39
Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon.

Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Embed Size (px)

Citation preview

Page 1: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 1

E-Commerce Security

Notes based on Laudon&Laudon.

Page 2: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 2

Learning Objectives

Document the rapid rise in computer and network security attacksUnderstand the factors contributing to the rise in EC security breachesExplain the basic types of network security attacks

Page 3: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 3

Learning Objectives (cont.)

Discuss the major steps in developing a security risk management systemDescribe the major types of attacks against EC systemsDiscuss some of the major technologies for securing EC

Page 4: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 4

Bringing Down an EC Site:Mere Child’s Play

Distributed Denial of Service (DDoS) attacks can inundate a site with so many requests that legitimate traffic is virtually halted

Attacker used software to send a flood of data packets to the target computer(s) with the aim of overloading its resources

Page 5: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 5

Figure 13-1Using Zombies in a Distributed Denial of Service Attack

Source: Scambray et al. (2000)

Page 6: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 6

Bringing Down an EC Site:Mere Child’s Play (cont.)

Distributed Denial of Service (DDoS) attacks

Zombie—machine on which the DDoS software is loaded, unknown to the owner

Home computers with cable modems or DSL service that are left on all the timeBusiness Web servers located outside the firewall

Availability of free tools and scripts make it easy to mount a DDOS attack

Page 7: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 7

Figure 13-2Attack Sophistication vs. Intruder Technical Knowledge

Source: Special permission to reproduce the CERT ©/CC graphic © 2000 by Carnegie Melon University, in Electronic Commerce 2002 in Allen et al. (2000).

Page 8: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 8

The Need for Security

Data from Computer Security Institute and FBI indicate:

Cyber attacks are on the increaseInternet connections are increasingly a point of attack

The variety of attacks is on the riseThe reporting of serious crimes to law enforcement has declined

Page 9: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 9

Table 13-2Incidents and Vulnerabilities Reported to CERT

Figures from Computer Emergency Response Team

(CERT)

Page 10: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 10

Why Now?

Security systems are only as strong as their weakest pointsSecurity and ease of use (or implementation) are antithetical to one anotherSecurity takes a back seat to market pressures

Page 11: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 11

Why Now? (cont.)

Security of an EC site depends on the security of the Internet as a wholeSecurity vulnerabilities are increasing faster than they can be combatedSecurity compromised by common applications

Page 12: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 12

Basic Security Issues

User’s perspectiveIs Web server owned and operated by legitimate company?Web page and form contain some malicious code content?Will Web server distribute the user’s information to another party?

Company’s perspective

Will the user attempt to break into the Web server or alter the site?Will the user try to disrupt the server so it isn’t available to others?

Issues at a simple marketing site:

Page 13: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 13

Basic Security Issues (cont.)

Issues at a simple marketing site:User and company perspective

Is network connection free from eavesdropping?Has information sent back and forth between server and browser been altered?

Page 14: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 14

Basic Security Issues (cont.)

Major security issues in ECAuthenticationAuthorizationAuditingConfidentiality or privacyIntegrityAvailabilityNon-repudiation

Page 15: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 15

Security Risk Management

Required to determine security needs

4 phases of risk management

AssessmentPlanningImplementationMonitoring

Definitions involved in risk management

Assets—anything of value worth securingThreat—eventuality representing danger to an assetVulnerability—weakness in a safeguard

Page 16: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 16

Security Risk Management (cont.)

Assessment phase—evaluation of assets, threats, vulnerabilities

Determine organizational objectivesInventory assetsDelineate threatsIdentify vulnerabilitiesQuantify the value of each risk

Page 17: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 17

Table 13-3Security Risks for EC & Other Internet Sites

Page 18: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 18

Security Risk Management (cont.)

Planning phase of risk management—arrive at a set of security policies

Define specific policiesEstablish processes for audit and reviewEstablish an incident response team and contingency plan

Page 19: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 19

Security Risk Management (cont.)

Implementation phase of risk management—choose particular technologies to deal with high priority threatsMonitoring phase of risk management—ongoing processes used to determine which measures are successful, unsuccessful and need modification

Page 20: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 20

Types of Threats and Attacks

Nontechnical vs. technical attacksSteps in a hacker’s attack

Discover key elements of networkScan for vulnerabilitiesHack in and gain administrator privilegesDisable auditing & traces from log filesSteal files, modify data, steal source code, etc.Install back doors, etc to permit undetectable reentryReturn at will to do more damage

Page 21: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 21

Types of Threats and Attacks (cont.)

The playersHackersCrackersScript kiddies

Systems and software bugs and misconfigurations

Page 22: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 22

Types of Threats and Attacks (cont.)

IP fragmentation (teardrop, bonk, boink, nestea, and others)DNS spoofing

Ping of deathSmurf attackSYNFloodBuffer overflows

Denial-of-service (DoS) attacks

Page 23: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 23

Types of Threats and Attacks (cont.)

Input validation attacksIntercepted transmissionsMalicious code

VirusesWormsMacro viruses and macro wormsTrojan horses

Malicious mobile code

Page 24: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 24

Security Technologies

Tools Available to Achieve Site SecurityEncryptionNetwork Security ProtocolsVirtual Private Networks and TunnelingFirewalls and Proxy SystemsHost security toolsPolicies and Management: Access control, authentication, monitoring and intrusion detection.

Page 25: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 25

Figure 14-2Private Key Encryption

Page 26: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 26

Public Key Encryption

Size of key

RSA algorithm

Speed of Key

Rijndael algorithm

Page 27: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 27

Digital Signatures: authenticity and nondenial

Analogous to handwritten signatureBased on public keysUsed to:

Authenticate the identity of the sender of a message or documentEnsure the original content of the electronic message or document is unchanged

Security for E-Payments (cont.)

Page 28: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 28

Security for E-Payments (cont.)

Digital Signatures: authenticity and nondenial (cont.)

Benefits:

PortableCannot be easily repudiated or imitatedCan be time stamped

Page 29: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 29

Figure 14-4Digital Signatures

Page 30: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 30

Security for E-Payments (cont.)

Digital certificates

Identifying the holder of a public key (Key-Exchange)Issued by a trusted certificate authority (CA)

Name : “Richard”key-Exchange Key :Signature Key :Serial # : 29483756Other Data : 10236283025273Expires : 6/18/04Signed : CA’s Signature

Page 31: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 31

Security for E-Payments (cont.)

Secure socket layer/transport layer securitySecure socket layer (SLL)—handle on Web browser, utilizing CAs and data encryption

EncryptionDigital certificatesDigital signatures

In 1996 SSL was standardized and named transport layer security (TSL)Operates at TCP/IP layer (base layer for Internet)IPSec—secure version of IP protocol

Page 32: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 32

SSL

Secure Socket Layer (SSL)SSL protocol may use a certificate, but there is no payment gateway. Merchants need to receive ordering information and credit card information (capturing process initiated by merchants)

Page 33: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 33

Security Technologies

Firewalls and access controlFirewall—network node that isolates private network from public network

Packet-filtering routersApplication-level proxiesScreened host firewall

Page 34: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 34

Figure 13-6Application-Level Proxy (Bastion Gateway Host)

Page 35: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 35

Figure 13-7Screened Host Firewall

Page 36: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 36

Figure 13-8Screened Subnet Firewall (with DMZ)

Page 37: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 37

Security Technologies (cont.)

Virtual private networks (VPNs)—use public Internet to carry information but remains private

Encryption—scramble communicationsAuthentication—ensure information remains untampered with and comes from legitimate sourceAccess control—verify identity of anyone using network

Page 38: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 38

Security Technologies (cont.)

Protocol tunneling—ensure confidentiality and integrity of data transmitted

Point-to-point tunneling (PTP)Layer 2 tunneling protocol (L2PT)

Intrusion Detection Systems (IDS)

Page 39: Prentice Hall, 2002 1 E-Commerce Security Notes based on Laudon&Laudon

Prentice Hall, 2002 39

Managerial Issues

Recognize the business consequences of poor securitySecurity through obscurity doesn't workIt’s the business that counts, not the technologySecurity is an on-going, closed-loop processEven for EC sites, internal breaches are more prevalent than external breaches