The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Tutorial 6: Internet Security.
Securing and Enhancing Your Use of the Internet
Chapter 9 Information Systems Ethics, Computer Crime, and Security
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Implementing Electronic Commerce Security
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Tutorial 9 Security on the Internet and the Web
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 10: Electronic Commerce Security
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 9 1 Securing and Enhancing Your Use of the Internet Internet Security.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 9 1 Security on the Internet and the Web Security Threats and Countermeasures.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 11 Security and Privacy: Computers and the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Internet Security facilities for secure communication.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Chapter 7: E-Commerce Security and Payment system
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Security, Social and Legal Issues Regarding Software and Internet.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chap1: Is there a Security Problem in Computing?.
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Security Issues in Information Technology
Security on the Internet and the Web
Chapter 40 Internet Security.
IT Security  .
Implementing Security for Electronic Commerce
Chapter 17 Risks, Security and Disaster Recovery
HOW DO I KEEP MY COMPUTER SAFE?
Security.
Presentation transcript:

The Internet 8th Edition Tutorial 7 Security on the Internet and the Web

New Perspectives on the Internet, 8 th Edition Objectives Explore the basics of security: secrecy, integrity, and necessity Find out what hackers and crackers can do and why they do it Learn about the dangers of online crime, warfare, and terrorism Investigate how to protect copyrighted materials that are published on the Internet

New Perspectives on the Internet, 8 th Edition Objectives Understand Web client threats and countermeasures Learn about online communication channel threats and countermeasures Learn about Web server threats and countermeasures Find out how to get more information and current updates about online security

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity Security is broadly defined as the protection of assets from unauthorized access, use, alteration, or destruction Physical security includes tangible protection devices, such as locks, alarms, fireproof doors, security fences, safes or vaults, and bombproof buildings Protection of assets using nonphysical means, such as password protection, is called logical security

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity The use of logical security techniques to protect data stored on computers is sometimes called computer security Any act or object that endangers an asset is known as a threat A countermeasure is a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity Risk management model

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity A secrecy threat permits unauthorized data disclosure and ensures the authenticity of the data’s source An integrity threat permits unauthorized data modification A necessity threat permits data delays (slowing down the transmission of data) or denials (preventing data from getting to its destination)

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity Encryption is the process of coding information using a mathematical algorithm to produce a string of characters that is unreadable. Some algorithms are a procedure; others use a procedure combined with a key A key is a fact that the encryption algorithm uses as part of its encryption procedure The process of using a key to reverse encrypted text is called decryption Encrypted information is called cipher text, whereas unencrypted information is called plain text

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity Private-key encryption (also called symmetric encryption) uses a single key that both the sender and receiver know

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity With public-key encryption (also called asymmetric encryption), a person has a private key that is secret and a public key that is shared with other users Public-key encryption uses a public key known to everyone and a private or secret key known only to one person involved in the exchange An algorithm is a formula or set of steps to solve a particular problem

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity In a man-in-the-middle exploit, the contents of an are often changed in a way that negates the message’s original meaning The term virus has come to mean any program that attempts to disguise its true function A Trojan horse is a potentially harmful program hidden inside another program A variation of a virus is a worm, a self-replicating program that is usually hidden within another file and then sent as an attachment Many viruses can send you an that includes the name of someone you know in the message’s From line, a tactic called spoofing

New Perspectives on the Internet, 8 th Edition Understanding Security Basics: Secrecy, Integrity, and Necessity The most common necessity attack, called a packet flooding attack or a denial of service (DoS) attack, occurs when an attacker bombards a server or other computer with so many messages that the network’s bandwidth resources are consumed In a distributed denial of service (DDoS) attack, the perpetrator uses a large number of computers that each launch a DoS attack on one Web server at the same time

New Perspectives on the Internet, 8 th Edition Online Crime, Warfare, and Terrorism A cracker is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers or networks of computers Some computer professionals use the terms white hat hacker and black hat hacker to distinguish between those who use their skills for good and those who use their talents to commit illegal acts Called computer forensics experts or ethical hackers, computer sleuths are hired to probe computers and locate information that can be used in legal proceedings

New Perspectives on the Internet, 8 th Edition Online Crime, Warfare, and Terrorism The nature and degree of personal information that Web sites can record when collecting information about visitors’ page viewing habits, product selections, and demographic information can threaten the privacy of those visitors In recent years, many companies have made headlines because they released or lost control of confidential information about customers, employees, and vendors without the permission of those individuals

New Perspectives on the Internet, 8 th Edition Online Crime, Warfare, and Terrorism If a perpetrator can gather enough information, he or she can steal a person’s entire credit record. In this type of crime, called identity theft, the perpetrator can use the victim’s personal information to open bank accounts, obtain new credit cards, and buy expensive goods on credit, often damaging the victim’s credit rating in addition to racking up charges A company becomes the victim of a criminal extortionist when a perpetrator threatens to launch DoS attacks against a target unless the target pays a “fee”

New Perspectives on the Internet, 8 th Edition Online Crime, Warfare, and Terrorism Other types of online crime: –Organized crime or racketeering –Industrial espionage

New Perspectives on the Internet, 8 th Edition Copyright and Intellectual Property Threats and Countermeasures A digital watermark is a digital pattern containing copyright information that is inserted into a digital image, animation, or audio or video file Steganography is a process that hides encrypted messages within different types of files

New Perspectives on the Internet, 8 th Edition Web Client Security One of the most dangerous entry points for denial of service threats come from programs that travel with applications to a browser and execute on the user’s computer, which are often called active content ActiveX components are Microsoft’s technology for writing small applications that perform some action in Web pages; these components have access to a computer’s file system Internet Explorer maintains a list of known developers and examines the digital certificate on any ActiveX control before it is downloaded to determine if it is a signed ActiveX control

New Perspectives on the Internet, 8 th Edition Web Client Security In most cases, Web sites that use and store cookies do so to enhance your Web browsing experience, and most cookies are safe A cookie is not a program, and it can only store information that you provide to the Web site that creates it

New Perspectives on the Internet, 8 th Edition Web Client Security

New Perspectives on the Internet, 8 th Edition Web Client Security A Web bug is a small, hidden graphic on a Web page or in an message that is designed to work in conjunction with a cookie to obtain information about the person viewing the page or message and to send that information to a third party Adware is a general category of software that includes advertisements to help pay for the product in which they appear Spyware works much like adware except that the user has no control over or knowledge of the ads and other monitoring features the ads contain

New Perspectives on the Internet, 8 th Edition Web Client Security A firewall is a software program or hardware device that controls access between two networks

New Perspectives on the Internet, 8 th Edition Communication Channel Security Authentication is a general term for the process of verifying the identity of a person or a Web site A digital certificate is an encrypted and password- protected file that contains sufficient information to authenticate and prove a person’s or organization’s identity

New Perspectives on the Internet, 8 th Edition Communication Channel Security Usually, a digital certificate contains the following information: –The certificate holder’s name, address, and address –A key that “unlocks” the digital certificate, thereby verifying the certificate’s authenticity –The certificate’s expiration date or validity period –Verification from a trusted third party, called a certificate authority (CA), that authenticates the certificate holder’s identity and issues the digital certificate

New Perspectives on the Internet, 8 th Edition Communication Channel Security There are two types of digital certificates. Individuals can purchase one type called a digital ID (also called a personal certificate) Phishing is difficult to prevent because it involves phony messages that include links to spoofed Web sites

New Perspectives on the Internet, 8 th Edition Web Server Security A server certificate (sometimes called an SSL Web server certificate) authenticates a Web site so site visitors can be confident that the Web site is genuine and not an impostor

New Perspectives on the Internet, 8 th Edition Web Server Security User identification is the process of identifying yourself to a computer Most computer systems implement user identification with user names and passwords; the combination of a user name and password is sometimes called a login To help keep track of their login information for different computers and Web sites, some people use a program called a password manager, which stores login information in an encrypted form on their computers A brute force attack occurs when a cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system

New Perspectives on the Internet, 8 th Edition Web Server Security User authentication is the process of associating a person and his identification with a very high level of assurance The combination of user login plus password is called single-factor authentication because it uses one factor Multifactor authentication relies on more than one factor Multiple layers of control can be implemented by using more than one authentication method

New Perspectives on the Internet, 8 th Edition Web Server Security The Secure Sockets Layer (SSL) was the first widely used protocol for establishing secure, encrypted connections between Web browsers and Web servers on the Internet

New Perspectives on the Internet, 8 th Edition Staying Current with Internet and Web Security The CERT Coordination Center is a federally funded research center operated by the Software Engineering Institute at Carnegie Mellon University The primary goal of the CERT Coordination Center is to publish alerts, advisories, and vulnerability reports about current and future Internet security problems it detects and to coordinate communication between software experts

New Perspectives on the Internet, 8 th Edition Summary The basics of security: secrecy, integrity, and necessity What hackers and crackers can do and why they do it The dangers of online crime, warfare, and terrorism How to protect copyrighted materials that are published on the Internet Web client threats and countermeasures Online communication channel threats and countermeasures Web server threats and countermeasures How to get more information and updates about online security