Download presentation
Presentation is loading. Please wait.
Published byMelvyn Elliott Modified over 9 years ago
1
Information Systems Security Information Security for Web- based Applications
2
The full picture
3
Securing web sites Reduce the attack surface of the web server Prevent unauthorized access to web sites and applications Isolate web sites and applications Configure user authentication Encrypt confidential data exchanged with clients Maintain web sites and application security
4
Securing web sites Reduce the attack surface of the web server Enable only essential OS components and services Enable only web server components and services Enable only MIME types Configure OS security settings
5
Securing web sites Prevent unauthorized access to web sites and applications Store content on a dedicated disk volume Set web site permissions Set IP address and domain name restrictions Set NTFS file system permissions
6
Securing web sites Isolate web sites and applications To prevent multiple web sites and applications from adversely affect with one another Have to create application pool, assign web sites and applications to them, and assign proper service account and permission Complicated procedure
7
Securing web sites Configure user authentication Select appropriate authentication method Digest Advanced digest Integrated windows Client certificates MS.NET passport
8
Securing web sites Encrypt confidential data exchanged with clients Use of Secure Socket Layer (SSL) Install server certificate https instead of http Use IPSec or VPN for remote administration
9
Securing web sites Maintain web sites and application security Obtain up-to-date security updates Enable server security logs Enable web server application logs Review security policies, processes and procedures
10
Reading Microsoft: Improving Web Application Security: Threats and Countermeasures Chapter 1 “Web Application Security Fundamentals” Chapter 4 “ Design Guidelines for Secure Web Applications” is good but a bit too advanced for most students
12
Problem in e-Commerce The transaction is done online. The customer and the company cannot see each other. How can they trust each other? Who are you? Can I trust you? What if I cannot receive my goods? What if I cannot receive the payment?
13
Certificate Authority Now the CA comes in. It give a digital identity to all concerned party. It verifies the company is okay to do business with, and the customer is also okay This is not done by the government but by some commercial organizations PKI is used as the technology to provide the digital identification
14
What is PKI The set of hardware, software, people and procedures need to create, store, distribute, revoke key/certificates based on public key cryptography
15
PKI infrastructure and software development PKI uses of public key cryptography for authentication and access control of a user, guaranteeing the integrity and non- repudiation of documents signed by the user, and confidentiality of data.
16
PKI infrastructure and software development Certificate Authority Registration Authority Certificate Name Issuing CA Expiration date Public key Certificate Revocation List
17
X.509 Certificate structure
18
PKI PKI employs a pair of keys for each user: a private key which is known only to the user himself, and a public key which is published by some authority, in the form of a digital certificate (certificate for short).
19
PKI In signing a document or an e-mail, a user signs using his own private key so that others can use the signer's public key to verify the authenticity and non-repudiation of documents or e-mail. Since only the user has his own private key to sign, non- repudiation is established
20
PKI The use of PKI saves the trouble of maintaining and distributing the same encryption/decryption key between the sender and the receiver
21
Authentication using certificates
22
Secure online payment Credit card payment Secure Socket Layer Secure Electronic Transaction (SET) PayPal E-purse
23
Credit Card Invented in 1950s Only becomes profitable after 20 years when the customers reach a critical mass
24
Credit Card Payment This is the usual payment method used in eCommerce 4 parties are involved: Cardholder (payer) Merchant (payee) Issuing Bank Acquiring Bank
25
Measures to stop fraud Hot card lists Merchant floor limits – authorization required when a certain amount is exceeded Expiry date used as password Delivered to cardholder’s address Card verification value (MAC) Intrusion detection (anomaly detection)
26
SSL: Secure Socket Layer Developed by Netscape to secure HTTP sessions Provides Data encryption Server authentication Message integrity Optional client authentication NOT a payment system in itself
27
SSL: Secure Socket Layer Authentication of server by use of digital certificate Use public key technology to exchange a session key (symmetric) between server and client used only for that session After the buyer sends information thro the secure channel, the merchant processes the transaction in the usual manner
28
SSL Client to Server Name C, transaction serial no. C#, nonce Nc Server to Client Name S, transaction serial no. S#, nonce Ns, public key KS Client to Server Pre-mastered secret key encrypted by KS {Ko} KS
29
SSL Client to Server Finished message, MAC for all messages to date {finished, MAC(K1, everything_to_date)}Kcs Server Compute k1=h(Ko, Nc, Ns) Server to Client {finished, MAC{k1,every_to_date)}Ksc, {data}Ksc
30
Secure Electronic Transaction A joint effort of VISA and MasterCard to develop a more secure internet payment system in 1997 (credit card no not kept) SET makes use of public key technology and each participants are assigned public key/private key pairs
31
Secure Electronic Transaction Legal entity formed by MasterCard. Visa, American Express and JCB in 12/97 A protocol designed for electronic payment with credit card Key idea Merchant does not need to know payment details Bank does not need to know order details
32
SET Client to Server C, Nc, CC(Cert of client) Server to Client S, S#, CS(merchant) CB(bank) Client to Server {Order} KS, {Payment} KB, Sig KC {h(Order), h(Payment)}
33
SET Server to Bank ( Summary} KB, {Payment} KB Bank to Server Sig KS {Auth_response}
34
SET Disgrace of SET Nothing for the credit card holders Huge cost in building PKI Benefits less than expected
35
EDI Electronic Data Interchange Used for B2B transactions Build on Value-Added Networks International and national message standards Expensive
36
EDI transactions EDI, or Electronic Data Interchange, provides trading partners with an efficient business tool for the automatic transmission of commercial data from one computer system directly to another. Through the use of EDI message standards such as X.12, UN/EDIFACT, or EANCOM, data may be communicated quickly, efficiently and accurately irrespective of the users' internal hardware and software equipment.
37
EDI in Hong Kong TRAXON for air-cargo CargoNet for shipping EZ*TRADE for retail, manufacturing and trading Tradelink for HK Government chiefly for the Customs Department
38
EDI Infrastructure VAN (Valued Added Networks) / VPN (Virtual Private Networks) i-EDI (Web Based EDI Systems)
39
EDI example: SWIFT RGP = Regional General Processor
40
PayPal Virtual bank in Internet Cater for small merchants that cannot open account with banks Provides other services such as shopping cart Problem of jurisdiction
41
E-purse Pre-paid debit cards that can work offline Not many business successes Mondex Most successful case Octopus Pre-paid phone cards
42
The Internet Payment Processing System Acquiring bank Credit card association Customer issuing bank Internet merchant accounts Payment gateway Processor
43
Parties to Internet transaction Customer Merchant Issuing Bank Merchant’s Acquiring Bank Payment Gateway Processor
44
The transaction process Credit Card NO. Transaction info Request for payment Authorization OK
45
Transaction initiation Customer decides to make a purchase on merchant’s web site, proceeds to check out and inputs credit card information Merchant’s web site receives customer information and send transaction information to Payment Gateway Payment Gateway route information to processor
46
Payment authorization Processor send information to the Merchant’s Acquiring Bank Acquiring Bank sends transaction information to the credit card holder’s Issuing Bank Issuing Bank sends transaction result (authorization or decline) to Acquiring Bank Acquiring Bank send transaction result to Processor
47
Payment authorization Processor routes information to the Payment Gateway Payment Gateway passes result to the Merchant Merchant accepts and ships goods or rejects transaction
48
The payment process Request for payment Credit Merchant A/C Debit Consumer A/C
49
Payment settlement Merchant requests Payment Gateway to settle a payment Payment Gateway sends all transactions to be settled to the Processor Processor send settlement payment details to customer’s credit card Issuing Bank, and to the Merchant’s Acquiring Bank
50
Payment settlement Issuing Bank includes the Merchant’s charge on the customer’s credit card statement while Acquiring Bank credits the Merchant’s account
51
Payment Processing
52
PCI DSS Payment Card Industry Data Security Standard It is developed by PCI Security Standards Council, including American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. Inc. International
53
PCI DSS It is a security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This is intended to help organizations proactively protect customer account data.
54
Requirements Build and Maintain a Secure Network Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters
55
Requirements Protect Cardholder Data Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks
56
Requirements Maintain a Vulnerability Management Program Use and regularly update anti-virus software Develop and maintain secure systems and applications
57
Requirements Implement Strong Access Control Measures Restrict access to cardholder data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data
58
Requirements Regularly Monitor and Test Networks Track and monitor all access to network resources and cardholder data Regularly test security systems and processes
59
Requirements Maintain an Information Security Policy Maintain a policy that addresses information security
60
Reading Refer Verisign Online Payment Processing Guide
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.