By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INE1020: Introduction to Internet Engineering 6: Privacy and Security Issues1 Lecture 9: E-commerce & Business r E-Commerce r Security Issues m Secure.
Supporting Technologies III: Security 11/16 Lecture Notes.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Public Key Encryption.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Network Security Celia Li Computer Science and Engineering York University.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Web Security.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Using SSL – Secure Socket Layer
12 E-Commerce Overview.
Electronic Payment Security Technologies
E-business and Network Security
Presentation transcript:

By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security

Main Points Web Security Threats Cryptography Encryption and Decryption SSL Digital Certificates

Introduction Even though online shopping has become largely accepted by most segments of the public, many people are wary of the security of the Internet. The explosive growth of the Internet has attracted countless thieves seeking to take advantages of weakness in the retail realm. Stolen customer data is extremely valuable to thieves and very costly to e-business that fail to protect their shopper's personal information.

Server Client Intranet Internet Extranet Communication Channels

BrowserRouter Server Router Hacker Sniffer Web Security Threats

BrowserRouter Server Router Hacker FAKE Server Cont.

Bank Katie sends Order Form Katie’s Bank CD Store Merchant’s Bank ISP Online CD Store CD Warehouse Web Server Internet Payment Network Katie’s order Order printed at CD warehouse CD arrives 2-3 days after order is received Typical B2C Transaction

ISP Online CD Store CD Warehouse Web Server Katie A Tapping line B Sniffer at ISP C Sniffer on Internet backbone E Breaking into store database D Internet Backbone Web Security Threats in B2C

What are the threats in E-commerce Security threats A to D can be handled by providing secure transmission - cryptographic methods Threat E and similar types managed by access control methods

Security Issues E-business security issues from customer (user) side: Is the web site owned and operated by trusted company? (Authentication) Is the form and the page contain malicious codes? (Privacy) Will the web site share my information to others? (Privacy) E-business security issues from the merchant (company) side: Will the customer attempt to break into the web site (server) or alter it? (Authorization, Integrity) Will the customer attempt to disrupt the web site so it will not be available to others? (Availability)

Cont. E-business issues from customer and merchant: Is network connection free from sniffers? (Privacy) Is the information sent back and forth between website and customer modified? (Integrity)

Cryptography To secure a house, keys are used to lock the doors It is assumed that an intruder can not easily obtain a copy of the key and enter the house o The intruder could search for all the keys in the world and try them one at a time, but this would take a long time Computer security uses a similar system ( symmetric key and public key cryptography) to secure messages passed between computers

Cryptography What is cryptography? It is the lock and key combination that prevents a non-key holder from decrypting a secret message What is most important is the strength of the lock and the number of possible keys

Cryptography To describe these cryptographic systems the following terms must first be defined: o A key is used in conjunction with a cipher to encrypt or decrypt a message. A key is simply a number (usually a binary number)‏ o A cipher is an algorithm used to encrypt a message o Ciphertext is the encrypted message o Plaintext is the unencrypted message

Cryptography Since a key is a binary number, a 56 bit key has about a quadrillion different key combinations Traditionally, a key length of 56 bits was considered secure since: o If one million keys were tried each second then it would take 1000 years to break the ciphertext However, due to increases in computing power a 56 bit key can now be broken in just 24 hours As a result key lengths of 128 bits or more are typical

Encryption and Decryption Encryption Overview o Plain text is converted to cipher text by use of an algorithm and key.  Algorithm is publicly known  Key is held private Two main categories of cryptography: 1.Symmetric key encryption single key is used to encrypt and decrypt information 2.Public Key encryption two keys are used: one for encryption (public key) and one for decryption (private key)‏

Encryption “The quick brown fox jumps over the lazy dog” “AxCv;5bmEseTfid3)f GsmWe#4^,sdgfMwir3 “The quick brown fox jumps over the lazy dog” Decryption Plain-text inputPlain-text output Cipher-text Same key (shared secret) Symmetric Key Encryption

“The quick brown fox jumps over the lazy dog” “Py75c%bn&*)9|fDe^b dFg$5knvMd’rkvegMs ” “The quick brown fox jumps over the lazy dog” Clear-text inputClear-text output Cipher-text Different keys Recipient’s public key Recipient’s private key private public EncryptionDecryption Public key Encryption

Technologies Technologies used to solve E-Business Security issues: Security Socket Layer (SSL) IPSec VPN Firewall Intrusion Detection Systems (IDS)

Network Security SSL provides a secure way for client and server to transmit confidential information.

Secure Socket Layer (SSL) advantages 1.Confidentiality  provides privacy for messages and stored data by hiding(encrypted)‏ 2.Message Integrity  provides assurance to all parties that a message remains unchanged 3.Authentication  Identifies the sender and receiver of a message  identifies the origin of a message  verifies the identity of person using a computer system

Cont. Digital Certificates (for authentication) One way of verifying the source of information is through a digital certificate A digital certificate is an attachment to a message which verifies the sender of the message It contains an encrypted message that o identifies the author o Indicates whether the certificate is valid or not

Cont. Other information on the digital certificate is: o The certificate’s owner’s identifying information, such as name, organization and address o The certificate owner’s public key o Dates between which the certificate is valid o Serial number of the certificate o Name of the certificate issuer o Digital signature of the certificate issuer

Cont. Digital certificates are issued by a certification authority (CA)‏ o To individuals or organizations o Appropriate proof of identity must be provided One of the oldest and best know certification authority is VeriSign