1 CS5038 The Electronic Society Security 1: Security and Crime Online We’ll begin with a look at what’s out there. In Security 2, we’ll think about it.

Slides:



Advertisements
Similar presentations
CS5038 The Electronic Society
Advertisements

1 CS5038 The Electronic Society Security 1: Security and Crime Online Well begin with a look at whats out there. In Security 2, well think about it all.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Prentice Hall, Chapter 13 E-Commerce Security.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Securing Information Systems
Chapter 10 E-Commerce Security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Internet Security for Small & Medium Business Week 6
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Protecting Your Information Assets
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Prentice Hall, E-Commerce Security Notes based on Laudon&Laudon.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
1 CS5038 The Electronic Society Security and Crime Online Lecture Outline Types of Attacks Security Problems Major security issues in online systems Security.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Chap1: Is there a Security Problem in Computing?.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Securing Information Systems
Securing Information Systems
Pertemuan 20 Materi : Buku Wajib & Sumber Materi :
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 13 E-Commerce Security Prentice Hall, 2002.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

1 CS5038 The Electronic Society Security 1: Security and Crime Online We’ll begin with a look at what’s out there. In Security 2, we’ll think about it all a bit more conceptually. Types of Attacks Some Security Problems and Perspectives Major security issues in online systems Security Risk Management Security Technologies Government Intrusion Government Power

2 Attack Sophistication Vs. Intruder Knowledge Source: Special permission to reproduce the CERT ©/CC graphic © 2000 by Carnegie Melon University, in Electronic Commerce 2002 in Allen et al. (2000).

3 Types of Attacks Non-technical, ‘social engineering’ – phone or employee posing as administrator, phishing Shoulder surfing – e.g., observe user id and password entry Buffer overflow – hide code at the end of a long entry DNS spoofing – change DNS tables or router maps Sniffing – listen to all packets on network Malicious code:  Viruses – propagate locally  Worms – propagate between systems  Macro viruses and macro worms (inside applications)  Trojans (Trojan horses) – e.g., posing as a game, keylogging

4 Some Security Problems Example: Denial of service (DOS) – purchases are not made, ads are not seen  Security and ease of use can be in conflict  e.g., passwords, electronic wallets/credit card  Security takes a back seat to market pressures  e.g., trying to hurry the time to market  Security architectures are only as strong as their weakest points  Security of a site depends, to some extent, on the security of the whole Internet – DOS, , ….  Knowledge of vulnerabilities is increasing faster than it can be combated – hackers share secrets and write tools  Flaws in common applications – Outlook, Word, Acrobat, …  Under-reporting  Why might a company not report a crime?

5 Security Perspectives User’s perspective  Is Web server owned and operated by legitimate company?  Web page and form contain some malicious code content?  Will Web server distribute user’s information to another party? (or allow to be stolen) Company’s perspective  Will the user attempt to break into the Web server or alter the site?  Will the user try to disrupt the server so it isn’t available to others? Filling a form at a simple marketing site: Both perspectives  Is network connection free from eavesdropping?  Has information sent back and forth between server and browser been altered?

6 Major security issues in online systems Privacy and/or Confidentiality  trade secrets, business plans, health records, credit card numbers, records of web activity Authentication – for Web page,  Something known – password  Something possessed – smartcard  Something unique – signature, biometrics Integrity – protect data from being altered or destroyed  Financial transaction Non-repudiation – not denying that you bought something Later, we’ll look at the ontology of security issues more carefully. PAIN – for payment systems

7 Security Risk Management Definitions involved in risk management  Assets – anything of value worth securing  Threat – eventuality representing danger to an asset  Vulnerability – weakness in a safeguard Risk Assessment  Determine organizational objectives  Cannot safeguard against everything – limit to satisfying objectives  Example: if a website is to service customer complaints, then top priority is to ensure no disruption – rather than protect data  Inventory assets – value and criticality of all assets on network  Delineate threats – hackers, viruses, employees, system failure  Identify vulnerabilities -  Quantify the value of each risk  e.g., Risk = Asset x Threat x Vulnerability (e.g., Symantec.com)  Is this realistic?

8 Security Technologies Firewall:  Like a bouncer, has rules to determine if data is allowed entry Virtual Private Network (VPN):  Encryption – scramble communications Intrusion Detection Systems (IDS):  Automatically review logs of file accesses and violations  Analyze suspicious activity for known patterns of attack Intrusion Prevention Systems (IPS):  Similar to IDSs  Actively block connections, code proliferation

9 Government Protecting Citizens Identity Cards:  The national Registration Act: outbreak of World War II  Help police know if citizens rightfully belonged to the UK  After War: member of public charged with not producing ID card when requested to by a policeman.  Case went to appeal:  Lord Chief Justice Lord Goddard: “This Act was passed for security purposes and not for the purposes for which, apparently, it is now sought to be used.”  Ruling underlined public’s disquiet with the way that ID cards had slowly become a compulsory feature of everyday life in the UK  Cards repealed in 1952 Based on essay by: Steven McGhee

10 Government Protecting Citizens  Attempts at reintroducing ID cards made at various times over the intervening years  9/11 attacks  ID cards start to look more likely  Compulsory for foreign nationals resident in the UK from late 2008  Voluntary for British nationals from 2009 onwards  Compulsory for workers in certain high-security professions (airport)  Arguments put forward by the Government:  Fight against ID theft  Prevention of illegal immigration  Fight against terrorism  Reduce benefit fraud  “help safeguard civil liberties” (in direct contrast to critics) James Hall (chief executive of the Passport and Identity Cards service). How?  Election issue in 2010: Coalition Government cancelling ID cards; Ed Miliband suggests Labour Government was ‘careless’ with civil liberties (Matthew Norman, The Independent, Monday, 9 August 2010)  This brings us to questions about privacy

11 A law-abiding person has nothing to fear? Why do we need privacy anyway?  Unpopular political beliefs  might lose job or promotion  Someone who has a disease which people fear  A person who is homosexual, but whose family does not know  A teenage girl secretly visiting her boyfriend of a different race to her family  Someone seeking to change job (needs to attend interviews)  A woman scouting out places to go to get away from her violent partner  Someone going to Alcoholics Anonymous or drugs rehabilitation sessions  Someone going to church, synagogue or mosque who fears the scorn of friends, colleagues or family  Someone attending classes of religious instruction prior to converting to another religion (fears vengeance)  A son or daughter visiting an estranged parent without the knowledge of the parent they live with.  An ex-criminal seeking to go straight who must meet his probation officer or register with the police. (there have been some examples with kids)  Authorized people may abuse access to information  Information not secure

12 Quis custodiet ipsos custodes? Who will watch the watchmen? problem posed by Plato in The Republic "Power tends to corrupt, and absolute power corrupts absolutely. Great men are almost always bad men, … " Lord Acton "Unlimited power is apt to corrupt the minds of those who possess it." William Pitt, the Elder

13 Separation of Powers: Trias Politica Model was first developed in ancient Greece Came into widespread use by the Roman Republic  As part of the un-codified Constitution of the Roman Republic. State is divided into branches or estates, each with separate and independent powers and areas of responsibility. What about modern states? UK, US, EU … Montesquieu: French Enlightenment political philosopher: "the independence of the judiciary has to be real, and not apparent merely”.  Judiciary most important of powers.  Independent and unchecked.  Also considered the least dangerous.

14 Separation of Powers – Need More? The Popular The Bureaucracy The Media (traditionally, the ‘fourth estate’, the first three being, according to Edmund Burke, the Lords Spiritual (Bishops, the clergy), The Lords Temporal (the nobility), and the Commons (the peasantry)) The Financial Oligarchy?

15 Summary Attack Sophistication vs Intruder Knowledge Types of Attacks – non-technical, buffer overflow, malicious code, etc. Security Problems – ease of use, market pressure, weak links Security Concerns – e.g., filling a form; who’s watching? Major security issues in online systems – PAIN Security Risk Management – assessment, planning, implementation, monitoring Security Technologies – firewall, VPN, IDS Government Protecting Citizens