12/15/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of.

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

Implementing Electronic Commerce Security Gary Schneider, 2003
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
5/4/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of Pennsylvania.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Implementing Electronic Commerce Security
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Chapter 10: Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Implementing Security for Electronic Commerce
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Implementing Security for Electronic Commerce
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 10: Electronic Commerce Security
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Security Threats to Electronic Commerce
E-Commerce: The Second Wave Fifth Annual Edition
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 E-Commerce Security Part II – Security Techniques.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Chapter 21 Distributed System Security Copyright © 2008.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
Understand Internet Security LESSON Security Fundamentals.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Chapter 40 Internet Security.
Chapter 5 Electronic Commerce | Security Threats - Solution
Implementing Security for Electronic Commerce
Secure Sockets Layer (SSL)
Chapter 5 Electronic Commerce | Security Threats - Solution
Using SSL – Secure Socket Layer
The Secure Sockets Layer (SSL) Protocol
Electronic Payment Security Technologies
Presentation transcript:

12/15/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of Pennsylvania

12/15/00EMTM 5532 Objectives Security measures that can reduce or eliminate intellectual property theft Securing client computers from attack by viruses and by ill-intentioned programs and scripts downloaded in Web pages Authenticate users to servers and authenticate servers

12/15/00EMTM 5533 Objectives Available protection mechanisms to secure information sent between a client and a server Message integrity security, preventing another program from altering information as it travels across the Internet Safeguards that are available so commerce servers can authenticate users Protecting intranets with firewalls and corporate servers against being attacked through the Internet The role Secure Socket Layer, Secure HTTP and secure electronic transaction protocols play in protecting e- commerce

12/15/00EMTM 5534 Protecting Electronic Commerce Assets You cannot hope to produce secure commerce systems unless there is a written security policy –What assets are to be protected –What is needed to protect those assets –Analysis of the likelihood of threats –Rules to be enforced to protect those assets

12/15/00EMTM 5535 Protecting Electronic Commerce Assets Both defense and commercial security guidelines state that you must protect assets from –Unauthorized disclosure –Modification –Destruction Typical security policy concerning confidential company information –Do not reveal company confidential information to anyone outside the company

12/15/00EMTM 5536 Minimum Requirements for Secure Electronic Commerce Figure 6-1

12/15/00EMTM 5537 Protecting Intellectual Property The dilemma for digital property is how to display and make available intellectual property on the Web while protecting those copyrighted works

12/15/00EMTM 5538 Companies Providing Intellectual Property Protection Software ARIS Technologies (part of verance.com) –Digital audio watermarking systems oEmbedded code in audio file uniquely identifying the intellectual property Digimarc Corporation –Watermarking for various file formats –Controls software and playback devices

12/15/00EMTM 5539 Companies Providing Intellectual Property Protection Software SoftLock Services –Allows authors and publishers to lock files containing digital information for sale on the Web –Posts files to the Web that must be unlocked with a purchased ‘key’ before viewing Digitalgoods.com –infrastructure and integrated services necessary to securely market and distribute multimedia digital content to its maximum audience

12/15/00EMTM Protecting Client Computers Active content, delivered over the Internet in dynamic Web pages, can be one of the most serious threats to client computers Threats can hide in –Web pages –Downloaded graphics and plug-ins – attachments

12/15/00EMTM Protecting Client Computers Cookies –Small pieces of text stored on your computer and contain sensitive information that is not encrypted –Anyone can read and interpret cookie data –Do not harm client machines directly, but potentially could still cause damage Misplaced trust –Web sites that aren’t really what they seem and trick the user into revealing sensitive data

12/15/00EMTM Monitoring Active Content Netscape Navigator and Microsoft Internet Explorer browsers are equipped to allow the user to monitor active content before allowing it to download Digital certificates provide assurance to clients and servers that the participant is authenticated

12/15/00EMTM Digital Certificates Also known as a digital ID An attachment to an message Embedded in a Web page Serves as proof that the holder is the person or company identified by the certificate Encoded so that others cannot read or duplicate it

12/15/00EMTM VeriSign -- A Certification Authority Figure 6-3

12/15/00EMTM VeriSign Oldest and best-known Certification Authority (CA) Offers several classes of certificates –Class 1 (lowest level) oBind address and associated public keys –Class 4 (highest level) oApply to servers and their organizations oOffers assurance of an individual’s identity and relationship to a specified organization

12/15/00EMTM Structure of a VeriSign Certificate Figure 6-4

12/15/00EMTM Microsoft Internet Explorer Provides client-side protection right inside the browser Reacts to ActiveX and Java-based content Authenticode verifies the identity of downloaded content The user decides to ‘trust’ code from individual companies

12/15/00EMTM Security Warning and Certificate Validation Figure 6-5

12/15/00EMTM Internet Explorer Zones and Security Levels Figure 6-6

12/15/00EMTM Internet Explorer Security Zone Default Settings Figure 6-7

12/15/00EMTM Netscape Navigator User can decide to allow Navigator to download active content User can view the signature attached to Java and JavaSript Security is set in the Preferences dialog box Cookie options are also set in the Preferences dialog box

12/15/00EMTM Setting Netscape Navigator Preferences Figure 6-8

12/15/00EMTM A Typical Netscape Navigator Java Security Alert Figure 6-9

12/15/00EMTM Viewing a Content Provider’s Certificate Figure 6-10

12/15/00EMTM Dealing with Cookies Can be set to expire within 10, 20, or 30 days Retrievable only by the site that created them Collect information so that the user doesn’t have to continually enter usernames and passwords to access Web sites Earlier browsers simply stored cookies without comment Today’s browsers allow the user to –Store cookies without permission or warning –Receive a warning that a cookie is about to be stored –Unconditionally disallow cookies altogether

12/15/00EMTM Protecting Electronic Commerce Channels Protecting assets while they are in transit between client computers and remote servers Providing channel security includes –Channel secrecy –Guaranteeing message integrity –Ensuring channel availability –Authentication

12/15/00EMTM Providing Transaction Privacy Encryption –The coding of information by using a mathematically based program and secret key to produce unintelligible characters –Steganography oMakes text invisible to the naked eye –Cryptography oConverts text to strings that appear to have no meaning

12/15/00EMTM Encryption 40-bit keys are considered minimal,128-bit keys provide much more secure encryption Encryption can be subdivided into three functions –Hash Coding oCalculates a number from any length string –Asymmetric (Public-key) Encryption oEncodes by using two mathematically related keys –Symmetric (Private-key) Encryption oEncodes by using one key, both sender and receiver must know

12/15/00EMTM Hash Coding, Private-key, and Public-key Encryption Figure 6-11

12/15/00EMTM Significant Encryption Algorithms and Standards Figure 6-12

12/15/00EMTM Secure Sockets Layer (SSL) Protocol Secures connections between two computers Provides a security handshake in which the client and server computers exchange the level of security to be used, certificates, among other things Secures many different types of communications between computers

12/15/00EMTM Secure Sockets Layer (SSL) Protocol Provides either 40-bit or 128-bit encryption Session keys are used to create the cipher text from plain text during the session The longer the key, the more resistant to attack

12/15/00EMTM SSL Handshake The SSL handshake consists of nine steps that authenticate the two parties and create a shared session key. [Stein]

12/15/00EMTM SSL Web Server Information Figure 6-14

12/15/00EMTM Secure HTTP (S-HTTP) Protocol Developed by CommerceNet Consortium Extension to HTTP that provides numerous security features –Client and server authentication –Spontaneous encryption –Request/response nonrepudiation Provides symmetric and public-key encryption, and message digests (summaries of messages as integers) Whereas SSL is designed to establish a secure connection between two computers, S-HTTP is designed to send individual messages securely.

12/15/00EMTM Ensuring Transaction Integrity Figure 6-15

12/15/00EMTM Guaranteeing Transaction Delivery Neither encryption nor digital signatures protect packets from theft or slowdown Transmission Control Protocol (TCP) is responsible for end-to-end control of packets TCP requests that the client computer resend data when packets appear to be missing

12/15/00EMTM Protecting the Commerce Server Access control and authentication –Controlling who and what has access to the server –Requests that the client send a certificate as part of authentication –Server checks the timestamp on the certificate to ensure that it hasn’t expired –Can use a callback system in which the client computer address and name are checked against a list

12/15/00EMTM Protecting the Commerce Server Usernames and passwords are the most common method of providing protection for the server Usernames are stored in clear text, while passwords are encrypted The password entered by the user is encrypted and compared to the one on file

12/15/00EMTM Logging On With A Username And Password Figure 6-16

12/15/00EMTM Operating System Controls Most operating systems employ username and password authentication A common defense is a firewall –All traffic from inside to outside and outside to inside must pass through it –Only authorized traffic is allowed –The firewall itself must be immune to penetration

12/15/00EMTM Firewalls Should be stripped of any unnecessary software Categories of firewalls include –Packet filters oExamine all packets flowing through the firewall –Gateway servers oFilter traffic based on the requested application –Proxy servers oCommunicate on behalf of the private network oServe as a huge cache for Web pages

12/15/00EMTM Application Firewalls smtp: 25 ftp: 21 telnet: 23 http: 80 ftp: 21 Presentation Session Transport Network Data Link Physical OSI Site 2 Site 1 Internet Traffic Cop

12/15/00EMTM Check Point Software’s Firewall-1 Web Page Figure 6-17