1 E-Commerce Security Part II – Security Techniques.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Threats and Protection Mechanisms
Implementing Electronic Commerce Security Gary Schneider, 2003
Cryptography and Network Security
5/4/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of Pennsylvania.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Implementing Electronic Commerce Security
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Chapter 10: Electronic Commerce Security
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Implementing Security for Electronic Commerce
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Implementing Security for Electronic Commerce
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 10: Electronic Commerce Security
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Security Threats to Electronic Commerce
12/15/00EMTM 5531 EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of.
E-Commerce: The Second Wave Fifth Annual Edition
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Web Server Administration Chapter 10 Securing the Web Environment.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Information Systems Design and Development Security Precautions Computing Science.
Implementing Security for Electronic Commerce
12 E-Commerce Overview.
Electronic Payment Security Technologies
Presentation transcript:

1 E-Commerce Security Part II – Security Techniques

2 Objectives Specific security objectives for protecting –Web business assets and customer privacy –client computers from security threats –information as it travels through the Internet communication channel –the security of Web server computers Organizations that promote computer, network, and Internet security

3 Security in Computer IS Customers engaging in electronic commerce need to feel confident that their transactions are secure from prying eyes and safe from alteration. The security policy must be regularly revised as threat conditions change. A security policy must protect a system’s privacy, integrity, and availability and authenticate users.

4 Protecting Electronic Commerce Assets

5 Protecting Privacy Cookies contain private information that can include credit card data, passwords, and login information. The best way to protect your privacy is to disable cookies entirely.

6

7 Protecting Client Computers Client computers must be protected from threats. Active content can be one of the most serious threats to client computers.

8 Monitoring Active Content Netscape Navigator and Microsoft Internet Explorer browsers are equipped to recognize when they are about to download Web page containing active content. When a user downloads Web pages and runs programs that are embedded in them, it gives the user a chance to confirm that the programs are from a known and trusted source.

9 Microsoft Internet Explorer

10 Digital Certificates A digital certificate verifies that a user or Web site is who it claims to be. The digital certificate contains a means for sending an encrypted message to the entity that sent the original Web page or message. A Web site’s digital certificate is a shopper’s assurance that the Web site is the real store.

11 Digital Certificates

12 Using Antivirus Software Antivirus software is a defense strategy. One of the most likely places to find a virus is in an electronic mail attachment. Some Web systems let users scan attachments using antivirus software before downloading .

13 Communication Channel Security Integrity violations can occur whenever a message is altered while in transit between the sender and receiver. Ensuring transaction integrity, two separate algorithms are applied to a message: Hash function Digital signature

14 Hash Functions A hash function creates a fixed length number – often 128 bits (16 characters) long – that summarizes the message content. Hash algorithms are one-way functions. A hash algorithm has these characteristics: It uses no secret key. The message digest cannot be inverted to produce the original information. The algorithm and information about how it works are publicly available.

15 Digital Signature A message’s computed number is called a message digest. An encrypted message digest is called a digital signature. A purchase order accompanied by the digital signature provides the merchant positive identification of the sender and assures the merchant that the message was not altered. Used together, public-key encryption, message digests, and digital signatures provide quality security for Internet transactions.

16 Digital Signatures

17 Encryption Encryption is the coding of information by a mathematically based program and a secret key to produce a string of characters that is unintelligible. The science that studies the encryption is called cryptography (krupto and grafh) The program that transforms text into cipher text is called an encryption program. Upon arrival, each message is decrypted using a decryption program.

18 Three Types of Encryption “Hash coding” is a process that uses a hash algorithm to calculate a hash value from a message. “Asymmetric encryption,” or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key. “Symmetric encryption,” or private-key encryption, encodes a message using a single numeric key to encode and decode data.

19 Encryption Methods

20 Encryption: Symmetric Makiko Takao Message Public Keys Makiko 29 Takao 17 Message Encrypted Private Key 13 Private Key 37 Use Takao’s Public key Use Takao’s Private key Makiko sends message to Takao that only he can read.

21 Asymmetric: Authentication Makiko Takao Public Keys Makiko 29 Takao 17 Private Key 13 Private Key 37 Use Takao’s Public key Use Takao’s Private key Takao sends message to Makiko: His key guarantees it came from him. Her key prevents anyone else from reading message. Message Encrypt+T Encrypt+T+M Encrypt+M Use Makiko’s Public key Use Makiko’s Private key Transmission

22 Encryption Standards The Data Encryption Standard (DES) is an encryption standard adopted by the U.S. government. DES is the most widely used private-key encryption system. Triple Data Encryption Standard (3DES) is a more robust version of DES. The U.S. government’s National Institute of Standards and Technology (NIST) has developed a new encryption standard.

23 Encryption Algorithms and Standards

24 Secure Sockets Layer (SSL) Protocol The SSL system from Netscape is a system that provides secure information transfer through the Internet. The SSL encrypts and decrypts information flowing between the two computers. All communication between SSL-enabled clients and servers is encoded.

25 Secure Sockets Layer (SSL) Protocol The protocol that implements SSL is HTTPS. A session key is a key used by an encryption algorithm during a single secure session. The longer the session key, the more resistant the encryption is to attack. The algorithm may be DES, Triple DES, or the RAS encryption algorithm.

26 Secure HTTP (S-HTTP) Protocol The headers define the type of security techniques, including: The use of private-key encryption Server authentication Client authentication Message integrity A secure envelope encapsulates a message and provides secrecy, integrity, and client/server authentication.

27 Protecting the Web Server Security solutions for commerce servers: Access control and authentication Operating system controls Firewall

28 Access Control & Authentication Access control and authentication refers to controlling who and what has access to the commerce server. Authentication is performed using digital certificates. Web servers often provide access control list security to restrict file access to selected users.

29 Access Control & Authentication The server can authenticate a user in several ways: First, the certificate represents the user’s admittance voucher. Second, the sever checks the timestamp on the certificate to ensure that the certificate has not expired. Third, a server can use a callback system to check the user’s client computer address and name. An access control list (ACL) is a list or database of people who can access the files and resources.

30 Access Control and Authentication

31 Dial Back Modem phone company phone company Jones 1111 Smith 2222 Olsen 3333 Araha ) User calls computer. 2) Modem answers. 3) User enters name and password. 4) Modem hangs up. 5) Modem dials phone number in database. 6) User machine answers. 7) User gets access. If hacker somehow gets name and password. Company modem will hang up and call back number in database, preventing hacker from accessing the computer.

32 Operating System Controls Most operating systems have a username and password as well as a user authentication system in place. Access control lists and username/password protections are probably the best known of the UNIX security features.

33 User Identification Passwords –Dial up service found 30% of people used same word –People choose obvious words Hints –Don’t use real words, personal names –Include non-alphabetic –Change often –Use at least 6 characters

34 Alternatives: Biometrics –Finger/hand print –Voice recognition –Retina/blood vessels –Thermal Biometrics Comments –Don’t have to remember –Reasonably accurate –Price is dropping –Nothing is perfect

35 Biometrics: Thermal Several methods exist to identify a person based on biological characteristics. Common techniques include fingerprint, handprint readers, and retinal scanners. More exotic devices include body shape sensors and this thermal facial reader which uses infrared imaging to identify the user.

36 Firewalls A firewall is a computer and software combination that is installed at the entry point of a networked system. The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat. Acting as a filter, firewalls permit selected messages to flow into and out of the protected network.

37 Types of Firewalls Packet-filter firewalls examine all the data flowing back and forth between the trusted network. Gateway servers are firewalls that filter traffic based on the application they request. Proxy severs are firewalls that communicate with the Internet on the private network’s behalf.

38 Computer Forensics and Ethical Hacking A small group of firms whose job is to break into client computers. Computer forensics experts are hired to probe PCs. The field of computer forensics is for the collection, preservation, and analysis of computer-related evidence.

39 Computer Security Resources CERT SANS Institute Internet Storm Center Center for Internet Security Microsoft Research Security U.S. Dept. of Justice Cybercrime National Infrastructure Protection Center