Security Threats to Electronic Commerce

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Threats and Protection Mechanisms
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Let’s Talk About Cyber Security
Chapter 17: WEB COMPONENTS
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Chapter 5 Security Threats to Electronic Commerce
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Unit 18 Data Security 1.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Electronic Commerce COMP3210 Dr. Paul Walcott 08/11/04 The Department of Computer Science Mathematics and Physics, University of the West Indies, Cave.
CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Chapter 10: Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Chapter 10: Electronic Commerce Security
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Security Threats to Electronic Commerce
Computer Security and Penetration Testing
Threats and Attacks Principles of Information Security, 2nd Edition
E-Commerce: The Second Wave Fifth Annual Edition
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Data Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.
Chapter 5 Security Threats to Electronic Commerce
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Web Security Chapter 6. Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates.
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Chapter 7: E-Commerce Security and Payment system
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
1 Java Applets Java: platform-independent programming language – Provides Web page active content – Server sends applets with client-requested pages –
Malicious Software.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Chapter 10: Electronic Commerce Security
Security on the Internet and the Web
Chapter 40 Internet Security.
Chapter 5 Electronic Commerce | Security
Chapter 5 Electronic Commerce | Security
Security.
Presentation transcript:

Security Threats to Electronic Commerce

Learning Objectives In this chapter, you will learn about: Important computer and electronic commerce security terms The reason that secrecy, integrity, and necessity are three parts of any security program The roles of copyright and intellectual property and their importance Threats and countermeasures to eliminate or reduce threats -ALM AY-

Learning Objectives Specific threats to client machines, Web servers, and commerce servers Methods that you can use to enhance security in back office products The way in which security protocols help plug security holes The roles that encryption and certificates play in assurance and secrecy -ALM AY-

Security Overview Computer security is the protection of assets from unauthorized access, use, alteration, or destruction. Two types of security: Physical security Logical security -ALM AY-

Types of Security Physical security includes tangible protection devices such as alarms and guards. Protection of assets using nonphysical means is called logical security. -ALM AY-

Implication of Threat Any act or object that poses a danger to computer assets is known as a threat. Countermeasure is a procedure that recognizes, reduces, or eliminates a threat. -ALM AY-

Computer Security Classification Three computer security categories: Secrecy Integrity Necessity Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source. Integrity refers to preventing unauthorized data modification. Necessity refers to preventing data delays or denials. -ALM AY-

Copyright and Intellectual Property Copyright is the protection of expression. Intellectual property is the ownership of ideas and control over the tangible or virtual representation of those ideas. U.S. Copyright Act of 1976, in SL ? (www.icta.lk) Copyright Clearance Center provides copyright information -ALM AY-

Security Policy and Integrated Security A security policy is a written statement describing: Which assets to protect and why to protect Who is responsible for that protection Which behaviors are acceptable and which are not -ALM AY-

Elements of a Security Policy Authentication Access control Secrecy Data integrity (reliability) Audit -ALM AY-

Intellectual Property Threats Copyright infringements on the Web occur because users are ignorant of what they can and cannot copy. The Copyright Website tackles the issues of copyright and newsgroup postings and fair use. -ALM AY-

Music Online Music industry better illustrates the copyright and intellectual property issues. Napster changed the way music is delivered. The act of ripping a song without proper permission is a copyright violation. -ALM AY-

Domain Names Issues of intellectual property rights on Internet Domain Names: Cyber squatting Name changing Name stealing -ALM AY-

Cyber squatting Cybersquatting is the practice of registering a domain name that is the trademark of another person or company in the hopes that the owner will pay huge amounts of money to acquire the URL. On November 29, 1999, the U.S. Anti-cyber-squating Consumer Protection Act was signed into law. -ALM AY-

Name Changing Name changing occurs when someone registers purposely misspelled variations of well-known domain names. The practice of name changing is annoying to affected online businesses and confusing to their customers. -ALM AY-

Name Stealing Name stealing occurs when someone changes the ownership of the domain name assigned to the site to another site and owner. Once domain name ownership is changed, the name stealer can manipulate the site. -ALM AY-

Electronic Commerce Threats There are three types of electronic commerce threats: Client threats Communication channel threats Server threats -ALM AY-

Client Threats Web pages were mainly static. The widespread use of active content has changed the function of Web pages. Sources of client threats: Active content Java, Java Applets, and JavaScript ActiveX Controls Graphics, Plug-Ins, and E-mail Attachments -ALM AY-

Active Content Active content refers to programs that are embedded transparently in Web pages and that cause action to occur. The best-known active content forms are Java applets, ActiveX controls, JavaScript, and VBScript. Also include graphics and Web browser plug-ins. -ALM AY-

Active Content A Trojan horse is a program hidden inside another program or Web page that masks its true purpose. A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computer. Malicious cookie can destroy files stored on client computers. -ALM AY-

Java Java adds functionality to business applications and can handle transactions and a wide variety of actions on the client computer. Java sandbox confines Java applet actions to a set of rules defined by the security model. Java is a very powerful development language. Untrusted applets should not be allowed to access all of this power. The Java sandbox restricts applets from performing many activities. These rules apply to all untrusted Java applets. -ALM AY-

Java Applets Java applets that are loaded from a local file system are trusted. Trusted applets have full access to system resources on the client computer. Signed Java applets contain embedded digital signatures from a trusted third party, which are proof of the identity of the source of the applet. -ALM AY-

JavaScript JavaScript is a scripting language to enable Web page designers to build active content. JavaScript can invoke privacy and integrity attacks by executing code that destroys your hard disk. JavaScript programs do not operate under the restrictions of the Java sandbox security model. -ALM AY-

ActiveX Controls ActiveX is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks. ActiveX controls run only on computers running Windows and only on browsers that support them. Because ActiveX controls have full access to your computer, they can cause secrecy, integrity, or necessity violations. **ActiveX is a set of technologies that enable software components to interact with one another in a networked environment, regardless of the language in which the components were created. An ActiveX control is a user interface element created using ActiveX technology. ActiveX controls are small, fast, and powerful, and make it easy to integrate and reuse software components. -ALM AY-

Graphics, Plug-Ins, and E-mail Attachments Graphics, browser plug-ins, and e-mail attachments can harbor executable content. The code embedded in the graphic could be a potential threat. Plug-ins performs their duties by executing commands buried within the media they are manipulating. E-mail attachments provide a convenient way to send nontext information over a text-only system. -ALM AY-

Virus A virus is software that attaches itself to another program and can cause damage when the host program is activated. Worm viruses replicate themselves on other machines. A macro virus is coded as a small program and is embedded in a file. The term steganography describes information that is hidden within another piece of information. -ALM AY-

Communication Channel Threats The Internet is not at all secure. Messages on the Internet travel a random path from a source node to a destination node. Internet channel security threats include: secrecy integrity necessity -ALM AY-

Secrecy Threats Secrecy is the prevention of unauthorized information disclosure. Privacy is the protection of individual rights to nondisclosure. Secrecy is a technical issue requiring sophisticated physical and logical mechanism. Privacy protection is a legal matter. -ALM AY-

Integrity Threats An integrity threat exists when an unauthorized party can alter a message stream of information. Cyber vandalism is an example of an integrity violation. Masquerading or spoofing is one means of creating havoc on Web sites. -ALM AY-

Necessity Threats The purpose of a necessity threat is to disrupt normal computer processing or to deny processing entirely. Necessity threat is also known as a delay, denial, or denial-of-service threat (DOS). eBay faced the denial-of-service attack in early 2000. -ALM AY-

Server Threats Servers have vulnerabilities that can be exploited to cause destruction or to acquire information illegally. Server threats include: Web server threats Database threats Common gateway interface threats Other programming threats -ALM AY-

Web Server Threats Setting up a Web server to run in high-privilege status can lead to a Web server threat. The secrecy violation occurs when the contents of a server’s folder names are revealed to a Web browser. The W3C Threat Document provides information about server security. Click to see Figure: -ALM AY-

-ALM AY-

Database Threats Databases connected to the Web could damage a company if it were disclosed or altered. Anyone obtains user authentication information can masquerade as a legitimate user. The Database threats resource center describes threats to database systems. Click to see Figure 5-14: -ALM AY-

-ALM AY-

Common Gateway Interface Threats Because CGIs are programs, they present a security threat if misused. CGI scripts can be set up to run with high privileges, which causes a threat. CGI programs or scripts can reside about anywhere on the Web server, they are hard to track down and manage. -ALM AY-

Other Programming Threats Another serious Web server attack can come from programs executed by the server. Buffer overflows can have moderate to very serious security consequences. A mail bomb is the attack when thousands of people send a message to a particular address. Click to see Figure 5-15: -ALM AY-

-ALM AY-

CERT DARPA created the Computer Emergency Response Team (CERT) Coordination Center to be located at Carnegie Mellon University. CERT posts “CERT alerts” to inform the Internet community about recent security events. Click to see Figure 5-16: -ALM AY-

-ALM AY-