Chapter 10 E-Commerce Security.

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Chapter 11 E-Commerce Security.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Lecture 4 ref: Chapter 10 E-Commerce Fraud and Security Copyright © 2010 Pearson Education, Inc. 1.
THE INFORMATION SECURITY PROBLEM
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Chapter 11 E-Commerce Security
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 11 E-Commerce Security. Electronic CommercePrentice Hall © Learning Objectives 1.Document the trends in computer and network security attacks.
Chapter 11 E-Commerce Security.
Web server security Dr Jim Briggs WEBP security1.
E-Commerce Security and Fraud Issues and Protections
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Learning Objectives Understand the importance and scope of security of information systems for EC. Describe the major concepts and terminology of EC security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Learning Objectives Understand the importance and scope of security of information systems for EC. Describe the major concepts and terminology of EC security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Internet Security facilities for secure communication.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-Commerce Security.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Types of Electronic Infection
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
SECURITY IN E-COMMERCE Sheetal Chhabra. Introduction Contents Threats Threats to information security Acts of Human Error or failure Espionage/Trespass.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
1.Understand the importance and scope of the security of information systems for EC. 2.Describe the major concepts and terminology of EC security. 3.Learn.
Ch 13 Trustworthiness Myungchul Kim
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Network Security Celia Li Computer Science and Engineering York University.
E-COMMERCE SECURITY ELECTRONIC COMMERCE. E-Commerce Security Successful e-tailing requires addressing online security and privacy fears of your online.
E-Commerce Security and Fraud Protection. Learning Objectives 1. Understand the importance and scope of security of information systems for EC. 2. Describe.
Information Systems Design and Development Security Precautions Computing Science.
E-Commerce Infrastructure. Learning Objectives 1. Understand the major components of EC infrastructure. 2. Understand the importance and scope of security.
1.Understand the importance and scope of the security of information systems for EC. 2.Describe the major concepts and terminology of EC security. 3.Learn.
Chapter 8 E-Commerce Security. Objectives Understand the basic elements of EC security. Explain the basic types of network security attacks.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Issues and Protections
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter 9 E-Commerce Security and Fraud Protection
電子商務安全 Secure Electronic Commerce
Presentation transcript:

Chapter 10 E-Commerce Security

Stopping E-Commerce Crimes Six major reasons why is it difficult for e-tailers to stop cyber criminals and fraudsters: Strong EC security makes online shopping inconvenient for customers Lack of cooperation from credit card issuers and foreign ISPs Online shoppers do not take necessary precautions to avoid becoming a victim IS design and security architecture are vulnerable to attack Software vulnerabilities (bugs) are a huge security problem Managers sometimes ignore due standards of care

Stopping E-Commerce Crimes

Stopping E-Commerce Crimes due care Care that a company is reasonably expected to take based on the risks affecting its EC business and online transactions.

E-Commerce Security Strategy and Life Cycle Approach The Internet’s Vulnerable Design The Shift To Profit-motivated Crimes Ignoring Ec Security Best Practices Computing Technology Industry Association (CompTIA) Nonprofit trade group providing information security research and best practices.

Information Assurance information assurance (IA) The protection of information systems against unauthorized access to or modification of information whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.

Information Assurance confidentiality Assurance of data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. integrity Assurance that stored data has not been modified without authorization; and a message that was sent is the same message that was received. availability Assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to authorized users.

Information Assurance authentication Process to verify (assure) the real identity of an individual, computer, computer program, or EC Web site. authorization Process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform.

Information Assurance nonrepudiation Assurance that an online customer or trading partner cannot falsely deny (repudiate) their purchase or transaction. digital signature or digital certificate Validates the sender and time stamp of a transaction so it cannot later be claimed that the transaction was unauthorized or invalid.

Information Assurance

Information Assurance

Enterprisewide E-Commerce Security and Privacy Model EC security program Set of controls over security processes to protect organizational assets. All the policies, procedures, documents, standards, hardware, software, training, and personnel that work together to protect information, the ability to conduct business, and other assets.

Basic E-Commerce Security Issues and Perspectives From the user’s perspective: How can the user know whether the Web server is owned and operated by a legitimate company? How does the user know that the Web page and form have not been compromised by spyware or other malicious code? How does the user know that an employee will not intercept and misuse the information? From the company’s perspective: How does the company know the user will not attempt to break into the Web server or alter the pages and content at the site? From both parties’ perspectives: How do both parties know that the network connection is free from eavesdropping by a third party “listening” on the line? How do they know that the information sent back and forth between the server and the user’s browser has not been altered?

Threats and Attacks nontechnical attack An attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network. social engineering A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network.

Threats and Attacks phishing A crimeware technique to steal the identity of a target company to get the identities of its customers. time-to-exploitation The elapsed time between when a vulnerability is discovered and the time it is exploited. SpywareGuide A public reference site for spyware. zero-day incidents Attacks through previously unknown weaknesses in their computer networks.

Threats and Attacks denial of service (DoS) attack An attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources. botnet A huge number (e.g., hundreds of thousands) of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.

Threats and Attacks Malicious Code malware virus worm macro virus (macro worm) Trojan horse Trojan-Phisher-Rebery banking Trojan

Securing E-Commerce Communications access control Mechanism that determines who can legitimately use a network resource. biometric systems Authentication systems that identify a person by measurement of a biological characteristic, such as fingerprints, iris (eye) patterns, facial features, or voice.

Securing E-Commerce Communications public key infrastructure (PKI) A scheme for securing e-payments using public key encryption and various technical components. encryption plaintext ciphertext encryption algorithm key (key value) Keyspace symmetric (private) key system An encryption system that uses the same key to encrypt and decrypt the message.

Securing E-Commerce Communications

Securing E-Commerce Communications public (asymmetric) key encryption Method of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa. public key private key RSA

Securing E-Commerce Communications Digital Signatures and Certificate Authorities Hash message digest (MD) digital envelope certificate authorities (CAs) Secure Socket Layer (SSL) Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality.

Securing E-Commerce Networks policy of least privilege (POLP) Policy of blocking access to network resources unless access is required to conduct business.

Securing E-Commerce Networks

Securing E-Commerce Networks firewall A single point between two or more networks where all traffic must pass (choke point); the device authenticates, controls, and logs all traffic. packet packet-filtering routers packet filters application-level proxy bastion gateway proxies

Securing E-Commerce Networks

Securing E-Commerce Networks virtual private network (VPN) A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network. intrusion detection systems (IDSs) A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees.

Securing E-Commerce Networks honeynet A network of honeypots. honeypots Production system (e.g., firewalls, routers, Web servers, database servers) that looks like it does real work, but which acts as a decoy and is watched to study how network intrusions occur.

Fraud and Consumer and Seller Protection Fraud On The Internet Consumer Protection Third-Party Assurance Services Seller Protection What Can Sellers Do?