the encryption algorithm. Longer keys provide significantly better protection than shorter keys.

Microsoft Internet Explorer Internet Explorer provides client-side protection inside the browser. Internet Explorer uses Microsoft Authenticode technology. Authenticode technology verifies that the program has a valid certificate.

Microsoft Internet Explorer

Microsoft Internet Explorer

Microsoft Internet Explorer

Netscape Navigator Netscape Navigator allows you to control whether active content is downloaded to your computer. If you allow Java or JavaScript active content, you will always receive an alert from Netscape Navigator.

Netscape Navigator

Netscape Navigator

Netscape Navigator

Using Antivirus Software Antivirus software is a defense strategy. One of the most likely places to find a virus is in an electronic mail attachment. Application service providers (ASPs), such as Critical Path and MessageClick, supply e-mail services to companies to eliminate e-mail virus problems.

Computer Forensics Experts A small group of firms whose job it is to break into client computers. Computer forensics experts are hired to probe PCs. The field of computer forensics is for the collection, preservation, and analysis of computer-related evidence.

Protecting Electronic Commerce Channels Providing commerce channel security means: Providing channel secrecy Guaranteeing message integrity Ensuring channel availability A complete security plan includes authentication Businesses must prevent eavesdroppers from reading the Internet messages that they intercept.

Encryption Encryption is the coding of information by a mathematically based program and a secret key to produce a string of characters that is unintelligible. The program that transforms text into cipher text is called an encryption program. Upon arrival, each message is decrypted using a decryption program.

Three Types of Encryption Hash coding - a process that uses a hash algorithm to calculate a hash value from a message – compare a sender and receiver hash to detect alteration. Asymmetric encryption, or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key. Symmetric encryption, or private-key encryption, encodes a message using a single numeric key to encode and decode data.

Encryption Methods

Ensuring Transaction Integrity Integrity violations can occur whenever a message is altered while in transit between the sender and receiver. Ensuring transaction integrity, two separate algorithms are applied to a message: Hash function Digital signature

Protecting the Web Server The commerce server, along with the Web server, responds to requests from Web browsers through the HTTP protocol and CGI scripts. Security solutions for commerce servers: Access control and authentication Operating system controls Firewall

Access Control and Authentication Access control and authentication refers to controlling who and what has access to the commerce server. Authentication is performed using digital certificates. Web servers often provide access control list security to restrict file access to selected users.

Access Control and Authentication The server can authenticate a user in several ways: First, the certificate represents the user’s admittance voucher. Second, the sever checks the timestamp on the certificate to ensure that the certificate has not expired. Third, a sever can use a callback system to check the user’s client computer address and name. An access control list (ACL) is a list or database of people who can access the files and resources.

Access Control and Authentication

Firewalls A firewall is a computer and software combination that is installed at the entry point of a networked system. Controls inbound and outbound traffic through the system. Acting as a filter, firewalls permit selected message to flow into and out of the protected network. The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat.

Types of Firewalls Packet-filter firewalls examine all the data flowing back and forth between the trusted network. Gateway servers are firewalls that filter traffic based on the application they request. Proxy severs are firewalls that communicate with the Internet on the private network’s behalf.

EXERCISE Select any electronic software package and visit the product information section on their Web site. List the security features which they advertise – pg. 47, no. 2 of the BI version. Locate a computer forenscic expert firm on the Web and determine from their Web site promotional material, the security strategies they employ.