E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection
description
Transcript of E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection
E-Commerce Security and Fraud Protection
Learning Objectives1. Understand the importance and scope of security of
information systems for EC.2. Describe the major concepts and terminology of EC
security.3. Learn about the major EC security threats,
vulnerabilities, and technical attacks.4. Understand Internet fraud, phishing, and spam.5. Describe the information assurance security
principles.6. Identify and assess major technologies and methods
for securing EC access and communications.
9-2Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Learning Objectives7. Describe the major technologies for protection of EC
networks.8. Describe various types of controls and special
defense mechanisms.9. Describe consumer and seller protection from fraud.10.Describe the role of business continuity and disaster
recovery planning.11.Discuss EC security’s enterprisewide
implementation issues.12.Understand why it is not possible to stop computer
crimes.
9-3Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Information Security Probleminformation security
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction
9-4Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Information Security ProblemTHE DRIVERS OF EC SECURITY
PROBLEMSThe Internet’s Vulnerable Design
Domain Name System (DNS)Translates (converts) domain names to their numeric IP addresses
IP addressAn address that uniquely identifies each computer connected to a network or the Internet
The Shift to Profit-Induced Crimes
9-5Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Internet Architecture
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-6
The DNS System
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-7
The Information Security ProblemInternet underground economy
E-markets for stolen information made up of thousands of websites that sell credit card numbers, social security numbers, other data such as numbers of bank accounts, social network IDs, passwords, and much more keystroke logging (keylogging)
A method of capturing and recording user keystrokesThe Dynamic Nature of EC Systems and the Role of
InsidersWHY IS AN E-COMMERCE SECURITY STRATEGY
NEEDED?The Computer Security Strategy Dilemma
9-8Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Basic E-Commerce Security Issues and Landscape
riskThe probability that a vulnerability will be known and used
social engineeringA type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network
spamThe electronic equivalent of junk mail
9-9Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Basic E-Commerce Security Issues and Landscape
EC Security Requirements authentication
Process to verify (assure) the real identity of an individual, computer, computer program, or EC website
authorizationProcess of determining what the authenticated entity is allowed to access and what operations it is allowed to perform
Auditing Availability nonrepudiation
Assurance that online customers or trading partners cannot falsely deny (repudiate) their purchase or transaction
9-10Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
9-11Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
9-12Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Information Assurance Model and Defense Strategy
CIA security triad (CIA triad)Three security concepts important to information on the Internet: confidentiality, integrity, and availabilityconfidentiality
Assurance of data privacy and accuracy; keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes
9-13Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Information Assurance Model and Defense Strategy
integrityAssurance that stored data has not been modified without authorization; a message that was sent is the same message as that which was received
availabilityAssurance that access to data, the website, or other EC data service is timely, available, reliable, and restricted to authorized users
9-14Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Information Assurance Model and Defense Strategy
AUTHENTICATION, AUTHORIZATION, AND NONREPUDIATION
9-15Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Defense I: Access Control, Encryption, and PKI
symmetric (private) key encryptionAn encryption system that uses the same key to encrypt and decrypt the message
Data Encryption Standard (DES)The standard symmetric encryption algorithm supported by the NIST and used by U.S. government agencies until October 2000
9-16Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Defense I: Access Control, Encryption, and PKI
public key infrastructure (PKI)A scheme for securing e-payments using public key encryption and various technical componentspublic (asymmetric) key encryption
Method of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa
public keyEncryption code that is publicly available to anyone
private keyEncryption code that is known only to its owner
9-17Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Defense II: Securing E-Commerce Networkshoneynet
A network of honeypotshoneypot
Production system (e.g., firewalls, routers, Web servers, database servers) that looks like it does real work, but that acts as a decoy and is watched to study how network intrusions occur
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-18
The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms
general controlsControls established to protect the system regardless of the specific application; for example, protecting hardware and controlling access to the data center are independent of the specific application
application controlsControls that are intended to protect specific applications
9-19Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
9-20Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms
GENERAL, ADMINISTRATIVE, AND OTHER CONTROLSPhysical ControlsAdministrative Controls
APPLICATION CONTROLS AND INTELLIGENT AGENTSintelligent agents
Software applications that have some degree of reactivity, autonomy, and adaptability—as is needed in unpredictable attack situations; an agent is able to adapt itself based on changes occurring in its environment
9-21Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Business Continuity, Disaster Recovery,Security Auditing, and Risk Management
BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNINGdisaster avoidance
An approach oriented toward prevention, the idea is to minimize the chance of avoidable disasters (such as fire or other human-caused threats)
9-22Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
9-23Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Managerial Issues1. What is the best EC security strategy for my
company?2. Is the budget for EC security adequate?3. What steps should businesses follow in
establishing a security plan?4. Should organizations be concerned with
internal security threats?5. What is the key to establishing strong e-
commerce security?
9-24Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Summary1. The key to establishing strong e-commerce
security2. Basic EC security issues and terminology3. Threats, vulnerabilities, and technical
attacks4. Internet fraud, phishing, and spam5. Information assurance6. Securing EC access control and
communications
9-25Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Summary7. Technologies for protecting networks.8. The different controls and special defense
mechanisms.9. Protecting from fraud.10.Role of business continuity and disaster
recovery planning.11.Enterprisewide EC security.12.Why is it impossible to stop computer
crimes?
9-26Copyright © 2012 Pearson Education, Inc.
Publishing as Prentice Hall
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-27
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.
Copyright © 2012 Pearson Education, Inc. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice HallPublishing as Prentice Hall