Copyright 2008-11 1 A Risk Assessment Framework for Mobile Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science at.

Slides:



Advertisements
Similar presentations
Jack Jedwab Association for Canadian Studies September 27 th, 2008 Canadian Post Olympic Survey.
Advertisements

Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Symantec 2010 Windows 7 Migration Global Results.
1 A B C
Basic accounting I recap.
A Risk Assessment Framework for Mobile Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong Kong, Cyberspace.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Copyright COMP 3410 – I.T. in Electronic Commerce eSecurity Mobile Security Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
AP STUDY SESSION 2.
1
Copyright COMP 3410 / 6341 – I.T. in Electronic Commerce E-Trading 3.Electronic Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor,
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Select from the most commonly used minutes below.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 Created by Cheryl M. Hughes The Web Wizards Guide to XML by Cheryl M. Hughes.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
STATISTICS HYPOTHESES TEST (I)
September 2013 ASTM Officers Training Workshop September 2013 ASTM Officers Training Workshop ASTM Member Website Tools September 2013 ASTM Officers Training.
David Burdett May 11, 2004 Package Binding for WS CDL.
Create an Application Title 1Y - Youth Chapter 5.
Welcome PC-ACE Pro32 Training
CALENDAR.
1 Pretty Good Privacy (PGP) Security for Electronic .
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
Media-Monitoring Final Report April - May 2010 News.
Impressive Star Softwares (P) Ltd. Presents Sent Item Box-Detail of Mails from Tally ( 1.0 )
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Break Time Remaining 10:00.
Activity 1………….Why Do You Need A Bank?
Activity 1………….Why Do You Need A Bank? Activity 2………The Many Services of a Bank Activity 3…The ABCs of a Chequing Account Activity 4………Opening a Chequing.
A sample problem. The cash in bank account for J. B. Lindsay Co. at May 31 of the current year indicated a balance of $14, after both the cash receipts.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
PP Test Review Sections 6-1 to 6-6
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Adding Up In Chunks.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Welcome to Instructions and tips for the online application process 1 June 2012.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Copyright © 2008 Pearson Addison-Wesley. All rights reserved. Chapter 10 A Monetary Intertemporal Model: Money, Prices, and Monetary Policy.
WorkKeys Internet Version Training
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
1 Titre de la diapositive SDMO Industries – Training Département MICS KERYS 09- MICS KERYS – WEBSITE.
Essential Cell Biology
Converting a Fraction to %
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
Physics for Scientists & Engineers, 3rd Edition
Systems Analysis and Design in a Changing World, Fourth Edition
Select a time to count down from the clock above
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
Copyright Tim Morris/St Stephen's School
1.step PMIT start + initial project data input Concept Concept.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Electronic Payment By: El Panda. What is an electronic payment? Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
BY GAWARE S.R. DEPT.OF COMP.SCI
Can Mobile Payments be 'Secure Enough'
Presentation transcript:

Copyright A Risk Assessment Framework for Mobile Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science at ANU and in Cyberspace Law & Policy at UNSW {.html,.ppt} Bond University – 11 February 2011

Copyright

Copyright A Risk Assessment Framework for Mobile Payments Agenda 1.Motivation 2.Scope 3.Lessons from the Past 4.Elements of the Framework 5.Some Inferences

Copyright A Risk Assessment Framework for Mobile Payments The Motivation eCommerce was sl-o-o-o-o-w MCommerce was even slower Distrust about security is a major factor, especially when its about money To overcome the Distrust Impediment, constructive measures are needed Risk Assessment and Management would seem to be a good place to start

Copyright MPayments Security The Existing Literature Scornavacca (2007) – Over 1,400 references 31 with 'security' in the title 46 with 'payment' in the title 1 with both security and payment in the title (Linck et al. – Augsburg – ECIS 2006, open-ended question What would you require to feel secure about using mobile payments?) Little else of consequence via Google Scholar

Copyright Mobile Devices 'Any device that provides users with the capacity to participate in Transactions with Adjacent and Remote devices by Wireless Means' Mobiles / Smartphones Handheld Computing Devices PDAs, games machines, music-players, 'converged' / multi-function devices, Tablets esp. iPad but now many followers Wearable Computing Devices Watches, finger-rings, key-rings, glasses, necklaces, bracelets, anklets, body-piercings Processing Capabilities in Other 'Form Factors' Credit-cards, RFID tags, subcutaneous chips ? Nomadic / Untethered PCs

Copyright Wireless Means Wide Area Networks – Satellite Geosynchronous (2 second latency) Low-Orbit (Iridium) Wide Area Networks – Cellular (0.5 to 20km per cell) 1 – Analogue Cellular 2 – Digital Cellular, e.g. GSM, CDMA 2.5 – e.g. GSM/GPRS,... 3 – e.g. CDMA2000, UMTS/HSPA,... Wide Area Networks – WiMax / IEEE ; iBurst Local Area Networks – WiFi / x (10-100m radius) Personal Area Networks – Bluetooth (1-10 m radius) Contactless Cards / RFID Tags / NFC (1-10cm radius)

Copyright Categories of Mobile Payment Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC)

Copyright Categories of Mobile Payment Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC) eCommerce Purchases of physical goods and services at virtual points of sale (Internet, Cellular phone)

Copyright Categories of Mobile Payment Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC) eCommerce Purchases of physical goods and services at virtual points of sale (Internet, Cellular phone) MCommerce Purchases of digital goods and services, such as image, audio and video, and location-specific data

Copyright Categories of Mobile Payment Commerce Purchases of physical goods and services, at physical POS, road tolls (Contactless Chips, NFC) eCommerce Purchases of physical goods and services at virtual points of sale (Internet, Cellular phone) MCommerce Purchases of digital g&s, such as image, audio and video, and location-specific data Consumer-to-Consumer (C2C) Transfers of value between individuals

Copyright A Risk Assessment Framework for Mobile Payments Agenda 1.Motivation 2.Scope 3.Lessons from the Past 4.Elements of the Framework 5.Trial Applications

Copyright Categories of Prior Payment Mechanisms Pre-Electronic Money Cheque Money Order Periodic Payment Authority Charge-Card voucher at POS Credit-Card voucher at POS Cr-Card Not Present – Mail (CNP MO) Early Electronic Telegraphic Transfer (TT) Wired transfer Direct Credit Giro Telco Account Cr-Card Not Present – Telephone (CNP TO)

Copyright Payment by Cash

Copyright Payment by Cheque

Copyright Direct Credit Giro, 'TT', Salary Payments

Copyright Credit Cards and Charge- Cards (in 'Meatspace' Transactions)

Copyright The Security Profile of Meatspace Credit-Card Transactions Two-factor Authentication: have a token know (a secret?) Vulnerable to cloning, forgery, card&PIN-capture Relies on: card-holder retention of the card production of the card at POS performance of a signature facsimile or PIN consumer reconciliation of their accounts self-insurance by merchants (banks issue charge-backs)

Copyright The Improved Security Profile of Meatspace Credit-Card Transactions with Contact-Based Chip-Card / EMV Two-factor Authentication: have a token know (a secret?) Vulnerable to cloning, forgery, card&PIN-capture Relies on: card-holder retention of the card production of the card at POS performance of a signature facsimile or PIN consumer reconciliation of their accounts self-insurance by merchants (banks issue charge-backs)

Copyright The (In)Security Profile of Card-Not-Present (CNP/MOTO) Transactions Single-Factor Authentication: have credit card details not have the card no know a secret factor Vulnerable to lying, cloning, forgery, carddetails-capture Relies on: secrecy of credit-card details [??] general levels of honesty consumer reconciliation of their accounts self-insurance by merchants (banks issue charge-backs)

Copyright The Very Slightly Improved (In)Security Profile of Card-Not-Present (CNP/MOTO) Transactions with Contact-Based Chip-Card / EMV Single-Factor Authentication: have credit card details not have the card no know a secret factor Vulnerable to lying, cloning, forgery, carddetails-capture Relies on: secrecy of credit-card details [??] general levels of honesty consumer reconciliation of their accounts self-insurance by merchants (banks issue charge-backs)

Copyright Contactless Chip-Cards as Payment Devices RFID / NFC chip embedded in card Wireless operation, up to 5cm from a terminal Visa Paywave and MasterCard PayPass Up to $100 and $35 resp. (cf. original $25)

Copyright Contactless Chip-Cards as Payment Devices RFID / NFC chip embedded in card Wireless operation, up to 5cm from a terminal Visa Paywave and MasterCard PayPass Up to $100 and $35 resp. (cf. original $25) Presence of chip in card is not human-visible, but Logo / Brand may be visible No choice whether it's activated Operation of chip in card is not human-apparent No action required when within 5cm range, i.e. automatic payment No receipt is the norm Used as Cr-Card: Unauthenticated auto-lending Used as Dr-Card: PIN-less charge to bank account

Copyright The (In)Security Profile of Contactless Chip-Card Payment Transactions Single-Factor Authentication: have the card, within a device's field, when that device is ready to charge money for something Vulnerable to card-capture, rogue devices, rogue transactions by legitimate devices,... Relies on: general levels of honesty among merchants and FIs (consumer reconciliation is infeasible – no vouchers, and either very long statements or no statements) invisibility of fraudulent transactions self-insurance by consumers

Copyright A Risk Assessment Framework for Mobile Payments Agenda 1.Motivation 2.Scope 3.Lessons from the Past 4.Elements of the Framework 5.Trial Applications

Copyright Risk Assessment for I.T.-Based Schemes An established business process Described in Text-Books Peltier 2005, Landoll 2005, Slay & Koronios 2006 Specified (loosely) in Industry Standards - AS/NZS AS/NZS ISO

Copyright Mainstream Security Model Abstract Threats Become Actual Threatening Events, Impinge on Vulnerabilities, Overcome Safeguards & Cause Harm Security is a (desirable) condition in which Harm does not arise because Threats are countered by Safeguards

Copyright The Risk Assessment Framework for Mobile Payments

Copyright The Technical Architecture Indicative Model

Copyright Commercial Architecture Customer/Payer Seller/Payee Payment Handler Delivery Handler Customer Support Internet Online Trading Protocol (IOTP):

Copyright Commercial Architecture Customer/Payer Seller/Payee Payment Handler Delivery Handler Customer Support BUT ALSO... Internet Access Providers (IAPs) Carriage Service Providers (CSPs) Commercial Intermediaries, e.g. Paypal Transaction Service Providers e.g. banks and credit-card companies Payment Services Providers, e.g. deposit-holders, lenders and insurers Regulators and complaints bodies e.g. financial services ombudsmen Consumer Rights representative and advocacy organisations Consumer Segments, e.g. the mobility- disadvantaged, the sight-impaired, people with limited financial assets Internet Online Trading Protocol (IOTP):

Copyright The Transaction Process Aspect From Herzberg (2003), p. 56

Copyright The Harm Aspect Injury to Persons Damage to Property Financial Loss Loss of Value of an Asset Breach of Personal Data Security, or Privacy more generally Inconvenience and Consequential Costs arising from Identity Fraud Serious Inconvenience and Consequential Costs arising from Identity Theft Loss of Reputation and Confidence

Copyright Threat Aspects – Second-Party Situations of Threat: Banks Telcos / Mobile Phone Providers Toll-Road eTag Providers Intermediaries Devices Safeguards: Terms of Contract Risk Allocation Enforceability Consumer Rights

Copyright Threat Aspects – Third-Party, Within the System (Who else can get at you, where, and how?) Points-of-Payment Physical: Observation Coercion Points-of-Payment Electronic: Rogue Devices Rogue Transactions Keystroke Loggers Private Key Reapers Network Electronic Interception Decryption Man-in-the- Middle Attacks Points-of-Processing Rogue Employee Rogue Company Error

Copyright Threat Aspects – Third-Party, Within the Device Physical Intrusion Social Engineering Confidence Tricks Phishing Masquerade Abuse of Privilege Hardware Software Data Electronic Intrusion Interception Cracking / Hacking Bugs Trojans Backdoors Masquerade Distributed Denial of Service (DDOS) Infiltration by Software with a Payload

Copyright Threat Aspects – Third-Party, Within the Device Infiltration by Software with a Payload Software (the Vector) Pre-Installed User-Installed Virus Worm... Payload Trojan: Spyware Performative Communicative Bot / Zombie Spyware: Software Monitor Adware Keystroke Logger...

Copyright The Vulnerability Aspect The Environment Physical Surroundings Organisational Context Social Engineering The Device Hardware, Systems Software Applications Server-Driven Apps (ActiveX, Java, AJAX) The Device's Functions: Known, Unknown, Hidden Software Installation Software Activation Communications Transaction Partners Data Transmission Intrusions Malware Vectors Malware Payloads Hacking, incl. Backdoors, Botnets

Copyright A Risk Assessment Framework for Mobile Payments Agenda 1.Motivation 2.Scope 3.Lessons from the Past 4.Elements of the Framework 5.Trial Applications

Copyright Payments in the Network Era Initially Wired, Increasingly Unwired Secure Models ATMs EFTPOS – Dr Tx Internet Banking Debit Tx over the Internet Insecure Models EFTPOS – Cr Tx Credit Card Tx over the Internet (CNP / MOTO) Highly Insecure Models Contactless-Chip/ RFID / NFC

Copyright Act of Consent – None / Unclear / Clear e.g. Tap the Pad in Response to Display of Fare Notification – None / Audio / Display If 'None', then enables surreptitious payment extraction Receipt / Voucher – None / Option or Online / Y Octopus, Drive-Through eTags for Road-Tolls UK RingGo Parking Payment Scheme Authentication – None / A Non-Secret / For Higher-Value Transactions Only UK RingGo Parking Payment Scheme – last 4 digits PIN for Telstra/NAB/Visa payWave above US$ 25? 100?? Key Safeguards for Chip Payment Schemes

Copyright Act of Consent – None / Unclear / Clear If the card is within 5cm of a device, whether seen or not Notification – None? / Audio / Display If 'None', then enables surreptitious payment extraction Receipt / Voucher – None? / Option / Y Authentication – None / A Non-Secret / For High-Value Transactions Only? Visa PayWave and MCard Paypass

Copyright Key Threat / Vulnerability Combinations Acquisition of Identity Authenticators e.g. Cr-Card Details (card-number as identifier, plus the associated identity authenticators) e.g. Username (identifier) plus Password/PIN/ Passphrase/Private Signing Key (id authenticator) e.g. Biometrics capture and comparison Unauthorised Conduct of Transactions Interference with Legitimate Transactions Use of a Consumer Device as a Tool in a fraud perpetrated on another party

Copyright Key Safeguards Required Two-Sided Device Authentication, i.e. by Payees Chip of Payers Chip by Payers Chip of Payees Chip Notification to Payer of: Fact of Payment (e.g. Audio-Ack) Amount of Payment At least one Authenticator Protection of the Authenticator(s) A Voucher (Physical and/or Electronic) Regular Account Reconciliation by Payers

Copyright Australian Consumers' Security Practices When using the Internet, [do you] use hard to guess passwords which are changed regularly? Always – 18%Never – 58%

Copyright Australian Consumers' Security Practices When using the Internet, [do you] use hard to guess passwords which are changed regularly? Always – 18%Never – 58% [Do you] use, and change regularly, passwords on your main mobile device? Always – 37%Never – 29%

Copyright Australian Consumers' Security Practices When using the Internet, [do you] use hard to guess passwords which are changed regularly? Always – 18%Never – 58% [Do you] use, and change regularly, passwords on your main mobile device? Always – 37%Never – 29% Unisys Security Index (October 2010) Supplementary Questions to their standard push-poll

Copyright

Copyright A Risk Assessment Framework for Mobile Payments Agenda 1.Motivation 2.Scope 3.Lessons from the Past 4.Elements of the Framework 5.Some Inferences

Copyright A Risk Assessment Framework for Mobile Payments Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science at ANU and in Cyberspace Law & Policy at UNSW {.html,.ppt} Bond University – 11 February 2011

Copyright Drill-Down on Security Analysis The ATM Model ATMs Debit-Cards over EFTPOS Internet Banking Debit-Cards over the Internet The Credit-Card Model Credit-Cards over EFTPOS Credit-Cards over the Internet Ready-SET-Dont Go 3D-Secure?

Copyright ATMs 2-factor: have card know the PIN PIN keyed into secure PIN-pad, in a manner which makes it difficult to observe [?] Hash of PIN transmitted and compared So the know part is protected from both physical and electronic observation

Copyright Debit-Cards over EFTPOS Networks Followed ATMs and the ATM Security Model 2-factor: have card know the PIN PIN keyed into secure PIN-pad, in a manner which makes it difficult to observe [?] Hash of PIN transmitted and compared So the know part is protected from both physical and electronic observation

Copyright Internet Banking – Various Implementations 2-factor or 3-factor authentication, e.g. know account details / login-id know PIN various third factors: pre-registered IP-addresses only know One-Time Password (OTP) receive and key OTP sent at the time over another channel (e.g. SMS msg) Authenticator(s) keyed into insecure key-pad, in a manner which makes it difficult to observe So the know part is protected from physical, and partly from electronic, observation

Copyright Debit Transactions over the Internet Customer is at a merchants payment page Customer is re-directed to a specialised version of their own banks online-banking services Customer uses their own banks Internet Banking service to authorise the transaction, including an encrypted channel (SSL/https) Customer is redirected to the merchant Canadas scheme is called Interac Online: This leverages on a well-trusted infrastructure, but requires careful interfacing from merchants

Copyright Credit-Cards over EFTPOS Networks Did *NOT* Follow the ATM Security Model 2-factor: have card reproduce signature pre-recorded on-card No PIN Some improvement through stop-list being automated on-line rather than manual The primary purpose was not security, but the transfer of data-capture costs to merchants

Copyright Credit Card Tx over the Internet Worse Yet – Applied the CNP/MOTO Model The have factor is not have the card but merely have credit card details No second-factor such as know a secret Relies on: an encrypted channel (SSL/https) secrecy of credit-card details [??] general levels of honesty consumers reconciling their accounts self-insurance by merchants (banks issue charge-backs)

Copyright Ready – SET – Dont Go Secure Electronic Transaction Processing for Internet Credit Cards Card-Holder states that he wishes to make a payment Merchant acknowledges Card-Holder provides payment amount, digital certificate Merchant requests an authorisation from the Payment- Processing Organisation (via a Payment Gateway / Acquirer) Existing EFTS networks process the authorisation Merchant receives authorisation Merchant sends capture request (to commit the transaction) Merchant receives confirmation the transaction is accepted Merchant sends Card-Holder confirmation

Copyright Credit-Card Transactions over the Internet 3-D Secure A Visa Initiative, but licensed to others: Verified by Visa MasterCard SecureCode JCB J/Secure For merchants and financial institutions, specifies authentication and processing procedures Requires some form of card-holder authentication, at this stage generally keying of a password/PIN May require EMV-chip and smartcard reader

Copyright Credit-Card Payments in the MCommerce Mobile / Handheld / Unwired Era Inherits weaknesses of MOTO / Internet Less visible payee, no footprint Less visible process, perhaps invisible Less visible transaction data? Notification record / transaction voucher? Any improvement may depend on mobile devices incorporating a smartcard-reader

Copyright Debit-Card Payments in the MCommerce Mobile / Handheld / Wireless Era Less visible payee, no footprint Less visible process, perhaps invisible Less visible transaction data? Notification record / transaction voucher? Vulnerability of Authenticators when processed on mobile devices Transmission of PIN or hash w/- SSL?