Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Similar presentations

Presentation on theme: "Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,"— Presentation transcript:

1 Security Threats and Protection Mechanisms

2 Learning Objectives Internet security issues (intellectual property rights, client, communication channels, servers) Specific security objectives for protecting Web business assets and customer privacy How to protect: clients, data in transit, server computers. Organizations that promote computer, network, and Internet security

3 Security Overview Computer security is the protection of assets from unauthorized access, use, alteration, or destruction Two types of security: Physical security Logical security Vocabulary: Any act or object that poses a danger to computer assets is known as a threat Countermeasure is a procedure that recognizes, reduces, or eliminates a threat An eavesdropper is a person or device that can listen in on and copy Internet transmissions

4 Aspects of Security Three computer security categories: Secrecy Integrity Availability Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the datas source Integrity refers to preventing unauthorized data modification Necessity refers to preventing data delays or denials

5 Risk Management The risk management model shows four general actions to take according to the severity of a threat

6 Security Policy A security policy is a written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not The first step an organization must take in creating a security policy is to determine what assets to protect and from whom Specific elements of a security policy address the following points: Authentication and access control Secrecy and data integrity Audit Procedures

7 Security elements in e-commerce There are three elements in e-commerce transactions Client Communication channel Server Each element must be protected Each element has its own requirements and special characteristics

8 Threats to the Client Active web content, i.e. non-static pages which contain instructions which execute in the client (for example: ActiveX, Java Applets, JavaScript, other plug-ins) Systems software bugs (e.g. Microsoft RPC bugs have allowed the proliferation of the Blaster worm) Software application bugs (e.g. Microsoft Outlook bugs can be exploited by viruses) Result: Unauthorized access or control of the client

9 ActiveX Controls ActiveX is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks ActiveX controls run only on computers running Windows and only on browsers that support them Because ActiveX controls have full access to client computers they can cause secrecy, integrity, or necessity violations


11 Java Applets Java adds functionality to business applications and can handle transactions and a wide variety of actions on the client computer The Java sandbox confines Java applet actions to a set of rules defined by the security model These rules apply to all untrusted Java applets Bugs in the Java VM can cause security compromises

12 JavaScript JavaScript is a scripting language that enables Web page designers to build active content Errors in JavaScript implementations can invoke privacy and integrity attacks JavaScript programs do not operate under the restrictions of the Java sandbox security model

13 Other Active Content Plug-ins are programs that interpret or execute instructions embedded in downloaded graphics, sounds, and other objects Popular plug-ins include Macromedia Flash, Microsoft Media Player and Apple Quicktime. Active content, including all forms, enables Web pages to take action Plug-ins perform their duties by executing commands buried within the media they are manipulating Although active content gives life to static Web pages it also introduces unique challenges for protecting the client

14 Viruses A virus is software that attaches itself to another file and can executes when host program is activated thus bypassing normal authorization controls E.g. a MS Word macro virus is coded as a small program and is embedded in a Word document Viruses can take any number of actions e.g. everyone in the address book or make phone calls Viruses often use application software bugs

15 Client compromises Clients can be compromised by exploiting system software bugs to take over computers A Trojan horse is a program hidden inside another program or Web page that masks its true purpose A worm is a program that has the instructions to look for and capture other computers on the net after infecting one A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers

16 Threats to the Communication Channel The Internet is the medium over which e- commerce data is transferred Messages on the Internet travel a random path from a source node to a destination node The content of messages is not protected and anyone on the message path can record its contents If communication is sensitive additional measures must be taken to protect the data This is a core requirement for e-commerce

17 Specific Threats Secrecy Capture user identity preferences or record their activities Capture transaction details Capture payment information Integrity modify transactions modify user credential (e.g. delivery address) Availability make shop unavailable to customers

18 Threats to the Server Servers have software vulnerabilities that can be exploited to cause destruction or to acquire information illegally E.g. databases connected to the Web contain information that could damage a company if it were disclosed or altered Physical security and access control is also very important

19 Threats to Intellectual Property Intellectual property is the ownership of ideas and control over the tangible or virtual representation of those ideas IP includes: Names, for example trademarks and domain names (Cybersquatting, name changing, name stealing) Digital intellectual property, including art, logos, and music posted on Web sites, is protected by laws

20 Computer Security Resources CERT SANS Institute Internet Storm Center Center for Internet Security U.S. Dept. of Justice Cybercrime National Infrastructure Protection Center

21 Protecting Electronic Commerce Assets

22 Monitoring Active Content Most browsers are equipped to recognize when they are about to download Web page containing active content Users can configure the user of active content by their browser For example, configure Java VM using the Java security console

23 Microsoft Internet Explorer


25 Netscape Navigator


27 Antivirus Software Antivirus software is a defense strategy Antivirus software matches the contents of a file under examination against a database of virus signatures Thus, antivirus software cannot protect against viruses that have not been discovered earlier and recorded in the database One of the most likely places to find a virus is in an electronic mail attachment Some Web systems let users scan attachments using antivirus software before downloading

28 Protecting e-commerce communications Providing e-commerce channel security means: Providing channel secrecy Guaranteeing message integrity Ensuring channel availability A complete security plan includes authentication Businesses must prevent eavesdroppers from reading the Internet messages that they intercept Best available way to do this is via encryption

29 Encryption Encryption is a mathematical technique which encodes information using a key to transform the original information into a string of characters that is unintelligible The program that transforms text into cipher text is called an encryption program At the other end of the communication channel each message is decrypted using the same or a related key by a decryption program

30 Types of Encryption Asymmetric encryption or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key Symmetric encryption or private-key encryption, encodes a message using a single numeric key to encode and decode data

31 Hash Functions Hash algorithms are one-way functions. A hash algorithm has these characteristics: It uses no secret key The message digest it produces cannot be inverted to produce the original information The algorithm and information about how it works are publicly available Hash collisions are nearly impossible. MD5 is an example of a hash algorithm

32 Encryption Methods

33 Encryption Algorithms and Standards

34 Secure Sockets Layer (SSL)

35 Digital Certificates A digital certificate verifies that a user or Web site is who it claims to be The digital certificate contains a means for sending an encrypted message to the entity A Web sites digital certificate is a shoppers assurance that the Web site is the real store Proof of validity and management of digital certificates is provided by the certification authority

36 Digital Certificates in IE

37 Ensuring Transaction Integrity Integrity violations can occur whenever a message is altered while in transit between the sender and receiver Ensuring transaction integrity, two separate algorithms are applied to a message: Hash function Digital signature

38 Digital Signature An encrypted message digest is called a digital signature A purchase order accompanied by the digital signature provides the merchant positive identification of the sender and assures the merchant that the message was not altered Used together, public-key encryption, message digests, and digital signatures provide quality security for Internet transactions

39 Transaction Delivery A denial or delay of service attack removes or absorbs resources One way to deny service is to flood the server with a large number of packets To prevent such attacks, a robust network architecture should be in place and network countermeasures should be in place

40 Protecting the Web Server The e-commerce server which incorporates a Web server, responds to requests from Web browsers through the HTTP protocol and CGI scripts Security measures for commerce servers: Access control and authentication Operating system controls Firewall

41 Access Control and Authentication Access control and authentication refers to controlling who and what has access to the e- commerce server Operating systems often provide access control list security to restrict file access to selected users Users identify themselves using either a password or a token An access control list (ACL) is a list or database of people who can access the files and resources

42 Firewalls A firewall is a system that is installed at the entry point of a network The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat Acting as a filter, firewalls permit selected messages to flow into and out of the protected network

43 Types of Firewalls Packet-filter firewalls examine all the data flowing back and forth between the trusted network Application layer firewalls filter traffic based on the application they request Proxy severs are firewalls that communicate with the Internet on the private networks behalf

44 IP Protection A watermark is data imperceptibly added to the original digital asset in order to convey hidden copyright data A watermark can be used to verify the lawful use of the asset It should not reduce the quality of the digital asset Still in its infancy as a market Other techniques (less powerful) are based on mechanisms built-in the hardware or the software Examples include DVD and MS Media Player but more often than not can be bypassed

Download ppt "Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,"

Similar presentations

Ads by Google