Chapter 5 Security Threats to Electronic Commerce

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Security Threats to Electronic Commerce
Chapter 5 Security Threats to Electronic Commerce
Chapter 9: Privacy, Crime, and Security
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security+ Guide to Network Security Fundamentals
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Chapter 10: Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Chapter 10: Electronic Commerce Security
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Computer Security and Penetration Testing
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
E-Commerce: The Second Wave Fifth Annual Edition
Chapter 6: Hostile Code Guide to Computer Network Security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Chapter 13 – Network Security
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Dimensions of E – Commerce Security
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Chapter 7: E-Commerce Security and Payment system
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chap1: Is there a Security Problem in Computing?.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
WEB SERVER SOFTWARE FEATURE SETS
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Chapter 5 Electronic Commerce | Security
Chapter 5 Electronic Commerce | Security
Security.
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Chapter 5 Security Threats to Electronic Commerce

Security Overview Many fears to overcome: Intercepted e-mail messages is a concern Unauthorized access to business information by a competitor Credit card information falling into the wrong hands while typing during payment processing

Security Definition Computer security is the protection of unauthorized access, use, alteration, or destruction hardware, software, and data. Two types of computer security: Physical - protection of computing devices using physical objects such as guards, alarms, security doors, vaults, etc. Logical - protection through password, firewall, and encryption are logical solutions to security.

Security Overview Threat: Any act or object that poses a danger to computer assets is known as a threat. Countermeasures are procedures, either physical or logical, that recognize, reduce, or eliminate a threat Threats that are low risk and unlikely to occur can be ignored if the cost of protection is higher the asset (hardware, software, data) value.

Risk Management Model

Computer Security Classification Computer security can be classified into three categories: Secrecy Protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source Integrity Preventing unauthorized data modification Necessity Preventing data delays or denials (removal)

Security Policy A Security policy is a written statement describing what assets are to be protected and why, who is responsible, which behaviors are acceptable or not. Any organization involved in e-commerce, should have a security policy in place. Specific elements of a security policy addresses: Authentication Who is trying to access the site? Access Control Who is allowed to logon and access the site? Secrecy Who is permitted to view selected information Data integrity Who is allowed to change data? Audit What and who causes selected events to occur, and when?

Integrated Security Security policy should address an integrated security of an organization. Integrated security policy should address all security measures in order to prevent unauthorized disclosure, destruction, or modification of assets. It includes: Physical security Network security Access authorizations Virus protection Disaster recovery

Electronic Commerce Threats Secure electronic commerce include protection of three assets in the “commerce chain”. These are: Client computers Messages travelling from the client computer to the Web server through the Internet Web/Commerce servers

Client Threats Active Content Java applets, Active X controls, JavaScript, and VBScript, which are programs that interpret or execute instructions embedded in downloaded objects from a Web/commerce server Malicious active content can be embedded into seemingly innocuous Web pages Cookies remember user names, passwords, and other commonly referenced information

Java and Java Applets Java is a high-level programming language developed by Sun Microsystems Java code embedded into appliances can make them run more intelligently Largest use of Java is in Web pages as Java Applets Java is Platform independent - will run on any computer

Java Applets An applet is a program that executes within another program and cannot execute directly on a computer Once downloaded, a Java applet can run on a client computer, so security violations can occur Java sandbox security: Confines Java applet actions to a security model-defined set of rules Rules apply to all untrusted applets, that have not been proven secure Applets obeying sandbox rules can not perform file input, output, or delete operations of the operating system. Signed Java applets: Contain embedded digital signatures from a third party, which serve as a proof of identity of the source of the applet. If the applet is signed, then it can be let out of sandbox to use the full system resources

JavaScript JavaScript is a scripting language developed by Netscape Corporation to enable Web page designers to build active content. When downloaded a Web page with embedded JavaScript, it runs in the client computer and can destroy hard disk, send back e-mail accounts to the originating Web server, and so on. Having a secure communication channel is not useful under this condition

ActiveX Controls ActiveX is an object, called a control, that contains programs and properties that perform certain tasks ActiveX controls only run on computers with Windows 95, 98, or 2000 Once downloaded, ActiveX controls execute like any other program, having full access to a computer’s resources reformatting a hard disk, sending e-mail addresses, or shut down the computer.

Communication Channel Threats Secrecy Threats: Secrecy is the prevention of unauthorized information disclosure. It requires sophisticated physical and logical mechanism to implement Theft of sensitive or personal information (e-mail address, credit card number)is a significant danger in e-commerce Sniffer programs can tap into a router of the Internet and record information while it passes from a client computer to a Web server. IP address of a computer is continually revealed to a Web server while a user is on the web

Communication Channel Threats How to Hide an IP address from a Web site: A Web site called “Anonymizer” that provides a measure of secrecy by hiding the IP address of a client computer from sites that a user visits. It requires that a users starts his/her visit from the “anonymizer” home page: http://www.anonymizer.com Anonymizer acts as a firewall and shields private information from leaking out.

Communication Channel Threats Integrity Threats: Also known as active wiretapping Unauthorized party can alter data such as changing the amount of a deposit or withdrawal in bank transaction over the Internet A hacker can create a mechanism such that all transactions from a Web site redirects to a fake location.

Communication Channel Threats Necessity Threats: Also known as delay or denial threats Disrupt normal computer processing Deny processing entirely Slow processing to intolerably slow speeds such that customers get bored not to visit the site anymore. Remove file entirely, or delete information from a transmission or file Divert money from one bank account to another

Server Threats The more complex a Web server software becomes, the higher the probability that errors (bugs) exist in the code - security holes through which hackers can access. Web servers run at various privilege levels: Highest levels provide greatest access and flexibility to a Web user (from a browser) Lowest levels provide a logical fence around a running program

Server Threats Secrecy violations occur when the contents of a server’s folder names are revealed to a Web browser Web site administrators can turn off the “Allow Directory Browsing” feature to avoid secrecy violations Cookies requested by a Web server, containing a user’s Userid and Password in a client computer, should never be transmitted unprotected

Server Threats

Displayed Folder Names Figure 5-9

Server Threats One of the most sensitive files on a Web server holds the username and password pairs The Web server administrator is responsible for ensuring that this, and other sensitive files, are secure

Database Threats A company database systems store data on user, products, and orders for e-commerce In addition, a company’s valuable and private information could be stored in a company database Security in a database is often enforced through defining the user “privileges” which must be enforced Some databases are inherently insecure and rely on the Web server to enforce security measures

Other Threats Common Gateway Interface (CGI) Threats CGIs are programs that present a security threat if misused CGI programs can reside almost anywhere on a Web server and therefore are often difficult to track down CGI scripts do not run inside a sandbox, unlike JavaScript