Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Chapter 12 Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Risks, Controls and Security Measures
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 3: September 11, 2003 Internet Basics, continued Acknowledgments: R. Wang and J.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CPSC156: The Internet Co-Evolution of Technology and Society Lecture 2: January 18, 2007 Internet Basics, continued Acknowledgments: R. Wang and J. Rexford.
Chapter 20: Network Security Business Data Communications, 4e.
Chapter 19 Security.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Securing Information Systems
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 16 IT Controls Part II: Security and Access
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Chapter 21 Distributed System Security Copyright © 2008.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
CHAPTER 9 Sniffing.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
BY GAWARE S.R. DEPT.OF COMP.SCI
Systems Design Chapter 6.
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton

 LAN (Local Area Networks)  WAN (Wide Area Networks  Internet/Internet-Works NETWORKS: TYPES

Each machine is addressed by a 32-bit integer: IP address We will tell you what “IP” is later Ran out of numbers and there are schemes to extend An IP address is: Written down in a “dot notation” for “ease” of readings such as Consists of a network address and a host ID IP addresses are the universal IDs that are used to name everything For convenience, each host also has a human-friendly host name: for example “ ” is “concave.cs.yale.edu” Question: how do you translate names into IP addresses? IP addresses and Hosts Names

Domain Hierarchy Initially name-to-address mapping was a flat file mailed out to all the machines on the internet. Now we have a hierarchical name space, just like a UNIX file system tree. Top level names: historical influence: heavily US centric, government centric, and military centric view of the world. educomgovmilorgnetukfr Yale MIT Cisco... yahoo Math CS Physics Cyndra netra

DNS Zones and Name Servers Divide up the name hierarchy into zones Each zone corresponds to one or more name servers under a single administrative control Yale MIT Cisco... yahoo Math CS Physics Cyndra netra educomgovmilorgnetukfr

Network Protocols LANs Ethernet Token ring WAN TCP/IP (4 layer) OSI model (7 layer)

Encryption systems translate data into a secret code. Encryption systems include 4 main components: Plaintext: the unencrypted message An encryption algorithm: that works like the locking mechanism to a safe A key that works like the safe’s combination Ciphertext is produced from the plaintext message by the encryption function. Decryption is the same process in reverse (like a modulation/demodulation), but it doesn’t always use the same key or algorithm. Plaintext results from decryption. Encryption

The two main encryption techniques now in use: Symmetric encryption in which both sender and receiver use the same key. Asymmetric or public key encryption, which uses two separate keys, called public and private keys. Encryption Techniques

Symmetric or private key encryption, uses the same algorithm and key to both encrypt and decrypt a message. Historically, this is the most common encryption technique. Since the key must be distributed, however, it is vulnerable to interception. This is an important weakness of symmetric key encryption. DES uses symmetric encryption. Symmetric Encryption

A second popular technique is asymmetric or public key encryption (PKE). PKE is called asymmetric since it uses two different “one way” keys: a public key used to encrypt messages, and a private key used to decrypt them. PKE greatly reduces the key management problem since the private key is never distributed. PGP (pretty good privacy) is a popular form of PKE available as shareware. Asymmetric or Public Key Encryption

Authentication is the security process of verifying that a user is who he or she says they are. Passwords are the most common type of authentication. Digital signatures are now gaining popularity for authenticating transmitted information. Authentication

Digital signatures take the place of ordinary signatures in online transactions to prove that the sender of a message is who he or she claims to be. When received, the digital signature is compared with a known copy of the sender’s digital signature. Digital signatures are also sent in encrypted form to ensure they have not been forged. Authentication: Digital Signatures

Secure Sockets Layer (SSL) is a standard for secure interactions use on the Web. SSL, uses a combination of private key encryption (using a one-time session key) and digital signatures to enhance the security of transmission. Secure servers protect the privacy of the data they send and receive through encryption. Secure servers

 LAN Linking Devices and Systems  Multiplexer  Hubs  Passive  Manageable  Switched  Routers  Switches  Gateways  Bridges NETWORKS: CONNECTING DEVICES

 Electronic commerce  Types  B2C  B2B  C2C  Components  Electronic payment systems  SSL  SET  S-HTTP ELECTRONIC COMMERCE

 Risks  Internal  Accidents / system failures  Ineffective accounting  Malicious activities  Fraud  External  Intruders Hackers Cracker Script kiddies  Viruses  Cyberterrorism / cyber-crime ELECTRONIC COMMERCE

 Controls  Policies and procedures  SDLC techniques  Anti-virus systems  Message sequence numbers  Logs  Monitoring systems CONTROLLING E-COMMERCE

 Access control systems  Call-back systems  Challenge-response systems  Multifaceted password systems  Biometrics  Firewalls  IDS  Misuse detection vs. anomaly detection  Network-based vs. host-based systems  Passive system vs. reactive systems  Controlling DoS attacks CONTROLLING E-COMMERCE

 Verify the security and integrity of transactions  Can detect and correct message loss  Can prevent and detect illegal access, internally and externally  Will render useless any data captured  Verify that backup procedures are sufficient  Determine:  All EDI and electronic transactions are authorized, validated, and compliant with SLA  No unauthorized access to databases  Authorized partners only have access to approved data  Adequate controls are in place to ensure a complete audit trail for electronic transactions AUDIT OBJECTIVES

 Backup control for networks  Transaction validation  Access control:  Tests of validation control  Tests of audit trail controls AUDIT OBJECTIVES

 Select of sample of messages from transaction log and verify their integrity  Review the message transaction logs to verify that all messages were received in proper sequence  Test the operation of features such as call- back  Review security procedures governing data  Verify any encryption process by sending test messages  Review the adequacy of firewalls AUDIT PROCEDURES