1 E-business Security and Control 2 Opening Case: Visa 10 commandments for online merchants – Maintaining a network firewall – Keeping security patches.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Chapter 9 E-Security. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security Designing for Security.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Ethics, Privacy and Information Security
1 Pertemuan 10 Membuat dan mengelola resiko dan kriminalitas sistem informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Lecture 1: Overview modified from slides of Lawrie Brown.
Security, Privacy, and Ethics Online Computer Crimes.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Risks, Controls and Security Measures
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Information System Security and Control
Information Systems Security Operational Control for Information Security.
Types of Electronic Infection
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
CONTROLLING INFORMATION SYSTEMS
Securing Information Systems
Information Systems Security
Security Issues in Information Technology
CS457 Introduction to Information Security Systems
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
Information and Network Security
Securing Information Systems
Planning and Security Policies
INFORMATION SYSTEMS SECURITY and CONTROL
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

1 E-business Security and Control

2 Opening Case: Visa 10 commandments for online merchants – Maintaining a network firewall – Keeping security patches up to date – Encrypting stored data – Restricting data access on the basis of need to know – Using updated antivirus software, etc.

3 Threat of Accidents and Malfunctions

4 Figure 13.1

5 Operator error Hardware malfunction Software bugs Data errors Accidental disclosure of information Damage to physical facilities Inadequate system performance Liability for system failure

6 Threat of Computer Crime

7 Figure 13.2

8 Theft Theft of software and equipment Unauthorized use of access codes and financial passwords Theft by entering fraudulent transaction data Theft by stealing or modifying data Internet hoaxes for illegal gain Theft by modifying software

9 Sabotage and Vandalism Trap door – A set of instructions that permits a user to bypass the computer systems security measures Trojan horse – A program that appears to be valid but contains hidden instructions that can cause damage

10 Logic bomb – A type of Trojan horse set to activate when a particular condition occurs Virus – A special type of Trojan horse that can replicate itself and spread Denial of service attack – Sabotaging a Web site by flooding it with incoming messages

11 Factors that Increase the Risks The nature of complex systems Human limitations Pressures in the business environment

12 Methods for Minimizing Risks Controlling system development and modifications – Software change control systems Providing security training – Physical access controls

13 Controlling Access to Data, Computers, and Networks Guidelines for manual data handling Access privileges Access control based on what you know – Password – Password schemes Access control based on what you have Access control based on where you are Access control based on who you are

14 Controlling incoming data flowing through networks and other media virus protection – Commercially available virus protection products – Firewall – Firewall software that inspects each incoming data packet, and decides whether it is acceptable based on its IP address

15 Figure 13.7

16 Making the Data Meaningless to Unauthorized Users Public key encryption – encryption method based on two related keys, a public key and a private (secret) key – Also used to transmit the secret key used by the Data Encryption Standard (DES) – Digital signatures – use public key encryption to authenticate the sender of a message and the message content

17 Figure 13.8

18 Controlling Traditional Transaction Processing Data preparation and authorization Data validation Error correction Backup and recovery

19 Maintaining Security in Web-Based Transactions Public key infrastructure (PKI) Public key infrastructure (PKI) – Certification authority (CA) – Certification authority (CA) – a company that issues digital certificates Computer-based records that identify the CA, identify the sender that is being verified, contain the senders public key, an is digitally signed by the CA

20 Transaction Privacy, Authentication, Integrity, and Nonrepudiation Web transactions are encrypted using the Secure Socket Layer (SSL) protocol – Encrypts the transmission using a temporary key generated automatically based on session information Transaction authentication – the process of verifying the identity of the participants in a transaction

21 Transaction integrity – ensuring that information is not changed after the transaction is completed Nonrepudiation – ensuring that neither party can deny that the transaction occurred

22 Difficulties With Security Methods for Web Transactions Secure Electronic Transaction (SET) method: – Proposed by a consortium of credit card companies – More secure than SSL – Costly, and very slow adoption rate

23 Motivating Efficient and Effective Operation Monitoring information system usage – Business process performance – Information system performance – Unusual activity Charging users to encourage efficiency – Chargeback systems try to motivate efficient usage by assigning the cost of information systems to the user departments

24 Auditing the Information System Auditing ensures that financial operations are neither misrepresented nor threatened due to defective procedures or accounting systems Auditing around the computer vs. auditing through the computer

25 Preparing for Disasters Disaster plan – a plan of action to recover from occurrences that shut down or harm major information systems

Major categories of security exposures within IT/IS environment: - Acts of God? Such as fire, floods, hurricanes and other natural catastrophes etc… -Mechanical failure: as when the H/W, S/W corrupts data, disc/tape is damaged etc…. -Human carelessness: data entry errors, accident during testing, mislaid/physical damage disc/tape Etc….

Major categories of security exposures within IT/IS environment (Contd…) -Malicious damage: such as sabotage, a malicious user or programmer etc…. -Crime: embezzlement, industrial espionage, employees selling secrets etc…. -Invasion of privacy – may be due to casual curiosity, malicious invasion of privacy, Obtaining data by a competing org. etc….

DISASTER CATEGORIES The fundamental hurdles to overcome when planning for disaster recovery is to realize that the seemingly large variety of possible disasters can actually be reduced to a manageable number. In point of fact, all disasters can be grouped into one or more of only THREE categories. These are: - loss of information, - loss of access - loss of personnel.

Introduction to Risk Analysis There are a number of distinct approaches to risk analysis. However, these essentially break down into two types: -quantitative Risk Analysis -Qualitative Risk Analysis

Quantitative Risk Analysis this approach employs two fundamental elements; 1)the probability of an event occurring and 2)the likely loss should it occur. it also uses a single figure produced from these elements - This is called the 'Annual Loss Expectancy (ALE)' or the 'Estimated Annual Cost (EAC)'. -This is calculated for an event by simply multiplying the potential loss by the probability.

31 Qualitative Risk Analysis (The relational model)

Qualitative Risk Analysis This is by far the most widely used approach to risk analysis. Probability data is not required and only estimated potential loss is used. Most qualitative risk analysis methodologies make use of a number of interrelated elements: a) THREATS These are things that can go wrong or that can 'attack' the system. Examples might include fire or fraud. Threats are ever present for every system.

Introducing Risk Analysis b) VULNERABILITIES These make a system more prone to attack by a threat or make an attack more likely to have some success or impact. For example, for fire a vulnerability would be the presence of inflammable materials (e.g. paper). c) CONTROLS These are the countermeasures for vulnerabilities. There are four types: –Deterrent controls reduce the likelihood of a deliberate attack

Introducing Risk Analysis (Contd..) CONTROLS (Continued from the previous page) –Preventative controls protect vulnerabilities and make an attack unsuccessful or reduce its impact –Corrective controls reduce the effect of an attack –Detective controls discover attacks and trigger preventative or corrective controls

35 (The Information Security Process)

36 Information Security Architecture