14
Cybersecurity in E-commerce Ecosystem: Practice from Alibaba Yuejin Du. Ph.D VP and Chief Security Expert of Alibaba Security 2017.04.24@Geneva

Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Cybersecurity in E-commerce Ecosystem:Practice from Alibaba

Yuejin Du. Ph.DVP and Chief Security Expert of Alibaba Security

2017.04.24@Geneva

Page 2: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Key Challenges for E-commerce Today

1. Tech. side: loopholes never can be fixed

2. Human side: weakest link always there

3. Opponent: highly organized and technologized, and globalized

Page 3: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Vulnerability: a war never ends2016: CVE:6435( 2017S1: 3442)

CNVD: 10822Increased 34% compare with 2015%

Page 4: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

The Truth is : nobody knows the truth• Common Vulnerability;

Product Vulnerability;

Vulnerability in your own

Apps. ……

• How and when do you

know yours? Esp. for SMEs?

• And, can you fix it or avoid

it

Page 5: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Humans are always the weakest link • Moles in sellers/merchants

• The ‘underground black economy’ send groups of their people to get jobs from sellers

• Bribe employees

• Moles in logistics provider• Photos taken of shipping slips

• Voluntary leaker of info• There is a market for buying and

selling of merchant info

¥100 billion

Page 6: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Our Opponents: big, organized, advanced, globalized

• Platforms of exploiting vulnerabilities

• Platforms of ‘account collision’ and commercial tools

• synthesizing info from multiplesources

• organizing the entire criminal chain: obtain info; sell info; supply chain of SIM cards for defrauding victims; phishing website construction; money laundry; etc.

1~2 million

Page 7: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Our countermeasure

1. Technology

2. Ecosystem building

3. Co-work with LEA

Page 8: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Some Technologies and Products

1. Trusted authentication and account safety

2. “City Moat”: the guardian of merchant

3. “Money Shield”: anti-fraud platform

4. ASRC and Threat Intelligence

5. DSMM: Data Security Maturity Model

Page 9: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Deferent methodaccording to risklevel

risk judgement

①risk ID

②risk Phone

③Risk device or

environment

biologicalfeature

①alive

②Voice feature

③movement

Photo IDverification

①OCR

②Verification

with public sector

service

③Face compare

Auto check

① photocopy?

② PS?

Keep it valid

① face

authentication

② face retrieval

Authentication

start measures Photo IDFeed back

Keep valid

证件照USER 成功

Multi-factor real-people-authentication

Page 10: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Money Shield APP

Anti-fraud open platform

Anti-fraud Police working Platform

‘money shield’ anti-fraud public welfare platform

• Recognize fraud number

and call

• Recognize fraud SMS and

phishing links

• Anti-virus and Trojans

• Risk environment alert

• Real user authentication

• Security SDK

• DLP

• Vulnerability scan

• OCR and content filtering

• TI

Page 11: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

11

Da

ta C

rea

tion

Level 5: Continuously Improving

Level 4: Quantitatively Controlled

Level 3: Well Defined

Level 2: Planned and

Tracked Level 1: Performed

Informally

Capability

Dimension

Le

ve

l 2: M

an

age

dD

ata

Sto

rage

Le

ve

l 2: M

an

age

dD

ata

Usage

Le

ve

l 2: M

an

age

dD

ata

Tra

nsm

issio

n

Le

ve

l 2: M

an

age

dD

ata

Sh

arin

g

Le

ve

l 2: M

an

age

dD

ata

Destru

ctio

n

Maturity

Level

Data Security Maturity Model

• Standards

• Practices

Page 12: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

Security Alliance of E-Commerce Ecosystem

ecosystem

Platform

LogisticsPartners

MerchantsSecurity

Company

ISV

Alliance

Operations

Product &

Services

Security

Standard

Integrity

Program

Threat

Intelligence

Sharing

SAEE

2017

Page 13: Cybersecurity in E-commerce Ecosystem · 4. ASRC and Threat Intelligence 5. DSMM: Data Security Maturity Model. Deferent method according to risk level risk judgement ... Anti-fraud

+Common environmentsecurity

We reported more than 350 clues of black underground economy in 2016. The police finally arrested about 2800 criminal suspects

LEA is the inevitable power

Your own securityLet criminals pay