1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Chapter 11 E-Commerce Security.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Cryptography and Network Security
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Chapter 11 E-Commerce Security
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 E-Commerce Security. © Prentice Hall Learning Objectives 1.Document the rapid rise in computer and network security attacks. 2.Describe.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Risks, Controls and Security Measures
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 11 E-Commerce Security. Electronic CommercePrentice Hall © Learning Objectives 1.Document the trends in computer and network security attacks.
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Chapter 8 Web Security.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 10 E-Commerce Security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Chapter 13 – Network Security
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
E-Commerce Security.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Information Security in Distributed Systems Distributed Systems1.
Chap1: Is there a Security Problem in Computing?.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Network Security Celia Li Computer Science and Engineering York University.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
E-COMMERCE SECURITY ELECTRONIC COMMERCE. E-Commerce Security Successful e-tailing requires addressing online security and privacy fears of your online.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
E-Commerce Infrastructure. Learning Objectives 1. Understand the major components of EC infrastructure. 2. Understand the importance and scope of security.
Chapter 8 E-Commerce Security. Objectives Understand the basic elements of EC security. Explain the basic types of network security attacks.
Pertemuan 20 Materi : Buku Wajib & Sumber Materi :
Presentation transcript:

1 Chapter 9 E- Security

Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from merchant’s server. (c) Merchant or customer is not who they claim to be.

Security requirements for e-commerce 3 Authentication – are parties to the transaction who they claim to be? Privacy and confidentiality – is transaction data protected? The consumer may want to make an anonymous purchase. Are all non- essential traces of a transaction removed from the public network and all intermediary records eliminated? Integrity – checks that the message sent is complete i.e. that it isn’t corrupted. Non-repudiability – ensures sender cannot deny sending message. Availability – how can threats to the continuity and performance of the system be eliminated?

Types of Threats and Attacks 4 Denial-of-service (DoS) attack: An attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources Distributed denial-of-service (DDoS) attack: A denial-of- service attack in which the attacker gains illegal administrative access to as many computers on the Internet as possible and uses these multiple computers to send a flood of data packets to the target computer

Types of Threats and Attacks (cont.) 5 Virus: A piece of software code that inserts itself into a host, including the operating systems, to propagate; it requires that its host program be run to activate it Worm: A software program that runs independently, consuming the resources of its host in order to maintain itself and is capable of propagating a complete working version of itself onto another machine Trojan horse: A program that appears to have a useful function but that contains a hidden function that presents a security risk

Managing EC Security 6 Security risk management: A systematic process for determining the likelihood of various security attacks and for identifying the actions needed to prevent or mitigate those attacks Phases of security risk management 1. Assessment Evaluate security risks by determining assets, vulnerabilities of their system, and potential threats to these vulnerabilities 2. Planning Goal of this phase is to arrive at a set of policies defining which threats are tolerable and which are not Policies also specify the general measures to be taken against those threats that are intolerable or high priority

Managing EC Security (cont.) 7 3. Implementation Particular technologies are chosen to counter high-priority threats First step is to select generic types of technology for each of the high priority threats 4. Monitoring Which measures are successful Which measures are unsuccessful and need modification Whether there are any new types of threats Whether there have been advances or changes in technology Whether there are any new business assets that need to be secured

Methods of securing EC 8 1. Authentication system: System that identifies the legitimate parties to a transaction, determines the actions they are allowed to perform, and limits their actions to only those that are necessary to initiate and complete the transaction 2. Access control mechanism: Mechanism that limits the actions that can be performed by an authenticated person or group 3. Passive tokens: Storage devices (e.g., magnetic strips) used in a two-factor authentication system that contain a secret code 4. Active tokens: Small, stand-alone electronic devices in a two factor authentication system that generate one-time passwords

Encryption Methods 9 Public key infrastructure (PKI): A scheme for securing e-payments using public key encryption and various technical components Private and public key encryption Encryption: The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it Plaintext: An unencrypted message in human-readable form Ciphertext: A plaintext message after it has been encrypted into a machine- readable form Encryption algorithm: The mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa

Encryption Methods (cont.) 10 Symmetric (private) key system Key: The secret code used to encrypt and decrypt a message Symmetric (private) key system: An encryption system that uses the same key to encrypt and decrypt the message Data Encryption Standard (DES): The standard symmetric encryption algorithm supported the NIST and used by U.S. government agencies until October 2, 2000 Rijndael: The new Advanced Encryption Standard used to secure U.S. government communications since October 2, 2000

Security Protocols 11 Secure Socket Layer (SSL): Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality Secure Electronic Transaction (SET): A protocol designed to provide secure online credit card transactions for both consumers and merchants; developed jointly by Netscape, Visa, MasterCard, and others

Securing EC Networks 12 Technologies for organizational networks Firewall: A network node consisting of both hardware and software that isolates a private network from a public network Packet-filtering routers: Firewalls that filter data and requests moving from the public Internet to a private network based on the network addresses of the computer sending or receiving the request Packet filters: Rules that can accept or reject incoming packets based on source and destination addresses and the other identifying information Application-level proxy: A firewall that permits requests for Web pages to move from the public Internet to the private network

Securing EC Networks (cont.) 13 Virtual private network (VPN): A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network Protocol tunneling: Method used to ensure confidentiality and integrity of data transmitted over the Internet, by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address