INFORMATION SYSTEM : SECURITY MEASURES Nurul Filzah Bt Hussain 4111016391 Muhammad Lokman Nurhakim Bin Hamin 4112037101 Nor Afina Binti Nor Aziz 4112037721.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Chapter 17 Controls and Security Measures
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Electronic Transaction Security (E-Commerce)
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Risks, Controls and Security Measures
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Cryptographic Technologies
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Chapter 20: Network Security Business Data Communications, 4e.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Private key
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Chapter 40 Internet Security.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Computer Communication & Networks
Chapter 17 Risks, Security and Disaster Recovery
E-Commerce Security.
Electronic Payment Security Technologies
Presentation transcript:

INFORMATION SYSTEM : SECURITY MEASURES Nurul Filzah Bt Hussain Muhammad Lokman Nurhakim Bin Hamin Nor Afina Binti Nor Aziz Nurul Farhah Amanina Bt Faizul Anuwar

Organization can protect themselves against such attacks including  Firewalls  Authentication & Encryption  Digital signature  Digital certificates

FIREWALLS AND PROXY SERVERS Firewall are the best defense against unauthorized access to system over the Internet.  Hardware and software that block access to computing resources. Keep unauthorized users out, they are also used to restrict unauthorized software or instructions,  Such as : computer viruses and other rogue software.

Firewall controls communication between trusted network and “untrusted” network. Installed on a server or a router. Network professional :  Check which applications can access the Internet and which servers might be accessed from the organization’s network.

DMZ ( Demilitarized Zone ) The network of computers that are connected to the company’s trusted network (such as an Intranet) at one end and the untrusted network – the public Internet – at the other end. Includes resources to which the organization allows direct access from the Internet.

PROXY SERVER Another server for all information requests from resources inside the trusted network. Can be placed between the Internet and the organization’s trusted network when there is no DMZ. Both organizational network server and proxy server employ firewall. Be installed on the server of the organizational network and the router. Router : Boundary router  Double firewall architecture adds an extra measure of security for an intranet.

Authentication and Encryption Authentication process of ensuring that the person who sends a message to or receives a message from you is indeed that person. Can be accomplished by senders and receivers exchanging codes known only to them. Once authentication is established, keeping a message secret can be accomplished by transforming it into a form that cannot be read by anyone who intercepts it. Coding a message into a form unreadable to an inceptor is called encryption

Public - key Encryption Two types symmetric encryption Asymmetric encryption Symmetric encryption o When both the senders and recipient use the same secret key. o Requires that the recipient have the key before the encrypted text is received. o The key is referred to simply as a secret key or private key.

Asymmetric encryption o comprises two keys; one is public key and the other is private key. o A public key is distributed widely and might be known to everyone. o A private key is secret and known only to the recipient of the message. o The public and private key are related in such a way that only the public key can be used to encrypt message, and only the corresponding private key can be used to decrypt the message. o It is virtually impossible to deduce the private key from the public key. o What differentiates them from one another is the different encryption algorithm each uses.

Transport layer security Transport layer security (TLS) is used for transactions on the web. TLS is part of virtually all current web browsers. TLS uses a combination of public key and symmetric key encryption.

Cont.. TLS works as follows: i.When a visitor connects to an online site, the site’s server sends the visitor’s browser its public key. ii.The visitor’s browser creates a temporary symmetric secret key of 128 bits. The key is transmitted to the site’s server encrypted by using the site’s public key. Now both the visitor’s browser and the site’s server know the same secret key and can only use it for encryption. iii.The visitor can now safely transmit confidential information.

Digital Signatures A way to authenticate online messages, analogous to a physical signature on a piece of paper, but implemented with public-key cryptography. Two phases are involved in creating a digital signature:-  The encryption software uses a hashing algorithm (a mathematical formula) to create a message digest from the file you wish to transmit.  Then, the software uses your private key to encrypt the message digest. *A Message digest is akin to the unique fingerprint of a file.

Digital Certificates to authenticate a digital signature both buyer and sellers must use digital certificatios (also knows as digital IDs) Are Computer files that serve as the equivalent of ID cards by associating one’s identity with one’s pubic key. An issue of digital certificates is called a certificate authority (CA). A CA certifies the identity of anyone who requires about a party communicating on the internet. A CA issues the public and private keys associated with a certificates.

Digital Certificates Contains its holder’s name, a serial number, expiration date, a copy of the certificate holder’s public key and the digital signature of the certificate authority. Digital signature are equivalent of tamper-proof photo identification cards. Public keys encryption technique taht verify the identityes of the buyer and seller in electronic transactions and present document from being altered after the transaction is complete.

The Downside of Security Measures Security Measure – Passwords, encryption applications and firewalls – They slow down data communication and – Require user discipline, which is not always easy to maintain Passwords – Many employees tend to forget their passwords especially if they must replaced them once or three a month – In some companies, the employees have to remember a different password for every system they use. – There might be four or five different system, each with its own access control

Single Sign-on (SSO) A simpler solution User are required to identify themselves only once before accessing several different system. However, SSO require special software that interacts with all the system in an organization And must be linked through the network

SSO as an effective way CIOs often said it as an effective way to decrease the amount of work their subordinates must do There is a case at Philadelphia Gas Works (PGW), a utility company with a staff of 1700 serving over half of million customers The IT staff receives 20k calls per year, half of which is related to forgotten passwords Since SSO was implemented, the number of calls decreased to about 50% per year

Encryption Its slows down communication because the software must encrypt and decrypt every message When you use a secure website, much of information you view on screen is encrypted by the software installed on the site’s server Then decrypted by your browser

All this activity takes time, and the delay only exacerbates the Internet’s low download speed Firewalls have the same slowing effects, screening every download takes time which affects anyone trying access information IT specialists must explain to managers the implications of applying security measures, especially on systems connected to the Internet and determine which resource should be accessed only with passwords and require screening methods

Specialist must tell employees what impact a new security measures on their daily work and if there is any problems, the specialists must convince them that the inconvenience is the price for protecting data And continue to work on methods that minimize inconvenience and delay

Virtual Private Network (VPN) Enable employees to access ISs using special security software This approach allows employees to access an intranet only from computers equipped with the proper VPN software and only if they remember passwords

End Thank you.