SECURITY IN E-COMMERCE Sheetal Chhabra. Introduction Contents Threats Threats to information security Acts of Human Error or failure Espionage/Trespass.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 5 Security and Encryption
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Threats and Attacks Principles of Information Security, 2nd Edition
Chapter 19 Security.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Supporting Technologies III: Security 11/16 Lecture Notes.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10 E-Commerce Security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Dimensions of E – Commerce Security
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Types of Electronic Infection
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Chap1: Is there a Security Problem in Computing?.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security Celia Li Computer Science and Engineering York University.
The Need for Information Security(1) Lecture 2. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Securing Information Systems
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Chapter 5 Electronic Commerce | Security
Chapter 5 Electronic Commerce | Security
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

SECURITY IN E-COMMERCE Sheetal Chhabra

Introduction Contents Threats Threats to information security Acts of Human Error or failure Espionage/Trespass Network Security Goals Some key factors for success in E-commerce The EC Security Environment: The Scope of the Problem Dimensions of E-commerce Security Security Threats in the E-commerce Environment

threats  A threat is an object, person, or other entity that represents a constant danger to an asset.  Management must be informed of the various kinds of threats facing the organization.  By examining each threat category, management effectively protects information through policy, education, training, and technology controls

Threats to information security  A threat is an object, person, or other entity that represents a constant danger to an assest.  Management must be informed of the various kinds of thrats facing the organization.

Acts of Human Error or failure  Include acts done with no malicious intent.  Caused by:  Inexperience  Improper training  Incorrect assumption  Other circumstances  Employees are greatest threats to information security- they are closest to organization data.  Employee mistakes can easily lead to the following:  Revealing classified data  Entry of erroneous data  Accidental deletion or modification of data  Storage of data in unprotected areas  Failure to protect information  Many of threats can be prevented with controls.

 Broad category of activities that break confidentiality  Unauthorized accessing of information  Competitive intelligence  Shoulder surfing can occur any place a person is accessing confidential information  Controls implemented to mark the boundaries of an organization’s virtual territory giving notice to trespassers that they are encroaching on the organization’s cyberspace  Hackers uses skill, guile, or fraud to steal the property of someone else

Network Security Goals  Confidentiality : only sender, intended receiver should understand message contents - sender encrypts the message - Receiver decrypts the message - Privacy  Integrity: sender and receiver want to make sure that the message are not altered without detection  Availability : service must be available to user ( instead of “Non-repudiation” in security service)  Authentication : sender and receiver want to confirm the identify of each other  access control: service must be accessible to users

 Providing value to customers  Providing service and performance  Look  Advertising  Personal attention  Providing a sense of community  Providing reliability and security  Providing a 360-degree view of the customer relationship Some key factors for success in E-commerce

The EC Security Environment: The Scope of the Problem  In 2002 Computer Security Institute survey of 503 security personnel in U.S. corporations and government  80% of respondents had detected breakes of computer security within last 12 months and suffered financial loss as a result  Only 44% were willing or able to quantify loss, which totaled $456 million in aggregate  40% experienced denial of service attacks  40% reported attacks from outside the organization  85% detected virus attacks

Dimensions of Security  Integrity: ability to ensure that information being displayed on a Web site or transmitted/received over the Internet has not been altered in any way by an unauthorized party  Non-repudiation: ability to ensure that e-commerce participants do not deny (repudiate) online actions  Authenticity: ability to identify the identity of a person or entity with whom you are dealing on the Internet  Confidentiality: ability to ensure that messages and data are available only to those authorized to view them  Privacy: ability to control use of information a customer provides about himself or herself to merchant  Availability: ability to ensure that an e-commerce site continues to function as intended

Dimensions of E-commerce Security

Security Threats in the E-commerce Environment  Three key points of vulnerability:  Client  Server  Communications channel  Most common threats:  Malicious code  Hacking and cyber vandalism  Credit card fraud/theft  Spoofing  Denial of service attacks  Sniffing  Insider jobs

Denial Of Service(DOS) 13 USER PCs HACKER UNWITTING HOST “ZOMBIE” OTHER NETWORK COMPUTERS VICTIM’S SERVER

E-commerce Security Requirement  commerce over open networks (such as internet) can secure if the following happen: 1. Server Security 2. Message Privacy (or confidentiality) 3. Message integrity 4. Authentication 5. Authorization 6. Audit mechanism and non-repudiation 7. Payment and settlement

E-commerce Security Requirement(cont.) 1. Server Security:  Use firewalls and proxy servers  Every packet going from the firms computer to the internet or voice versa will be checked  “Security” against ”attack” such as viruses, unauthorized access of hackers, trojan horse can be provided.

E-commerce Security Requirement(cont.) 2. Message Privacy  A key requirement for E-commerce  it assures that the communication between trading parties are not revealed to other, therefore unauthorized party can not read or understand the message 3. Message integrity  another key requirement for e-commerce  it assures that the communication between trading parties are not alerted by an enemy.

E-commerce Security Requirement(cont.) 4. Authentication  Assures that the “sender” of the message is actually the person he/she claims.  Paper message  The term “authentication” determines the user of the computer is actually who he/she claims.  The term “authentication of the receiver”: allows the sender to be sure that the party he/she intend to get the message is the one who is receives it.

E-commerce Security Requirement(cont) 5. Authorization  Ensures that the trading party has the authority of transaction  It prevents the risks that employees transactions create economic damage Authentication vs Authorization Once the system knows who the user is through authentication, Authorization is how the system decides what the user can do

E-commerce Security Requirement(cont.) 6.Audit mechanism and non-repudiation  Enables exchanging parties to maintain and revisit the history/sequence of events during a period of transaction  In e-commerce, these could be computer time stamps, or records of different computer of different stage of transactions 7. Payment and settlements  Vital to widespread e-commerce  Secure e-payment ensures that “commitment” to pay for goods/services over media are met

Introduction to “Cryptography”  Plaintext= means the message  Encryption=encoding(hiding the contents from outsiders) the message  Cipher text= the encrypted message  Decryption=the process of retrieving the plaintext from the cipher text  “Encryption” and “Decryption” makes use of a “key and a coding method”.

Concept of Encryption and Decryption

Goals of Cryptography  Security goals:  privacy (secrecy, confidentiality) only the intended recipient can see the communication  authenticity (integrity) the communication is generated by the alleged sender

Encryption techniques  There are three important encryption techniques now in use:  Symmetric or “private key” encryption  Asymmetric or “public key” encryption  Digital signature, which are based on a variation of public key encryption.

Encryption techniques

Cryptography-based protocols, applications & solutions  Secure Socket Layer (SSL)  Digital Signatures  Digital Certificates  Secure Electronic Transaction (SET)  Authentication POP (APOP)  Pretty Good Privacy (PGP/GPG)  Kerberos  Secure shell (SSH)

Digital Signatures  An electronic and Digital Signatures  Authenticates the identity of the sender of a message, or the signer of a document,  Or ensures that the contents of a message are intact.  Digital Signatures features:  Are easily transportable,  Cannot be imitated by someone else,  And can be automatically time-stamped.  The ability to ensure that the original signed message arrived means that : the sender can not easily repudiate it later.

Digital Signatures  Encryption o Symmetric Systems – same key to encrypt & decrypt- DES o Asymmetric System- also known as public key encryption o Different key to decrypt-RSA o Digital Signatures- utilise the public key of organizations

Digital Signatures  Sender encrypts message with their private key  Receiver can decrypt using sender public key  The authenticates sender, who is only person who has the matching key.  Does not give “privacy” of data decrypt key is public

Digital Signatures  Digital Signatures are a cryptographic technique and are one of the most important application of asymmetric public- key cryptography.  They are electronic or digital signature that can be used to authentication the identity of the sender of the message or the signer of the document(to ensure that content of the sent message unchange).  A “Signature” is a pair of functions (Sig, Ver) of a key pair and a bit stream M.

Digital Signatures  The Digital Signature, is a small part of message, and includes: The name of the sender Other key contents  The Digital Signature in the outgoing message is encrypted using the sender’s private key.  The Digital Signature is then decrypted using the sender’s public key thus providing evidence that the message originate from the sender.  Digital Signature and public key encryption combine to provide secure and authentication message transmission.