Download presentation
Presentation is loading. Please wait.
Published byPatricia French Modified over 9 years ago
1
World Bank Integrator Unit Electronic Security and Payment Systems: Some New Challenges Tom Glaessner Thomas Kellermann Valerie McNevin The World Bank November 2003
2
World Bank Integrator Unit Organization of Presentation Digital Trends in Payments Nature of the Threat Market Structure and E-Risk in Emerging Economies A Four Pillar Approach Future Challenges
3
World Bank Integrator Unit Four Streams of E-FinanceEBT ETC EDI EFT # of Global EFT Transactions677,411,204
4
World Bank Integrator Unit I. Digital Trends in Retail Payments Increased dependence on Information Technologies –The convergence of technologies –Leapfrogging opportunities provided by e- finance stimulate growth –The growth of wireless in EMG New, interoperable technologies dependent on the Internet infrastructure –VOIP –Satellite and cyber-location E-commerce, retail and even micro payments
5
World Bank Integrator Unit Connectivity: Mobile Phones
7
World Bank Integrator Unit II. The Nature of the Threat The threat is not new A cyber world allows for crimes of greater magnitude with greater speed Lack of incentives for reporting hides true e- security vulnerabilities Cyber threats have been rising globally as technologies converge Emerging markets are not immune
8
World Bank Integrator Unit System Access: E-Risk and Fraud System Access in a Networked Environment Access Tools –Hacking software vulnerabilities, viruses, worms, Trojans, Denial of Service (DOS) Types of E-Fraud –Identity Theft –Extortion (reputation) –Salami Slice –Funds Transfer –Electronic Money Laundering
9
World Bank Integrator Unit III. E-Risk Market Structure in Emerging Economies Many emerging markets have concentrated provisioning of hosting services Interlinked ownership: Telecom companies, ISPs, e-security service companies, and banks No real separate independent e-security industry Shortage of human capital in EMG in this area –CISOs –E-Security providers versus white knights
10
World Bank Integrator Unit IV. A Four Pillar Approach
11
World Bank Integrator Unit Pillar 1 Legal framework, Incentives, Liability No one owns the internet so how can self- regulation work? Basic laws in the e-security area vary a lot across countries as do penalties Defining a money transmitter How to define a proper service level agreement (SLA) Downstream liability Issues in certification and standard setting
12
World Bank Integrator Unit Pillar 3 Certification, Standards, Policies and Processes Certification –Software and hardware –Security vendors –E-transactions Policies Standards Procedures
13
World Bank Integrator Unit Pillar 2 Supervision and External Monitoring Technology Supervision and Operational Risk: –Retail Payment Networks;Commercial Banks; E- Security Vendors –Capital Standards and E-Risk –On-Site IT examinations –Off-site processes –Coordination: between regulatory agencies; between supervisors and law enforcement Cyber-Risk Insurance Education and Prevention
14
World Bank Integrator Unit Pillar 4 Layered Electronic Security 12 Core Layers of proper e-security Part of proper operational risk management General axioms in layering e-security –Attacks and losses are inevitable –Security buys time –The network is only as secure as its weakest link
15
World Bank Integrator Unit Intruder Begins Attack Exploiting a hole in the internet banking software, SQL insertion is used to run system commands on the database server. The web server authenticates against the customer database The attacker runs a command that opens a remote command shell
16
World Bank Integrator Unit Network is completely compromised The domain passwords are cracked, and access to the administrator’s workstation is now available. The administrator accesses the mainframe from his desktop, and saves all the passwords for easy access. A remote desktop is pushed back to attacker Now that the firewall security has been bypassed completely, the attacker uses the database server to take over the domain controller. The attacker can now access the mainframe as if he were sitting at the administrator’s desk. Hmmm… what else can he access from here?
17
World Bank Integrator Unit Select Weaknesses Passwords Over-reliance on encryption Patch management Rogue HTTP Tunnels Outsourcing Wireless Security
18
World Bank Integrator Unit Keys can be: – Altered by a hacker – Captured through video-viewing – Broken by parallel processor when of limited length – Stolen through manipulation of fake names and ID’s – Compromised when password and token protection are cracked Certificate Authorities can: –Have a different definition of “trust” –Operate with an insecure physical network security –Be broken into, and public key files altered Technical Vulnerabilities of PKI
19
World Bank Integrator Unit GSM Vulnerabilities SIM-CARD Vulnerability SMS Bombs Gateway Vulnerability WAP Vulnerability Man in the Middle Attack
20
World Bank Integrator Unit
21
V. Challenges Ahead Building awareness Creating a culture of electronic security as part of business process Building e-security considerations into investment planning and RFP design Assuring proper development of the four pillars in emerging markets
22
World Bank Integrator Unit World Bank Integrator Group 2003 For further information : www1.worldbank.org/finance (click on E-security) tglaessner@worldbank.org tglaessner@worldbank.org
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.