28
WWW WWW Chapter 13 Understanding E-Security

Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

Embed Size (px)

Citation preview

Page 1: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

WWWWWW

Chapter 13

Understanding E-Security

Page 2: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

2WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

OBJECTIVES

• Security in Cyberspace

• Conceptualizing Security

• Designing for Security

• How Much Risk Can You Afford?

• Virus – Computer Enemy #1

• Security Protection and Recovery

Page 3: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

3WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

ABUSE & FAILURE

• Fraud

• Theft

• Disruption of Service

• Loss of Customer Confidence

Page 4: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

4WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

WHY INTERNET IS DIFFERENT?

Paper-Based Commerce Electronic Commerce

Signed paper Documents Digital Signature

Person-to-person Electronic via Web site

Physical Payment System Electronic Payment System

Merchant-customer Face-to-face Face-to-face Absence

Easy Detectability of modification Difficult Detectability

Easy Negotiability Difficult Negotiability

Page 5: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

5WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

SECURITY CONCERNS

• Confidentiality

• Authentication

• Integrity

• Access Control

• Nonrepudiation

• Firewalls

Page 6: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

6WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

INFORMATION SECURITY DRIVERS

• Global trading

• Availability of reliable security packages

• Changes in attitudes toward security

Page 7: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

7WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

PRIVACY FACTOR

0%

10%

20%

30%

40%

50%

Men Women Ages 18-29

Ages 30-49

Ages 50or older

Incomeless than$40,000

Surfers who agree with the statement: The Internet is a serious threat to privacy

Page 8: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

8WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

DESIGNING FOR SECURITY

• Adopt a reasonable security policy

• Consider Web security needs

• Design the security environment

• Authorizing and monitoring the system

Page 9: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

9WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

ADOPT A REASONABLE SECURITY POLICY

• Policy– Understanding the threats information must be

protected against to ensure• Confidentiality

• Integrity

• Privacy

– Should cover the entire e-commerce system• Internet security practices

• Nature and level of risks

• Procedure of failure recovery

Page 10: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

10WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

DESIGN THE SECURITY ENVIRONMENT

SECURITYCONSULTANT

Edit paymentsystem

CERTIFIEDWEBSITE DATABASE

CUSTOMERSERVICE

CERTIFIEDSTAFF

Verify ITStaff Integrity

Guidelines Password

Assignment

Authorized link

Verified Site

Test data

Exhibit - Logical procedure flow

Page 11: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

11WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

SECURITY PERIMETER

• Firewalls

• Authentication

• Virtual Private Networks (VPN)

• Intrusion Detection Devices

Page 12: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

12WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

AUTHORIZING & MONITORING SYSTEM

• Monitoring– Capturing processing details for evidence– Verifying e-commerce is operating within

security policy– Verifying attacks have been unsuccessful

Page 13: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

13WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

HOW MUCH RISK CAN YOU AFFORD?

• Determine specific threats inherent to the system design

• Estimate pain threshold

• Analyze the level of protection required

Page 14: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

14WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

KINDS OF THREATS/CRIMES

• Physically-related

• Order-related

• Electronically-related

Page 15: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

15WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

CLIENT SECURITY THREATS

• Why?– Sheer Nuisances– Deliberate Corruption of Files– Rifling Stored Information

• How?– Physical Attack– Virus– Computer-to-computer Attack

Page 16: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

16WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

SERVER SECURIY THREATS

• Web server with an active port

• Windows NT server, not upgraded to act as firewall

• Anonymous FTP service

• Web server directories that can be accessed and indexed

Page 17: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

17WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

HOW HACKERS ACTIVATE A DENIAL OF SERVICE

• Break into less-secured computers connected to a high-bandwidth network

• Installs stealth program which duplicate itself indefinitely to congest network traffic

• Specifies a target network from a remote location and activates the planted program

• Victim’s network is overwhelmed and users are denied access

Page 18: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

18WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

VIRUS – COMPUTER ENEMY #1

• A malicious code replicating itself to cause disruption of the information infrastructure

• Attacks system integrity, circumvent security capabilities and cause adverse operation

• Incorporate into computer networks, files and other executable objects

Page 19: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

19WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

TYPES OF VIRUSES

• Boot Virus– Attacks boot sectors of the hard drive

• Macro Virus– Exploits macro commands in software application

Page 20: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

20WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

VIRUS CHARACTERISTICS

• Fast– Easily invade and infect computer hard disk

• Slow– Less likely to detect and destroy

• Stealth– Memory resident – Able to manipulate its execution to disguise its

presence

Page 21: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

21WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

ANTIVIRUS STRATEGY

• Establish a set of simple enforceable rules

• Educate and train users

• Inform users of the existing and potential threats to the company’s systems

• Update the latest antivirus software periodically

Page 22: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

22WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

BASIC INTERNET SECURITY PRACTICES

• Password– Alphanumeric– Mix with upper and lower cases– Change frequently– No dictionary names

• Encryption– Coding of messages in traffic between the

customer placing an order and the merchant’s network processing the order

Page 23: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

23WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

SECURITY RECOVERY

• Attack Detection

• Damage Assessment

• Correction and Recovery

• Corrective Feedback

Page 24: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

24WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

FIREWALL & SECURITY

• Firewall– Enforces an access control policy between two

networks– Detects intruders, blocks them from entry,

keeps track what they did and notifies the system administrator

Page 25: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

25WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

WHAT FIREWALL CAN PROTECT

• E-mail services known to be problems

• Unauthorized external logins

• Undesirable material, e.g. pornography

• Unauthorized sensitive information

Page 26: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

26WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

WHAT FIREWALL CAN’T PROTECT

• Attacks without going through the firewall

• Weak security policy

• “Traitors” or disgruntled employees

• Viruses via floppy disks

• Data-driven attack

Page 27: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

27WWWWWW Awad –Electronic Commerce 2/e© 2004 Pearson Prentice Hall

SPECIFIC FIREWALL FEATURES

• Security Policy

• Deny Capability

• Filtering Ability

• Scalability

• Authentication

• Recognizing Dangerous Services

• Effective Audit Logs

Page 28: Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security

WWWWWW

Chapter 13

Understanding E-Security