Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon.

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

CS5038 The Electronic Society
FIREWALLS Chapter 11.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
Security+ Guide to Network Security Fundamentals
Chapter 5 Security and Encryption
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Prentice Hall, Chapter 13 E-Commerce Security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 11 E-Commerce Security. Electronic CommercePrentice Hall © Learning Objectives 1.Document the trends in computer and network security attacks.
Web server security Dr Jim Briggs WEBP security1.
E-Commerce Security and Fraud Issues and Protections
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Securing Information Systems
Chapter 10 E-Commerce Security.
Intranet, Extranet, Firewall. Intranet and Extranet.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Internet Security for Small & Medium Business Week 6
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
E-Commerce Security.
C8- Securing Information Systems
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Information Security in Distributed Systems Distributed Systems1.
Chap1: Is there a Security Problem in Computing?.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
E-COMMERCE SECURITY ELECTRONIC COMMERCE. E-Commerce Security Successful e-tailing requires addressing online security and privacy fears of your online.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Securing Information Systems
Pertemuan 20 Materi : Buku Wajib & Sumber Materi :
Network Security (the Internet Security)
Chapter 13 E-Commerce Security Prentice Hall, 2002.
Securing Information Systems
Security in Networking
INFORMATION SYSTEMS SECURITY and CONTROL
Security.
Presentation transcript:

Prentice Hall, E-Commerce Security Notes based on Laudon&Laudon.

Prentice Hall, Learning Objectives Document the rapid rise in computer and network security attacks Understand the factors contributing to the rise in EC security breaches Explain the basic types of network security attacks

Prentice Hall, Learning Objectives (cont.) Discuss the major steps in developing a security risk management system Describe the major types of attacks against EC systems Discuss some of the major technologies for securing EC

Prentice Hall, Bringing Down an EC Site: Mere Child’s Play Distributed Denial of Service (DDoS) attacks can inundate a site with so many requests that legitimate traffic is virtually halted Attacker used software to send a flood of data packets to the target computer(s) with the aim of overloading its resources

Prentice Hall, Figure 13-1 Using Zombies in a Distributed Denial of Service Attack Source: Scambray et al. (2000)

Prentice Hall, Bringing Down an EC Site: Mere Child’s Play (cont.) Distributed Denial of Service (DDoS) attacks Zombie—machine on which the DDoS software is loaded, unknown to the owner Home computers with cable modems or DSL service that are left on all the time Business Web servers located outside the firewall Availability of free tools and scripts make it easy to mount a DDOS attack

Prentice Hall, Figure 13-2 Attack Sophistication vs. Intruder Technical Knowledge Source: Special permission to reproduce the CERT ©/CC graphic © 2000 by Carnegie Melon University, in Electronic Commerce 2002 in Allen et al. (2000).

Prentice Hall, The Need for Security Data from Computer Security Institute and FBI indicate: Cyber attacks are on the increase Internet connections are increasingly a point of attack The variety of attacks is on the rise The reporting of serious crimes to law enforcement has declined

Prentice Hall, Table 13-2 Incidents and Vulnerabilities Reported to CERT Figures from Computer Emergency Response Team (CERT)

Prentice Hall, Why Now? Security systems are only as strong as their weakest points Security and ease of use (or implementation) are antithetical to one another Security takes a back seat to market pressures

Prentice Hall, Why Now? (cont.) Security of an EC site depends on the security of the Internet as a whole Security vulnerabilities are increasing faster than they can be combated Security compromised by common applications

Prentice Hall, Basic Security Issues User’s perspective Is Web server owned and operated by legitimate company? Web page and form contain some malicious code content? Will Web server distribute the user’s information to another party? Company’s perspective Will the user attempt to break into the Web server or alter the site? Will the user try to disrupt the server so it isn’t available to others? Issues at a simple marketing site:

Prentice Hall, Basic Security Issues (cont.) Issues at a simple marketing site: User and company perspective Is network connection free from eavesdropping? Has information sent back and forth between server and browser been altered?

Prentice Hall, Basic Security Issues (cont.) Major security issues in EC Authentication Authorization Auditing Confidentiality or privacy Integrity Availability Non-repudiation

Prentice Hall, Security Risk Management Required to determine security needs 4 phases of risk management Assessment Planning Implementation Monitoring Definitions involved in risk management Assets—anything of value worth securing Threat—eventuality representing danger to an asset Vulnerability— weakness in a safeguard

Prentice Hall, Security Risk Management (cont.) Assessment phase—evaluation of assets, threats, vulnerabilities Determine organizational objectives Inventory assets Delineate threats Identify vulnerabilities Quantify the value of each risk

Prentice Hall, Table 13-3 Security Risks for EC & Other Internet Sites

Prentice Hall, Security Risk Management (cont.) Planning phase of risk management— arrive at a set of security policies Define specific policies Establish processes for audit and review Establish an incident response team and contingency plan

Prentice Hall, Security Risk Management (cont.) Implementation phase of risk management—choose particular technologies to deal with high priority threats Monitoring phase of risk management— ongoing processes used to determine which measures are successful, unsuccessful and need modification

Prentice Hall, Types of Threats and Attacks Nontechnical vs. technical attacks Steps in a hacker’s attack Discover key elements of network Scan for vulnerabilities Hack in and gain administrator privileges Disable auditing & traces from log files Steal files, modify data, steal source code, etc. Install back doors, etc to permit undetectable reentry Return at will to do more damage

Prentice Hall, Types of Threats and Attacks (cont.) The players Hackers Crackers Script kiddies Systems and software bugs and misconfigurations

Prentice Hall, Types of Threats and Attacks (cont.) IP fragmentation (teardrop, bonk, boink, nestea, and others) DNS spoofing Ping of death Smurf attack SYNFlood Buffer overflows Denial-of-service (DoS) attacks

Prentice Hall, Types of Threats and Attacks (cont.) Input validation attacks Intercepted transmissions Malicious code Viruses Worms Macro viruses and macro worms Trojan horses Malicious mobile code

Prentice Hall, Security Technologies Tools Available to Achieve Site Security Encryption Network Security Protocols Virtual Private Networks and Tunneling Firewalls and Proxy Systems Host security tools Policies and Management: Access control, authentication, monitoring and intrusion detection.

Prentice Hall, Figure 14-2 Private Key Encryption

Prentice Hall, Public Key Encryption Size of key RSA algorithm Speed of Key Rijndael algorithm

Prentice Hall, Digital Signatures: authenticity and nondenial Analogous to handwritten signature Based on public keys Used to: Authenticate the identity of the sender of a message or document Ensure the original content of the electronic message or document is unchanged Security for E-Payments (cont.)

Prentice Hall, Security for E-Payments (cont.) Digital Signatures: authenticity and nondenial (cont.) Benefits : Portable Cannot be easily repudiated or imitated Can be time stamped

Prentice Hall, Figure 14-4 Digital Signatures

Prentice Hall, Security for E-Payments (cont.) Digital certificates Identifying the holder of a public key (Key-Exchange) Issued by a trusted certificate authority (CA) Name : “Richard” key-Exchange Key : Signature Key : Serial # : Other Data : Expires : 6/18/04 Signed : CA’s Signature

Prentice Hall, Security for E-Payments (cont.) Secure socket layer/transport layer security Secure socket layer (SLL)—handle on Web browser, utilizing CAs and data encryption Encryption Digital certificates Digital signatures In 1996 SSL was standardized and named transport layer security (TSL) Operates at TCP/IP layer (base layer for Internet) IPSec—secure version of IP protocol

Prentice Hall, SSL Secure Socket Layer (SSL) SSL protocol may use a certificate, but there is no payment gateway. Merchants need to receive ordering information and credit card information (capturing process initiated by merchants)

Prentice Hall, Security Technologies Firewalls and access control Firewall—network node that isolates private network from public network Packet-filtering routers Application-level proxies Screened host firewall

Prentice Hall, Figure 13-6 Application-Level Proxy (Bastion Gateway Host)

Prentice Hall, Figure 13-7 Screened Host Firewall

Prentice Hall, Figure 13-8 Screened Subnet Firewall (with DMZ)

Prentice Hall, Security Technologies (cont.) Virtual private networks (VPNs)—use public Internet to carry information but remains private Encryption—scramble communications Authentication—ensure information remains untampered with and comes from legitimate source Access control—verify identity of anyone using network

Prentice Hall, Security Technologies (cont.) Protocol tunneling—ensure confidentiality and integrity of data transmitted Point-to-point tunneling (PTP) Layer 2 tunneling protocol (L2PT) Intrusion Detection Systems (IDS)

Prentice Hall, Managerial Issues Recognize the business consequences of poor security Security through obscurity doesn't work It’s the business that counts, not the technology Security is an on-going, closed-loop process Even for EC sites, internal breaches are more prevalent than external breaches