E-Commerce & Bank Security By: Mark Reed COSC 480.

Slides:



Advertisements
Similar presentations
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Advertisements

Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Quiz Review.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet safety By Lydia Snowden.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Internet Security facilities for secure communication.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Software Security Testing Vinay Srinivasan cell:
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Dimensions of E – Commerce Security
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Types of Electronic Infection
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
ACM 511 Introduction to Computer Networks. Computer Networks.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
What is Spam? d min.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Information Management System Ali Saeed Khan 29 th April, 2016.
Network Security (the Internet Security)
Secure Software Confidentiality Integrity Data Security Authentication
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
Information Security 101 Richard Davis, Rob Laltrello.
Security in Networking
Chapter 5 Electronic Commerce | Security
Presentation transcript:

E-Commerce & Bank Security By: Mark Reed COSC 480

Outline Introduction Introduction Definition Definition Security Challenges Security Challenges Security Terms Security Terms Common Threats Common Threats Security Practices Security Practices Protecting Yourself Protecting Yourself

Introduction “Total eCommerce sales for 2006 were estimated at $108.7 billion. This represents an increase of 23.5% over 2005,” according to the U.S. Census Bureau’s E-Commerce Survey. “Total eCommerce sales for 2006 were estimated at $108.7 billion. This represents an increase of 23.5% over 2005,” according to the U.S. Census Bureau’s E-Commerce Survey.

What is Security? Dictionary Definition: Protection or defense against attack, interference, espionage, etc. Dictionary Definition: Protection or defense against attack, interference, espionage, etc. Computer Science Classification: Computer Science Classification: Confidentiality – protecting against unauthorized data disclosure Confidentiality – protecting against unauthorized data disclosure Integrity – preventing unauthorized modification Integrity – preventing unauthorized modification Availability – preventing data delays or denials Availability – preventing data delays or denials

Security Challenges

Security Terms Authentication – originator can be verified Authentication – originator can be verified Integrity – information has not been altered by an unauthorized person or process Integrity – information has not been altered by an unauthorized person or process Non-repudiation – proof of participation by the sender and/or receiver of a transmission Non-repudiation – proof of participation by the sender and/or receiver of a transmission Privacy – individual rights to nondisclosure Privacy – individual rights to nondisclosure

Threats Social Engineering – mislead the end user Social Engineering – mislead the end user Man-in-the-middle – listen between client/sever Man-in-the-middle – listen between client/sever Man-in-the-browser – redirect end-user to counterfeit sites to steal credentials Man-in-the-browser – redirect end-user to counterfeit sites to steal credentials

Threats Cont. Malware – poison hosts file and/or DNS to re- direct the user to counterfeit sites Malware – poison hosts file and/or DNS to re- direct the user to counterfeit sites Trojan Proxy – http redirector that re-directs all traffic to a Proxy and sends to the attacker Trojan Proxy – http redirector that re-directs all traffic to a Proxy and sends to the attacker

Malware/Phishing Attack Poisoning the hosts file to re-direct entries Poisoning the hosts file to re-direct entries

Spam “Spam accounts for 9 out of every 10 s in the United States.” “Spam accounts for 9 out of every 10 s in the United States.” MessageLabs, Inc. MessageLabs, Inc. Main source of phishing attacks Main source of phishing attacks Not a secure transmission method Not a secure transmission method

Ecommerce Architecture Support for peak access times Support for peak access times Replication and mirroring to avoid denial of service attacks Replication and mirroring to avoid denial of service attacks Security of web pages through certificates and network architecture to avoid spoofing attacks Security of web pages through certificates and network architecture to avoid spoofing attacks

Security Challenges Client side security Client side security Prevent unauthorized access to stored information Prevent unauthorized access to stored information Sever-side security Sever-side security Prevent unauthorized access while allowing authorized user to connect Prevent unauthorized access while allowing authorized user to connect Application and Database server security Application and Database server security Use security layers between the servers Use security layers between the servers

Client Side Security Protect information stored on the client system Protect information stored on the client system Use of digital signatures and encryption can reduce non-repudiation security attacks Use of digital signatures and encryption can reduce non-repudiation security attacks Communication security such as secure HTTP Communication security such as secure HTTP

Server-side Security Place application and database server behind a firewall in a demilitarized zone (DMZ) Place application and database server behind a firewall in a demilitarized zone (DMZ) Do not store sensitive information such as credit card numbers and SSN on web servers Do not store sensitive information such as credit card numbers and SSN on web servers Turn off all unnecessary services and block any unused ports Turn off all unnecessary services and block any unused ports

Application & Database Security Application server should shield that database server from direct contact with web servers Application server should shield that database server from direct contact with web servers Database servers should be completely isolated from the internet and any other unsecure server Database servers should be completely isolated from the internet and any other unsecure server User passwords when retrieving sensitive information from the database server User passwords when retrieving sensitive information from the database server

Company Security Precautions Defense-in-depth strategies that use multiple, overlapping and mutually supportive systems Defense-in-depth strategies that use multiple, overlapping and mutually supportive systems Antivirus, firewall, and intrusion detection/prevention Antivirus, firewall, and intrusion detection/prevention Update software patches on public systems Update software patches on public systems Block possible harmful attachment exts. Block possible harmful attachment exts.

Security Strengthening Multi-layer protection approaches Multi-layer protection approaches Secret image authentication Secret image authentication Using hardware authentication (serial number) Using hardware authentication (serial number)

Amazon PayPhrase

Avoid Security Threats Do not provide passwords, account numbers, or other personal information through Do not provide passwords, account numbers, or other personal information through Do not trust links in s or on websites Do not trust links in s or on websites Check for the lock icon in the address bar of your browser Check for the lock icon in the address bar of your browser

Secure Your PC Maintain up-to-date antivirus, spyware and firewall protection Maintain up-to-date antivirus, spyware and firewall protection Keep your operating system and applications up-to-date with security patches Keep your operating system and applications up-to-date with security patches Avoid transaction at wireless hotspots Avoid transaction at wireless hotspots

Conclusion Introduction Introduction Definition Definition Security Challenges Security Challenges Security Issues Security Issues Security Practices Security Practices Common Threats Common Threats Protecting Yourself Protecting Yourself

Sources Al-Slamy, Nada. "E-Commerce security." IJCSNS International Journal of Computer Science and Network Security 8.5 (2008): 5. Print. Al-Slamy, Nada. "E-Commerce security." IJCSNS International Journal of Computer Science and Network Security 8.5 (2008): 5. Print. Browning, Bob. "Electronic Commerce Tutorial Part 1 - Web Developer's Journal." Web Developer's Journal - Tips on Web Page Design, HTML, Graphics and Development Tools. N.p., n.d. Web. 26 Feb Browning, Bob. "Electronic Commerce Tutorial Part 1 - Web Developer's Journal." Web Developer's Journal - Tips on Web Page Design, HTML, Graphics and Development Tools. N.p., n.d. Web. 26 Feb Ghosh, Anup K.. "Journal of Internet Banking and Commerce." ARRAY Development. N.p., n.d. Web. 26 Feb Ghosh, Anup K.. "Journal of Internet Banking and Commerce." ARRAY Development. N.p., n.d. Web. 26 Feb "Computer Laboratory Security Group: Banking security." The Computer Laboratory. N.p., n.d. Web. 25 Feb