1 CS5038 The Electronic Society Security and Crime Online Lecture Outline Types of Attacks Security Problems Major security issues in online systems Security.

Slides:



Advertisements
Similar presentations
CS5038 The Electronic Society
Advertisements

1 CS5038 The Electronic Society Security 1: Security and Crime Online Well begin with a look at whats out there. In Security 2, well think about it all.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Prentice Hall, Chapter 13 E-Commerce Security.
FIT3105 Security and Identity Management Lecture 1.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Internet Security for Small & Medium Business Week 6
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Prentice Hall, E-Commerce Security Notes based on Laudon&Laudon.
C8- Securing Information Systems
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Telecommunications Networking II Lecture 41a Information Assurance.
Hurdles in implementation of cyber security in India.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Chap1: Is there a Security Problem in Computing?.
Security and Ethics Safeguards and Codes of Conduct.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 CS5038 The Electronic Society Security 1: Security and Crime Online We’ll begin with a look at what’s out there. In Security 2, we’ll think about it.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Securing Information Systems
Pertemuan 20 Materi : Buku Wajib & Sumber Materi :
Chapter 17 Risks, Security and Disaster Recovery
Chapter 11 crime and security in the networked economy
Chapter 13 E-Commerce Security Prentice Hall, 2002.
Securing Information Systems
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

1 CS5038 The Electronic Society Security and Crime Online Lecture Outline Types of Attacks Security Problems Major security issues in online systems Security Risk Management Security Technologies Government Intrusion Government Power

2 Attack Sophistication Vs. Intruder Knowledge Source: Special permission to reproduce the CERT ©/CC graphic © 2000 by Carnegie Melon University, in Electronic Commerce 2002 in Allen et al. (2000).

3 Types of Attacks Non-technical – phone or employee posing as administrator Buffer overflow – hide code at the end of a long entry DNS spoofing – change DNS tables or router maps Sniffing – listen to all packets on network Malicious code:  Viruses – propagate locally  Worms - propagate between systems  Macro viruses and macro worms  Trojan horses – e.g. posing as a game

4 Security Problems Example: Denial of service (DOS) – purchases are not made, ads are not seen  Security and ease of use are antithetical to one another  E.g. passwords, electronic wallets/credit card  Security takes a back seat to market pressures  E.g. trying to hurry the time to market  Security systems are only as strong as their weakest points  Security of a site depends on the security of the whole Internet – DOS,  Knowledge of vulnerabilities is increasing faster than it can be combated - Hackers share secrets and write tools  Flaws in ubiquitous applications – Outlook, Word  Underreporting: in %; in % of organisations had serious attacks reported to law enforcement  Why might a company not report a crime?

5 Security Concerns User’s perspective  Is Web server owned and operated by legitimate company?  Web page and form contain some malicious code content?  Will Web server distribute user’s information to another party? (or allow to be stolen) Company’s perspective  Will the user attempt to break into the Web server or alter the site?  Will the user try to disrupt the server so it isn’t available to others? Filling a form at a simple marketing site: Both perspectives  Is network connection free from eavesdropping?  Has information sent back and forth between server and browser been altered?

6 Major security issues in online systems Privacy or Confidentiality  trade secrets, business plans, health records, credit card numbers, records of web activity Authentication – for Web page,  Something known – password  Something possessed – smartcard  Something unique – signature, biometrics Integrity – protect data from being altered or destroyed  Financial transaction Non-repudiation – not denying that you bought something PAIN – for payment systems

7 Security Risk Management Definitions involved in risk management  Assets—anything of value worth securing  Threat—eventuality representing danger to an asset  Vulnerability—weakness in a safeguard Risk Assessment  Determine organizational objectives  Cannot safeguard against everything – limit to satisfying objectives  Example: if Web site is to service customer complaints then top priority is to ensure no disruption – rather than protect data  Inventory assets – value and criticality of all assets on network  Delineate threats – hackers, viruses, employees, system failure  Identify vulnerabilities -  Quantify the value of each risk  e.g. Risk = Asset x Threat x Vulnerability (Symantec.com)

8 Security Technologies Firewall:  Like a bouncer, has rules to determine if data is allowed entry Virtual Private Network (VPN)  Encryption—scramble communications Intrusion Detection Systems (IDS)  Automatically review logs of file accesses and violations  Analyse suspicious activity for known patterns of attack

9 Government Protecting Citizens Identity Cards:  The national Registration Act: outbreak of World War II  Help police know if citizens rightfully belonged to the UK  After War: member of public charged with not producing ID card when requested to by a policeman.  Case went to appeal:  Lord Chief Justice Lord Goddard “This Act was passed for security purposes and not for the purposes for which, apparently, it is now sought to be used”  Ruling underlined public’s disquiet with the way that ID cards had slowly become a compulsory feature of everyday life in the UK  Cards repealed in 1952 Based on essay by: Steven McGhee

10 Government Protecting Citizens  Attempts at reintroducing ID cards made at various times over the intervening years  9/11 attacks  ID cards start to look more likely  Compulsory for foreign nationals resident in the UK from late 2008  Voluntary for British nationals from 2009 onwards  Compulsory for workers in certain high-security professions (airport)  Arguments put forward by the Government:  Fight against ID theft  Prevention of illegal immigration  Fight against terrorism  Reduce benefit fraud  “help safeguard civil liberties” (in direct contrast to critics) James Hall (chief executive of the Passport and Identity Cards service)

11 A law abiding person has nothing to fear Why do we need privacy anyway?  Unpopular political beliefs  might lose job or promotion  Someone who has a disease which people fear  A person who is homosexual but their family does not know  A teenage girl secretly visiting her boyfriend of a different race to her family  Someone seeking to change job (needs to attend interviews)  A woman scouting out places to go to get away from her violent partner  Someone going to Alcoholics Anonymous or drugs rehabilitation sessions  Someone going to church, synagogue or mosque who fears the scorn of friends, colleagues or family  Someone attending classes of religious instruction prior to converting to another religion (fears vengeance)  A son or daughter visiting an estranged parent without the knowledge of the parent they live with.  An ex-criminal seeking to go straight who must meet his probation officer or register with the police. (there have been some examples with kids)  Authorised people may abuse access to information  Information not secure

12 Quis custodiet ipsos custodes? Who will watch the watchmen? problem posed by Plato in The Republic "Power tends to corrupt, and absolute power corrupts absolutely. Great men are almost always bad men.“ Lord Acton "Unlimited power is apt to corrupt the minds of those who possess it" William Pitt, the Elder

13 Separation of Powers - Trias Politica Model was first developed in ancient Greece Came into widespread use by the Roman Republic  as part of the uncodified Constitution of the Roman Republic. State is divided into branches or estates, each with separate and independent powers and areas of responsibility. Montesquieu: French Enlightenment political philosopher  "the independence of the judiciary has to be real, and not apparent merely“  Judiciary most important of powers  independent and unchecked  also considered the least dangerous

14 Separation of Powers – Need More? The Popular The Bureaucracy The Media The Financial Oligarchy?

15 Summary Attack Sophistication Vs. Intruder Knowledge Types of Attacks – non-technical, buffer overflow, malicious code Security Problems - ease of use, market pressure, weak links Security Concerns – e.g. filling a form Major security issues in online systems - PAIN Security Risk Management – assessment, planning, implementation, monitoring Security Technologies – firewall, VPN, IDS Government Protecting Citizens