Threats and Protection Mechanisms

Slides:



Advertisements
Similar presentations
Implementing Electronic Commerce Security Gary Schneider, 2003
Advertisements

Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Security Threats to Electronic Commerce
Chapter 5 Security Threats to Electronic Commerce
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Implementing Electronic Commerce Security
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Chapter 10: Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Implementing Security for Electronic Commerce
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Implementing Security for Electronic Commerce
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Chapter 10: Electronic Commerce Security
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Security Threats to Electronic Commerce
E-Commerce: The Second Wave Fifth Annual Edition
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.
Chapter 5 Security Threats to Electronic Commerce
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 E-Commerce Security Part II – Security Techniques.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Chapter 7: E-Commerce Security and Payment system
Information Security What is Information Security?
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chap1: Is there a Security Problem in Computing?.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
Understand Internet Security LESSON Security Fundamentals.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Information Systems Design and Development Security Precautions Computing Science.
Chapter 10: Electronic Commerce Security
Security on the Internet and the Web
Chapter 40 Internet Security.
Implementing Security for Electronic Commerce
Chapter 17 Risks, Security and Disaster Recovery
Security.
Operating System Concepts
Electronic Payment Security Technologies
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Threats and Protection Mechanisms Security Threats and Protection Mechanisms

Learning Objectives Internet security issues (intellectual property rights, client, communication channels, servers) Specific security objectives for protecting Web business assets and customer privacy How to protect: clients, data in transit, server computers. Organizations that promote computer, network, and Internet security

Security Overview Computer security is the protection of assets from unauthorized access, use, alteration, or destruction Two types of security: Physical security Logical security Vocabulary: Any act or object that poses a danger to computer assets is known as a threat Countermeasure is a procedure that recognizes, reduces, or eliminates a threat An eavesdropper is a person or device that can listen in on and copy Internet transmissions

Aspects of Security Three computer security categories: Secrecy Integrity Availability Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source Integrity refers to preventing unauthorized data modification Necessity refers to preventing data delays or denials

Risk Management The risk management model shows four general actions to take according to the severity of a threat

Security Policy A security policy is a written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not The first step an organization must take in creating a security policy is to determine what assets to protect and from whom Specific elements of a security policy address the following points: Authentication and access control Secrecy and data integrity Audit Procedures

Security elements in e-commerce There are three elements in e-commerce transactions Client Communication channel Server Each element must be protected Each element has its own requirements and special characteristics

Threats to the Client Active web content, i.e. non-static pages which contain instructions which execute in the client (for example: ActiveX, Java Applets, JavaScript, other plug-ins) Systems software bugs (e.g. Microsoft RPC bugs have allowed the proliferation of the Blaster worm) Software application bugs (e.g. Microsoft Outlook bugs can be exploited by viruses) Result: Unauthorized access or control of the client

ActiveX Controls ActiveX is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks ActiveX controls run only on computers running Windows and only on browsers that support them Because ActiveX controls have full access to client computers they can cause secrecy, integrity, or necessity violations

Java Applets Java adds functionality to business applications and can handle transactions and a wide variety of actions on the client computer The Java sandbox confines Java applet actions to a set of rules defined by the security model These rules apply to all untrusted Java applets Bugs in the Java VM can cause security compromises

JavaScript JavaScript is a scripting language that enables Web page designers to build active content Errors in JavaScript implementations can invoke privacy and integrity attacks JavaScript programs do not operate under the restrictions of the Java sandbox security model

Other Active Content Plug-ins are programs that interpret or execute instructions embedded in downloaded graphics, sounds, and other objects Popular plug-ins include Macromedia Flash, Microsoft Media Player and Apple Quicktime. Active content, including all forms, enables Web pages to take action Plug-ins perform their duties by executing commands buried within the media they are manipulating Although active content gives life to static Web pages it also introduces unique challenges for protecting the client

Viruses A virus is software that attaches itself to another file and can executes when host program is activated thus bypassing normal authorization controls E.g. a MS Word macro virus is coded as a small program and is embedded in a Word document Viruses can take any number of actions e.g. email everyone in the address book or make phone calls Viruses often use application software bugs

Client compromises Clients can be compromised by exploiting system software bugs to take over computers A Trojan horse is a program hidden inside another program or Web page that masks its true purpose A worm is a program that has the instructions to look for and capture other computers on the net after infecting one A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers

Threats to the Communication Channel The Internet is the medium over which e-commerce data is transferred Messages on the Internet travel a random path from a source node to a destination node The content of messages is not protected and anyone on the message path can record its contents If communication is sensitive additional measures must be taken to protect the data This is a core requirement for e-commerce

Specific Threats Secrecy Integrity Availability Capture user identity preferences or record their activities Capture transaction details Capture payment information Integrity modify transactions modify user credential (e.g. delivery address) Availability make shop unavailable to customers

Threats to the Server Servers have software vulnerabilities that can be exploited to cause destruction or to acquire information illegally E.g. databases connected to the Web contain information that could damage a company if it were disclosed or altered Physical security and access control is also very important

Threats to Intellectual Property Intellectual property is the ownership of ideas and control over the tangible or virtual representation of those ideas IP includes: Names, for example trademarks and domain names (Cybersquatting, name changing, name stealing) Digital intellectual property, including art, logos, and music posted on Web sites, is protected by laws

Computer Security Resources CERT SANS Institute Internet Storm Center Center for Internet Security U.S. Dept. of Justice Cybercrime National Infrastructure Protection Center

Protecting Electronic Commerce Assets

Monitoring Active Content Most browsers are equipped to recognize when they are about to download Web page containing active content Users can configure the user of active content by their browser For example, configure Java VM using the Java security console

Microsoft Internet Explorer

Microsoft Internet Explorer

Netscape Navigator

Netscape Navigator

Antivirus Software Antivirus software is a defense strategy Antivirus software matches the contents of a file under examination against a database of virus “signatures” Thus, antivirus software cannot protect against viruses that have not been discovered earlier and recorded in the database One of the most likely places to find a virus is in an electronic mail attachment Some Web e-mail systems let users scan attachments using antivirus software before downloading e-mail

Protecting e-commerce communications Providing e-commerce channel security means: Providing channel secrecy Guaranteeing message integrity Ensuring channel availability A complete security plan includes authentication Businesses must prevent eavesdroppers from reading the Internet messages that they intercept Best available way to do this is via encryption

Encryption Encryption is a mathematical technique which encodes information using a key to transform the original information into a string of characters that is unintelligible The program that transforms text into cipher text is called an encryption program At the other end of the communication channel each message is decrypted using the same or a related key by a decryption program

Types of Encryption Asymmetric encryption or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key Symmetric encryption or private-key encryption, encodes a message using a single numeric key to encode and decode data

Hash Functions Hash algorithms are one-way functions. A hash algorithm has these characteristics: It uses no secret key The message digest it produces cannot be inverted to produce the original information The algorithm and information about how it works are publicly available Hash collisions are nearly impossible. MD5 is an example of a hash algorithm

Encryption Methods

Encryption Algorithms and Standards

Secure Sockets Layer (SSL)

Digital Certificates A digital certificate verifies that a user or Web site is who it claims to be The digital certificate contains a means for sending an encrypted message to the entity A Web site’s digital certificate is a shopper’s assurance that the Web site is the real store Proof of validity and management of digital certificates is provided by the certification authority

Digital Certificates in IE

Ensuring Transaction Integrity Integrity violations can occur whenever a message is altered while in transit between the sender and receiver Ensuring transaction integrity, two separate algorithms are applied to a message: Hash function Digital signature

Digital Signature An encrypted message digest is called a digital signature A purchase order accompanied by the digital signature provides the merchant positive identification of the sender and assures the merchant that the message was not altered Used together, public-key encryption, message digests, and digital signatures provide quality security for Internet transactions

Transaction Delivery A denial or delay of service attack removes or absorbs resources One way to deny service is to flood the server with a large number of packets To prevent such attacks, a robust network architecture should be in place and network countermeasures should be in place

Protecting the Web Server The e-commerce server which incorporates a Web server, responds to requests from Web browsers through the HTTP protocol and CGI scripts Security measures for commerce servers: Access control and authentication Operating system controls Firewall

Access Control and Authentication Access control and authentication refers to controlling who and what has access to the e-commerce server Operating systems often provide access control list security to restrict file access to selected users Users identify themselves using either a password or a token An access control list (ACL) is a list or database of people who can access the files and resources

Firewalls A firewall is a system that is installed at the entry point of a network The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat Acting as a filter, firewalls permit selected messages to flow into and out of the protected network

Types of Firewalls Packet-filter firewalls examine all the data flowing back and forth between the trusted network Application layer firewalls filter traffic based on the application they request Proxy severs are firewalls that communicate with the Internet on the private network’s behalf

IP Protection A watermark is data imperceptibly added to the original digital asset in order to convey hidden copyright data A watermark can be used to verify the lawful use of the asset It should not reduce the quality of the digital asset Still in its infancy as a market Other techniques (less powerful) are based on mechanisms built-in the hardware or the software Examples include DVD and MS Media Player but more often than not can be bypassed