25
Chapter 11 E-COMMERCE SECURITY

Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Embed Size (px)

Citation preview

Page 1: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 11

E-COMMERCE SECURITY

Page 2: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

2

Learning Objectives

Explain EC-related crimes and why they cannot be stopped.

Describe an EC security strategy and why a life cycle approach is needed.

Describe the information assurance security principles.

Describe EC security issues from the perspective of customers and e-businesses.

Page 3: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

3

Learning Objectives

Identify the major EC security threats,vulnerabilities,and risk.

Identify and describe common EC threats and attacks.

Identify and assess major technologies and methods for securing EC communications.

Identify and assess major technologies for information assurance and protection of EC networks.

Page 4: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

4

Stopping E-Commerce Crimes

Six major reasons why is it difficult for e-tailers to stop cyber criminals and fraudsters:1. Strong EC security makes online shopping inconvenient for

customers2. Lack of cooperation from credit card issuers and foreign

ISPs3. Online shoppers do not take necessary precautions to avoid

becoming a victim4. IS design and security architecture are vulnerable to attack5. Software vulnerabilities (bugs) are a huge security problem6. Managers sometimes ignore due standards of care

Page 5: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

5

Stopping E-Commerce Crimes

Page 6: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

6

Stopping E-Commerce Crimes

Exposure exists when a computing system: Allows an attacker to conduct information g

athering activities. Allows an attacker to hide activities. Includes a capability that behaves as expe

cted,but can be easily compromised. Is a primary point of entry that an attacker

may attempt to use to gain access to the system or data or,

Is considered a problem according to some reasonable security policy.

Page 7: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

7

E-Commerce Security Strategy and Life Cycle Approach

THE INTERNET’S VULNERABLE DESIGN

THE SHIFT TO PROFIT-MOTIVATED CRIMES

TREATING EC SECURITY AS A PROJECT

Page 8: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

8

E-Commerce Security Strategy and Life Cycle Approach

IGNORING EC SECURITY BEST PRACTICES Computing Technology Industry

Association (CompTIA)

Nonprofit trade group providing information security research and best practices.

Page 9: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

9

Information Assurance

information assurance (IA)The protection of information systems against unauthorized access to or modification of information whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.

Page 10: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

10

Information Assurance

confidentialityAssurance of data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes.

integrityAssurance that stored data has not been modified without authorization; and a message that was sent is the same message that was received.

availabilityAssurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to authorized users.

Page 11: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

11

Information Assurance

authenticationProcess to verify (assure) the real identity of an individual, computer, computer program, or EC Web site.

authorizationProcess of determining what the authenticated entity is allowed to access and what operations it is allowed to perform.

Page 12: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

12

Information Assurance

nonrepudiation

Assurance that an online customer or trading partner cannot falsely deny (repudiate) their purchase or transaction.

digital signature or digital certificate

Validates the sender and time stamp of a transaction so it cannot later be claimed that the transaction was unauthorized or invalid.

Page 13: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

13

Information Assurance

Page 14: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

14

Information Assurance

Page 15: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

15

Enterprisewide E-Commerce Security and Privacy Model

SENIOR MANAGEMENT COMMITMENT AND SUPPORT

EC SECURITY AND TRADING EC SECURITY PROCEDURES AND E

NFORCEMENT SECURITY TOOLS: HARDWARE AN

D SOFTWARE

Page 16: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

16

Basic E-Commerce Security Issues and Perspectives From the user’s perspective:

How can the user know whether the Web server is owned and operated by a legitimate company?

How does the user know that the Web page and form have not been compromised by spyware or other malicious code?

How does the user know that an employee will not intercept and misuse the information?

From the company’s perspective: How does the company know the user will not attempt to break into the Web server or

alter the pages and content at the site? From both parties’ perspectives:

How do both parties know that the network connection is free from eavesdropping by a third party “listening” on the line?

How do they know that the information sent back and forth between the server and the user’s browser has not been altered?

From both parties’ perspectives: How do both parties know that the network connection is free from eavesdropping by a

third party “listening” on the line? How do they know that the information sent back and forth between the server and the

user’s browser has not been altered?

Page 17: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

17

Threats and Attacks

SOCIAL NETWORKING MAKES SOCIAL ENGINEERING EASY

TECHNICAL ATTACKSDenial of service,Zombies,and PhishingBotnetsMalicious Code:Viruses,Worms,and Trojan

Horses

Page 18: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

18

Securing E-Commerce Communications

Access controlPassive tokens ,are storage devices that co

ntain a secert code.Active tokens, usually are small stand-alone

electronic devices that generate one-time passwords.

Page 19: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

19

Securing E-Commerce Communications

public key infrastructure (PKI)A scheme for securing e-payments using public key encryption and various technical components. encryption plaintext ciphertext encryption algorithm key (key value) keyspace

Page 20: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

20

Securing E-Commerce Communications

Page 21: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

21

Securing E-Commerce Communications

Public (asymmetric) key encryption

Method of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa.public keyprivate keyRSA

Page 22: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

22

Securing E-Commerce Communications

Digital Signatures and Certificate Authorities

Hashmessage digest (MD)digital envelopecertificate authorities (CAs)

Secure Socket Layer (SSL)

Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality.

Page 23: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

23

Securing E-Commerce Networks

•Defense in depth•Need-to-access basis•Role-specfic security•Monitoring•Patch management•Incident response team

Page 24: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

24

Securing E-Commerce Networks

firewallA single point between two or more networks where all traffic must pass (choke point); the device authenticates, controls, and logs all traffic. packet packet-filtering routers packet filters application-level proxy bastion gateway proxies

Page 25: Chapter 11 E-COMMERCE SECURITY. Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1 Learning Objectives Explain EC-related

Chapter 10 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall

25

Securing E-Commerce Networks

virtual private network (VPN) A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network.

intrusion detection systems (IDSs)A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees.