Download presentation
Presentation is loading. Please wait.
Published byKaren Parker Modified over 9 years ago
1
ECT 582 Secure Electronic Commerce Professor Robin Burke
2
Introductions About me http://josquin.cs.depaul.edu/~rburke/ About you Student information sheet
3
Resources Course on-line discussion forum grades Course home page
4
Security 1. freedom from danger, risk, etc.: safety 2. freedom from care, apprehension or doubt; well-founded confidence 3. something that secures or makes safe; protection; defense 4. precautions taken to guard against theft, sabotage, the stealing of military secrets, etc – Webster’s Encyclopedic Unabridged Dictionary of the English Language
5
E-Commerce the process of electronically buying and selling goods, services and information, and the maintenance of all the relationships, both personal and organizational, required for an electronic marketplace to function.
6
What are we securing?
7
Post-9/11 realities Aspects of business operations may impact public safety E-commerce opens a hole for interacting with an organization
8
What can we do to improve security?
9
Key concepts Risk Trust
10
Risk What are the possible losses we are guarding against?
11
Trust Must choose where trust is to be placed
12
Risk management Risk analysis Risk mitigation Risk transfer
13
What are the primary risks? 1. Disclosure of proprietary information 2. Denial of service 3. Virus attacks 4. Insider net abuse 5. Financial fraud 6. Sabotage - CSI/FBI 2003 Computer Crime and Security Survey
14
Disclosure of Proprietary Info Customer data exposure Data theft Sensitive information
15
Fraud Payment account abuse Transfer funds without authorization Destroy or hide financial records Customer impersonation
16
Secondary risks Damage to relations with customer or business partners Legal, public relations, or business resumption cost Public relations damage Uptake failure due to lack of confidence
17
How is e-commerce different? Need for physical proximity Differences in document
18
Physical documents Semi-permanence of ink embedded in paper fibers Particular printing process letterhead watermark Biometrics of signature Time stamp Obviousness of modifications, interlineations, and deletions
19
Computer documents Computer-based records can be modified freely and without detection Supplemental control mechanisms must be applied to achieve a level of trustworthiness comparable to that on paper Less permanent, too
20
Legal differences In some cases, possession matters negotiable document of title cash money
21
Attack Any action that compromises the security of information systems Normal flow Info source Info destination
22
Interruption Attack on availability Info source Info destination
23
Interception Attack on confidentiality Info source Info destination
24
Modification Attack on integrity Info source Info destination
25
Fabrication Attack on authenticity Info source Info destination
26
Passive vs active Passive Monitor communication Disclose contents but also traffic analysis Active Interfere with communication
27
Active attacks: masquerade Masquerade: one entity pretends to be a different entity Example: Session Hijacking Taking over an existing active session. It can bypass the authentication process and gain access to a machine
28
Active attacks: replay Passive capture of data Later retransmission to produce an unauthorized effect Example: Password sniffing Program capture user id / password info Case in Tokyo – sniffer installed at Internet cafe. 16 million Yen stolen.
29
Active attacks: modification Some portion of a legitimate message is altered, or that message are delayed or reordered, to produce an unauthorized effect Example: Spam Return-To header on spam email is always forged to prevent tracking the sender
30
Active attacks: DoS Denial of service prevents or inhibits the normal use or management of communication facilities Example: SYN flooding send open request for TCP connection but don’t respond to handshake do this over and over again
31
Security properties What do we want out of a secure e- commerce system? Confidentiality Authentication Integrity Non-repudiation Access control Availability
32
Confidentiality Protects against interception Ensures that a message is only readable by intended recipient Technology Encryption
33
Authentication Protects against fabrication Ensures that the origin of a message or electronic document is correctly identified, with assurance that the identity is not false Technology User Id/Password Digital certificates
34
Integrity Protects against modification Ensures that only authorized parties are able to modify an electronic document or Allow modification to be detected Technology Digital signatures
35
Non-repudiation Protects against an e-commerce participant acting in bad faith Require that neither the sender nor the receiver of a message be able to deny the transmission Technology (Complicated)
36
Access control Protects against unauthorized access Allows the establishment of fine- grained control over access to files and applications for different users and groups Technology (Various, usually tied to authentication)
37
Availability Protects against interruption Requires that computer system asset be available to authorized parties when needed Technology (Many)
38
The big picture Security is a multi-faceted feature of information systems An organization needs A security strategy tailored for its particular needs A security architecture that addresses that strategy Security technology to realize the architecture
39
Security strategy Threats what is valuable? who might want it? Vulnerabilities where is the organization exposed? Defenses what can be done to manage the risks? Legal what liabilities and legal requirements exist?
40
Security architecture People how are they hired, trained, monitored, audited? Systems what systems exist? how are systems connected to each and to the larger Internet? Procedures how are systems used? who gets access to what under what circumstances?
41
Security technology Main focus of this course Specific technologies for achieving security-related goals But meaningless in the absence of a strategy and an architecture
42
Assignment #1 Create a web page for your assignments I will link these to the course page Subscribe to CERT Advisory mailing list Post on the "Test" forum Due before class starts No late assignments!
43
Next week Cryptography Reading Ford & Baum, Ch. 4 Risks Digest Should be prepared for discussion
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.