MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Security.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Confidentiality and Privacy Controls
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 17 Controls and Security Measures
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Securing Information Systems
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
1.1 System Performance Security Module 1 Version 5.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 9 Security. Copyright © 2003, Addison-Wesley Security The quality or state of being secure Freedom from danger Freedom from fear or anxiety Measures.
C8- Securing Information Systems
Today’s Lecture Covers < Chapter 6 - IS Security
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Information Systems Security
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
IT in Business Issues in Information Technology Lecture – 13.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
DIGITAL SIGNATURE.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Information Security in Distributed Systems Distributed Systems1.
Chap1: Is there a Security Problem in Computing?.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Security and Ethics Safeguards and Codes of Conduct.
Network Security Celia Li Computer Science and Engineering York University.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Information Systems Design and Development Security Precautions Computing Science.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Security Issues in Information Technology
Chapter 40 Internet Security.
Information and Network Security
Confidentiality and Privacy Controls
INFORMATION SYSTEMS SECURITY and CONTROL
ONLINE SECURE DATA SERVICE
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Security

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Outline  What is Security  What is Electronic security  Objectives of security  Importance of security  Types of security  Security policy  Security Tips

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE What is Security?  That which secures;  protection;  a state of safety or safe keeping.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Electronic Security  The process of preventing and detecting unauthorized use of a computer based information system  Prevention measures to stop unauthorized users from accessing any part of the computer based information system

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Importance of Security  Privacy  Crime  Networks and their associated technologies have opened the door to an increasing number of security threats.  Important data can be lost, privacy can be violated and the computer can even be used by an outside attacker to attack other computers on the Internet.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE WHO MIGHT ATTACK?  Hackers In security circles, most of these people are known as "script kiddies."  Business rivals Competitors may try to obtain information illicitly through your virtual back doors.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE WHO MIGHT ATTACK?  Foreign intelligence Another area of concern is foreign espionage. France, Israel, and Russia are known to have active industrial espionage efforts underway against the United States.  Insiders they may be hackers for their own amusement, for example, or they may be working for rivals or foreign intelligence agencies.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Internet Access Corporate Intranet Internet Presence eCommerce Extranets Security Considerations Internet Business Value

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Objectives of Security  Confidentiality  Integrity  Availability

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Confidentiality  The process used to protect secret information from unauthorized disclosure.  Secret data needs to be protected when it is stored or when it is being transmitted over the network.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Integrity  Refers to the unauthorized changing of creation of values of data within the system.  Data Integrity detects whether the data has been modified during transmission. Such modification may be the result of an attack or a transmission error ( corruption).

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Integrity (cont.)  There are legal concerns regarding  Anonymity of source  Ease of reproduction  Detection of alteration  Unauthorised disclosure  attribution

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Availability  Caused by equipment malfunction, equipment destruction (natural disaster) or equipment loss (theft).  Example: Computer Virus ( causes the system to be unavailable for an extended period while the virus is removed and corrupted data is reprocessed).

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Types of Security  Technical Countermeasures  Non-Technical Countermeasures  Physical  Procedural

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE A Balanced Approach to Security Security Conscious People Policies & Procedure Network Controls Security Software Threats Resources

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Technical Countermeasures  Passwords  Encryption  Cryptography  Digital Signatures  Firewalls  Key locks  Smart cards  biometrics

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Passwords  computer system is password protected  Make passwords as meaningless as possible  No real words (forward or backwards)  Mixture of letters and numbers  Change passwords regularly  Never divulge passwords to anyone

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Encryption  Encryption technology ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.  Encryption is usually deployed to protect data that is transported over a public network such as the Internet and uses advance mathematical algorithms to ‘scramble’ messages and their attachments.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Where is Encryption used:  ATM’s  EFTPOS  Internet transaction  Protects medical records, corporate trades secrets, air traffic control centres etc.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Cryptography  It is the practical art of converting messages or data into a different form, such that no-one can read them without having access to the 'key'.  The message may be converted using a 'code' (in which case each character or group of characters is substituted by an alternative one), or a 'cypher' or 'cipher' (in which case the message as a whole is converted, rather than individual characters).  Cryptanalysis is the science of 'breaking' or 'cracking' encryption schemes, i.e. discovering the decryption key.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Symmetric Cryptography The same key is used for encrypting and decrypting messages

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Public Key Cryptography Multiple people encrypt messages using the recipient’s well-known public key. The recipient decrypts it with her private key.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Public Key Cryptography (cont.)  A message encrypted with a Public Key can only be decrypted with the private Key  A message encrypted with the private key can only be decrypted with the public key

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Public Key Cryptography (cont.)  Key Distribution  Certification Authority (CA) acts as a trusted third party which distributes digital certificates.  The digital certificates which are publicly distributed contain a user’s public key as well as other information such as the user’s personal details and the expiry date of the key.  Registration Authoriy verifies a user’s identity at the time the user applies for a digital certificate. Often the CA and an RA are the same entities.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Public Key Distribution

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Digital Signatures  Block of text that is used to verify that a message really comes from the claimed sender.  Can also be used to verify the time document was sent.  can only be generated by the sender and is very difficult for anyone else to forge.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Digital Signature Process

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Digital Envelopes 1.Sender generates a random message key (K). Sender encrypts the message (M) with K, creating the cipher text message (CM). 2.Sender encrypts K with recipient’s public key (RPubK), generating cipher text CK. 3.Sender computes a digital signature (S) using her private signature (SPrivK) 4.Sender sends CK, CM and S to recipient. 5.Recipient uses his private key (RPrivK) to decrypt CK and obtain K. 6.Recipient uses K to decrypt CM and get M. 7.Recipient uses sender’s public key (SPubK) to validate S.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE

Firewalls  A firewall is a device that is placed between your system and the internet. It can monitor and filter any incoming and outgoing traffic.  Offers a single point at which security can be monitored and alarms generated.  Encryption can be used as a safeguard.  There should be a security policy in place.  An important point need to keep in mind that firewalls are not always impenetrable.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Physical Countermeasures  Is defined as the protection of its resources against threats of damage, theft and natural disasters.  Involves a layered approach

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Computer Security Building Security End User Security Hacker Attacks Physical Intrusion Unauthenticated Access Environmental Disruption

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Building Security  Guard  Alarm system  Surveillance system  Perimeter security ( adequate lighting, security fences)  Warning signs  Centralized control (response to an attack as quickly as possible)

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Procedural  Conditions of use (layout expectations)  Key locks  Supervision  Usage monitoring  Safe storage of data  Backup (make copies of data and softwares)  User authorisation  Intruder detection  Monitoring and control  Business Continuity Plans  Disaster Recovery Plans

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE  Disaster Recovery Plan  Approved set of arrangements and procedures that enable an organisation to respond to a disaster and resume its critical business functions within a defined time frame  Business Continuity Plan  Process of developing advanced arrangements and procedures that enable an organisation to respond to an event in such a manner that critical business functions continue without interruption or essential change

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Natural Disasters  Causes extensive damage such as:  Loss of power, communication lines and processing; buildings set on fire; building collapsing.  To overcomes the damages organizations should:  Secure external communication links; Install lighting protection; create firebreaks around buildings; insure appropriate building construction.

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE IT Security Policy  Example

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Assess the Situation Fix High Risk Vulnerabilities Secure the Perimeter Secure the Interior Deploy Monitors Test\Attack High Risks How to secure an environment

MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Security Tips  Use protection software "anti-virus software" and keep it up to date.  Don't open from unknown sources.  Use hard-to-guess passwords.  Protect your computer from Internet intruders -- use "firewalls".  Don't share access to your computers with strangers. Learn about file sharing risks.  Back up your computer data.