An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
CP3397 ECommerce.
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
SSL AND E- COMMERCE S ECURITY gz2155 Guangwei Zhang.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 1 November 2004.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
E-Commerce: Technology and Business Development Andy Diaz Sofia Mayor Chris Ratigan.
E-Commerce Security Brett Hinshaw Kevin Hooker Jeff Hunter Shane Worrell.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Chapter 19 Security.
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Internet Security for Small & Medium Business Week 6
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
An Investigation into E-Banking Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 20 March 2004.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Lecture 5. Security Threats
Chapter 5 Electronic Commerce | Security
BY GAWARE S.R. DEPT.OF COMP.SCI
Chapter 5 Electronic Commerce | Security
Electronic Payment Security Technologies
Module 4 System and Application Security
Presentation transcript:

An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004

About me Joint Computer Science and Information Systems Honours. Interest in computer security and its implications in e-commerce.

Definition of project in one sentence An investigation into e-commerce frauds, and how they are best avoided by internet merchants.

The Problem and Background

What is E-commerce ? “E-commerce focuses on the electronic exchange of information using information and telecommunications infrastructures to perform a wide range of commercial activities that can be divided into business-to- consumer and business-to-business sectors” - Hutchinson and Warren [2003] Project focuses on business-to-consumer

Importance of E-Commerce Electronic commerce is a “strategic imperative for most competitive organisations today as it is a key to finding new sources of revenue, expanding into new markets, reducing costs, and creating breakaway business strategies” - VeriSign [2004]

E-Commerce statistics - Burrows [2004] General increase in the use of e-commerce around the world. The number of online banking accounts in South Africa grew by 28% to 1.04 million in the last year. These figures are expected to increase to 30% in percent of Americans used online banking services by the end of 2002 and this figure will continue to grow by 14 percent up to the end of US Online Retail revenue is projected to increase from $ 47.8 Billion in 2002 to billion in 2005

Fraud statistics Fraud complaints rose by around two-thirds in the US according to the Federal Trade Commission (FTC) from 2001 to Identity theft accounting for 43% of complaints. The cost of fraud in 2002 more than doubled that in 2001.

Fraud statistics (Continued)

Result of combination of statistics “Hacker cleans out bank accounts.” “Hundreds of thousands of rands stolen via Internet from Absa clients.” – Who covers the costs? Irreversible damage to Absa’s image. “New security fears for web banking” “Major online credit card theft exposed”

Threats Vandalism and sabotage – defacing web site Denial of service – flooding of service Breach of privacy or confidentiality – disclosure of personal info Theft and fraud – theft and use of credit card number Violations of data integrity – changing of an orders delivery address Repudiation – denying a transaction took place

Securing E-Commerce 3 Fronts 1.Merchant - System offering service - Web server and OS - Firewalls, encrypted data stores 2. Transport - Channel between the client and merchant - Protocols (SSL, SET) 3.Client - System accessing the service - Difficult to secure and control

Data Transport Security Four basic security requirements of e- commerce transactions : 1. Authentication – proof of identity 2. Confidentiality – keeping data “secret” 3. Data integrity – Ensuring data doesn’t change while transported by unauthorised entity 4. Non-repudiation - prevents a denial of actions by a person or entity

Security Mechanisms User IDs and passwords – Concerned with authentication – Insecure : poor passwords, password written down, shared – Increase security by using in conjunction with tokens and biometrics

Public Key Infrastructure (PKI), Digital Certificates and Digital signatures Confidentiality through encryption Virtual Keys used to encrypt/decrypt data Symmetrical – 1 private key to encrypt and decrypt, key is shared (less secure) Asymmetrical – private and public key which are inversely related

Public Key Infrastructure (PKI), Digital Certificates and Digital signatures Data integrity and non repudiation through digital signatures Digital Certificates provide authentication Used by other protocols

Secure Socket Layer (SSL) Provides confidentiality, authentication, and data integrity through the use of PKI. Resides above the transport layer and below the application layer at the socket layer in the protocol stack. Most prominent e-commerce protocol

SSL (Cont) Does not provide non-repudiation or facilitate transferring of payments. Leaves payment details up to merchant. Credit Card details can be read by the merchant and may be vulnerable to theft if the data store is not encrypted.

Scenario 1 Insecure Merchant Secure cc no over SSL

Scenario 1 (Cont) Insecure Merchant

Scenario 2 Illegitimate Merchant SSL Channel

Payment Protocols Merchant has no need to read credit card details Guarantee the merchant receives payment Keeps credit card details confidential Eliminates storage of credit card details on merchants system

Scenario 3 Payment protocol Payment Protocol Payment Protocol

Secure Electronic Transactions (SET) Technical standard for secure payments focusing on credit cards Developed by MasterCard and VISA. Failed to be adopted. Why? – Merchants are liable for chargebacks, therefore banks resist liability. – Banks generate revenue from chargebacks. – Banks make money selling anti fraud software – Timing – Merchants only worried about market share not losses – Certificate management was cumbersome

Where to from here ? Investigate case studies of e-commerce security breaches eg: CD Universe Investigate, critically analyse and compare emerging protocols and techniques that could help secure e-commerce eg: Secure Payment Application (SPA) by Mastercard and Verified by VISA

The expected result Evaluation of some of the current security protocols and procedures used in e- commerce. Exposure of security flaws in some of the major e-commercial systems. Establish possible countermeasures to attacks and threats from e-commerce security frauds.

Questions