04-1 E-commerce Security slides

35
1 e-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. eighth edition Copyright © 2012 Pearson Education Chapter 4 E-commerce Security and Payment Systems Copyright © 2012 Pearson Education

Transcript of 04-1 E-commerce Security slides

Page 1: 04-1 E-commerce Security slides

1

e-commerce

Kenneth C. Laudon

Carol Guercio Traver

business. technology. society.

eighth edition

Copyright © 2012 Pearson Education

Chapter 4

E-commerce Security and

Payment Systems

Copyright © 2012 Pearson Education

Page 2: 04-1 E-commerce Security slides

2

Class Discussion

Copyright © 2012 Pearson Education Slide 4-3

Cyberwar: Mutually Assured Destruction (MAD)

� What is the difference between hacking and

cyberwar?

� Why has cyberwar become more potentially

devastating in the past decade?

� What percentage of computers have been

compromised by stealth malware programs?

� Will a political solution to MAD 2.0 be effective

enough?

� Cyberwar is much more serious treat to infrastructure of entire nation

�Because highly developed nations has relied more on the Internetfor business, government, and industrial and utility controls

� 10%

� Probably not

Copyright © 2012 Pearson Education Slide 4-4

Computer-generated Simulation of a DDoS Attack

Page 3: 04-1 E-commerce Security slides

3

Copyright © 2012 Pearson Education Slide 4-5

Learning Objectives

� Understand the scope of e-commerce crime and security problems

� Describe the key dimensions of e-commerce security

� Understand the tension between security and other values

� Identify the key security threats in the e-commerce environment

� Describe how technology helps protect the security of messages sent over the Internet

� Identify the tools used to establish secure Internet communications channels and protect networks, servers, and clients

� Appreciate the importance of policies, procedures, and laws in creating security

Copyright © 2012 Pearson Education Slide 4-6

Page 4: 04-1 E-commerce Security slides

4

Copyright © 2012 Pearson Education Slide 4-7

The E-commerce Security Environment

�Overall size and losses of cybercrime

unclear

�Reporting issues

�2011 CSI survey: 46% of respondent

firms detected breach in last year

�Underground economy marketplace:

�Stolen information stored on underground

economy servers

Copyright © 2012 Pearson Education Slide 4-8

Types of Attacks Against ComputerSystems (Cybercrime)

Figure 4.1, Page 246

SOURCE: Based on data from

Computer Security Institute,

2011

Page 5: 04-1 E-commerce Security slides

5

Copyright © 2012 Pearson Education Slide 4-9

Copyright © 2012 Pearson Education Slide 4-10

What Is Good E-commerce Security?

� To achieve highest degree of security

�New technologies

�Organizational policies and procedures

� Industry standards and government laws

�Other factors

�Time value of money

�Cost of security vs. potential loss

�Security often breaks at weakest link

Page 6: 04-1 E-commerce Security slides

6

Copyright © 2012 Pearson Education Slide 4-11

The E-commerce Security Environment

Figure 4.2, Page 249

Copyright © 2012 Pearson Education Slide 4-12

Dimensions of E-commerce Security

� Integrity: ability to ensure that information being displayed on a Web site or transmitted/received over the Internet has not been altered in any way by an unauthorized party

� Nonrepudiation: ability to ensure that e-commerce participants do not deny (repudiate) online actions

� Authenticity: ability to identify the identity of a person or entity with whom you are dealing on the Internet

� Confidentiality: ability to ensure that messages and data are available only to those authorized to view them

� Privacy: ability to control use of information a customer provides about himself or herself to merchant

� Availability: ability to ensure that an e-commerce site continues to function as intended

Page 7: 04-1 E-commerce Security slides

7

Copyright © 2012 Pearson Education Slide 4-13

Table 4.3, Page 250

Copyright © 2012 Pearson Education Slide 4-14

The Tension Between Security andOther Values

� Security vs. Ease of use:� The more security measures added, the more

difficult a site is to use, and the slower it becomes

� Too much security can harm profitability, while not enough security can put you out of business

� Public safety and criminal uses of the Internet� Use of technology by criminals to plan crimes or

threaten nation-state

� The Internet is both anonymous and pervasive, an ideal communication tool for criminal and terrorist groups

Page 8: 04-1 E-commerce Security slides

8

Copyright © 2012 Pearson Education Slide 4-15

Security Threats in theE-commerce Environment

�Three key points of vulnerability in

e-commerce environment:

1. Client

2. Server

3. Communications pipeline (Internet

communications channels)

Copyright © 2012 Pearson Education Slide 4-16

A Typical E-commerce Transaction

Figure 4.3, Page 253

Page 9: 04-1 E-commerce Security slides

9

Copyright © 2012 Pearson Education Slide 4-17

Vulnerable Points in an E-commerce Transaction

Figure 4.4, Page 254

Copyright © 2012 Pearson Education Slide 4-18

Most Common Security Threats in the E-commerce Environment

� Malicious code

� Viruses

� Worms

� Trojan horses

� Bots, botnets

� Unwanted programs

� Browser parasites

� Adware

� Spyware

Page 10: 04-1 E-commerce Security slides

10

Copyright © 2012 Pearson Education Slide 4-19

Malicious Code� Viruses:

� Replicate and spread to other files; most deliver “payload” (destructive or benign)

� Macro viruses, file-infecting viruses, script viruses

� Worms: � Designed to spread from computer to computer

� Can replicate without being executed by a user or program like virus

� Trojan horse: � Appears benign, but does something other than expected

� Bots: � Covertly installed on computer; respond to external

commands sent by attacker to create a network of compromised computers for sending spam, generating a DDoS attack, and stealing info from computers

Copyright © 2012 Pearson Education Slide 4-20

Page 11: 04-1 E-commerce Security slides

11

Copyright © 2012 Pearson Education Slide 4-21

Copyright © 2012 Pearson Education Slide 4-22

Unwanted Programs

� Installed without user’s informed consent

�Browser parasites

� Can monitor and change settings of a user’s browser

�Adware

� Calls for unwanted pop-up ads

�Spyware

� Can be used to obtain information, such as a user’s keystrokes, e-mail, IMs, etc.

Page 12: 04-1 E-commerce Security slides

12

Copyright © 2012 Pearson Education Slide 4-23

Most Common Security Threats (cont.)

� Social engineering

�Phishing

�Deceptive online attempt to obtain confidential

information

� E-mail scams

� Spoofing legitimate Web sites

� Use of information to commit fraudulent acts (access

checking accounts), steal identity

Copyright © 2012 Pearson Education Slide 4-24

Phishing Mail Example

Page 13: 04-1 E-commerce Security slides

13

Copyright © 2012 Pearson Education Slide 4-25

Copyright © 2012 Pearson Education Slide 4-26

Most Common Security Threats (cont.)

� Hacking� Hackers: Individual who intends to gain unauthorized

access to computer systems

� Crackers: Hacker with criminal intent

� Types of hackers: � White hats – hired by corporate to find weaknesses in the firm’s

computer system

� Black hats – hackers with intention of causing harm

� Grey hats – hackers breaking in and revealing system flaws without disrupting site or attempting to profit from their finds.

� Cybervandalism:� Intentionally disrupting, defacing, destroying Web site

� Data breach� When organizations lose control over corporate

information to outsiders

Page 14: 04-1 E-commerce Security slides

14

Copyright © 2012 Pearson Education Slide 4-28

Credit Card Fraud

� Fear of stolen credit card information deters online purchases

� US’s federal law limits liability of individuals to $50 for a stolen credit card

� Hackers target credit card files and other customer information files on merchant servers; use stolen data to establish credit under false identity

� Online companies at higher risk than offline due to difficulty of guarenteeing true identity of customers

� “E-Sign” law giving digital signatures same authority as hand-written ones applies only to large corporations, but not to B2C e-commerce

Copyright © 2012 Pearson Education Slide 4-29

Spoofing (Pharming) and Spam (Junk) Web Sites

� Spoofing (Pharming)

� Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else

� Spoofing a Web site is called “pharming,” redirecting a Web link to another IP address different from the real one

� Threatens integrity (steal business from true site, or alter orders and send to true site), and authenticity (difficult to distinguish between true and fake Web address)

� Carried out by hacking local DNS servers

� Spam (Junk) Web sites

� Collection of advertisements for other sites, some of which containing malicious code

� Appears on search results, hiding their identities by using domain names similar to legitimate ones, and redirecting traffic to spammer domains, e.g., topsearch10.com

Page 15: 04-1 E-commerce Security slides

15

Copyright © 2012 Pearson Education Slide 4-31

DoS and DDoS Attacks

� Denial of service (DoS) attack

� Hackers flood Web site with useless traffic to inundate and overwhelm network

� Use of bot networks built from hundreds of compromised workstations

� Distributed denial of service (DDoS) attack

� Hackers use multiple computers to attack target network from numerous launch points

� Microsoft and Yahoo have experienced such attacks

Copyright © 2012 Pearson Education Slide 4-32

Denial of Service

Victim System

Attacking System(s)

Internet

SOURCE: PETER SHIPLEY

� Ping Flooding �Attacker sends a flood of pings to the intended

victim�The ping packets will saturate the victim’s

bandwidth

Page 16: 04-1 E-commerce Security slides

16

Copyright © 2012 Pearson Education Slide 4-33

Denial of Service� SMURF ATTACK

� Uses a ping packet with two extra twist

� Attacker chooses an unwitting victim

� Spoofs the source address

� Sends request to network in broadcast mode

INTERNET

PERPETRATOR

VICTIM

ICMP echo (spoofed source address of victim)sent to IP broadcast address

ICMP echo reply SOURCE: CISCO

ICMP = Internet ControlMessage Protocol

INNOCENTREFLECTOR SITES

BANDWIDTH MULTIPLICATION:A T1 (1.54 Mbps) can easilyyield 100 MBbps of attack

1 SYN

10,000 SYN/ACKs -- VICTIM IS DEAD

Copyright © 2012 Pearson Education Slide 4-34

DDoS Attack Illustrated

ScanningProgram

Unsecured Computers

HackerHacker scansInternet for

unsecured systems that can be compromised

1

Internet

Page 17: 04-1 E-commerce Security slides

17

Copyright © 2012 Pearson Education Slide 4-35

Hacker

Zombies

Hacker secretlyinstalls zombie

agent programs, turning unsecured computers into zombies

2

Internet

DDoS Attack Illustrated

Copyright © 2012 Pearson Education Slide 4-36

Hacker

Hacker selects a Master Server to send commands to the zombies

3

ZombiesMasterServer

Internet

DDoS Attack Illustrated

Page 18: 04-1 E-commerce Security slides

18

Copyright © 2012 Pearson Education Slide 4-37

Hacker

Using client program, hacker sends commands to Master Server to launch zombie attack against a targeted system

4

Zombies

TargetedSystem

MasterServer

Internet

DDoS Attack Illustrated

Copyright © 2012 Pearson Education Slide 4-38

TargetedSystem

Hacker

Master Serversends signal to

zombies to launch attack on targeted system

5

MasterServer

Internet

Zombies

DDoS Attack Illustrated

Page 19: 04-1 E-commerce Security slides

19

Copyright © 2012 Pearson Education Slide 4-39

TargetedSystem

Hacker

Targeted system is overwhelmed by bogus requests that shut it down for legitimate users

6

MasterServer

User

Request Denied

Internet

Zombies

DDoS Attack Illustrated

Copyright © 2012 Pearson Education Slide 4-40

Most Common Security Threats (cont.)

� Sniffing� Eavesdropping program that monitors information traveling

over a network

� Insider jobs: Single largest financial threat

� Poorly designed server and client software� Due to increase in complexity and size of OS, application

software, and browsers

� Social network security� Social engineering attacks tempting visitors to FB pages to

click on “bad-behavior” links

� Mobile platform threats� Same risks as any Internet device

� Malware, botnets, vishing/smishing [discuss on textbook]

Page 20: 04-1 E-commerce Security slides

20

Copyright © 2012 Pearson Education Slide 4-42

Technology Solutions

�Protecting Internet communications

�Encryption

� Securing channels of communication

�SSL, S-HTTP, VPNs

� Protecting networks

�Firewalls

�Protecting servers and clients

Copyright © 2012 Pearson Education Slide 4-43

Tools Available to Achieve Site Security

Figure 4.7, Page 270

Page 21: 04-1 E-commerce Security slides

21

Copyright © 2012 Pearson Education Slide 4-44

Encryption

� Encryption� Transforms plain text data into cipher text readable only by

sender and receiver

� Purpose: Secures stored information and information transmission

� Provides 4 of 6 key dimensions of e-commerce security:

� Message integrity – assurance that message hasn’t been altered

� Nonrepudiation – prevents user from denying sending the message

� Authentication – verification of identity of person (computer) sending the msg

� Confidentiality – assurance that msg. was not read by others

Copyright © 2012 Pearson Education Slide 4-45

Symmetric Key Encryption

� Also known as secret key encryption

� Sender and receiver use same digital key to encrypt and decrypt message

� Requires different set of keys for each transaction

� Strength of encryption

� Length of binary key used to encrypt data

� Advanced Encryption Standard (AES)

� Most widely used symmetric key encryption

� Uses 128-, 192-, and 256-bit encryption keys

� Other standards use keys with up to 2,048 bits

Page 22: 04-1 E-commerce Security slides

22

Copyright © 2012 Pearson Education Slide 4-46

Symmetric Encryption and Decryption

© 2004 D. A. Menascé. All Rights Reserved.

Copyright © 2012 Pearson Education Slide 4-47

Public Key Encryption

� Solves symmetric key encryption problem of having to exchange secret key

� Uses two mathematically related digital keys

� Public key (widely disseminated)

� Private key (kept secret by owner)

� Both keys used to encrypt and decrypt message

� Once key used to encrypt message, same key cannot be used to decrypt message

� E.g., Sender uses recipient’s public key to encrypt message; recipient uses private key to decrypt it

Page 23: 04-1 E-commerce Security slides

23

Copyright © 2012 Pearson Education Slide 4-48

Public Key Encryption and Decryption

© 2004 D. A. Menascé. All Rights Reserved.

Copyright © 2012 Pearson Education Slide 4-49

Public Key Cryptography: A Simple Case

Figure 4.8, Page 276

Page 24: 04-1 E-commerce Security slides

24

Copyright © 2012 Pearson Education Slide 4-50

Public Key Encryption using Digital Signatures and Hash Digests

� Public key encryption provides confidentiality, but not authentication, integrity, and non-repudiation

� Hash function:� Mathematical algorithm that produces fixed-length number called

message or hash digest

� Hash digest of message sent to recipient along with message to verify integrity

� Hash digest and message encrypted with recipient’s public key

� Entire cipher text then encrypted with sender’s private key—creating digital signature—for authenticity, non-repudiation

Copyright © 2012 Pearson Education Slide 4-51

Message Digest

MessageMessageDigest

Function

101…1010

LargeSmall(e.g., 128 bits)

© 2004 D. A. Menascé. All Rights Reserved.

Page 25: 04-1 E-commerce Security slides

25

Copyright © 2012 Pearson Education Slide 4-52

Message Digest

AMessageDigest

Function

Digest A

B Digest B

If A =B => Digest A = Digest B

© 2004 D. A. Menascé. All Rights Reserved.

Copyright © 2012 Pearson Education Slide 4-53

Message Digest

?MessageDigest

Function

Digest A

Extremely hard to get A from Digest A!© 2004 D. A. Menascé. All Rights Reserved.

Page 26: 04-1 E-commerce Security slides

26

Copyright © 2012 Pearson Education Slide 4-54

Public Key Cryptography with Digital Signatures

Figure 4.9, Page 278

Copyright © 2012 Pearson Education Slide 4-55

Digital Envelopes

� Address weaknesses of:� Public key encryption

� Computationally slow, decreased transmission speed, increased processing time

� Symmetric key encryption� Computationally faster, but less secure due to insecure

transmission lines

� Uses more efficient symmetric key encryption to encrypt document

� Uses public key encryption to encrypt symmetric key and send the encrypted key (digital envelope) and encrypted document to the recipient

Page 27: 04-1 E-commerce Security slides

27

Copyright © 2012 Pearson Education Slide 4-56

Creating a Digital Envelope

Figure 4.10, Page 279

Copyright © 2012 Pearson Education Slide 4-57

Digital Certificates and Public Key Infrastructure (PKI)

� Still missing a way to verify identity of Web sites � By using digital document issued by a trusted third

party called certificate authority (CA)

� Digital certificate includes:� Name of subject/company

� Subject’s public key

� Digital certificate serial number

� Expiration date, issuance date

� Digital signature of CA

� Public Key Infrastructure (PKI): � CAs and digital certificate procedures that are accepted by all

parties

� Pretty Good Privacy (PGP) – a widely used e-mail public key encryption software [go to pgpi.org to download it]

Page 28: 04-1 E-commerce Security slides

28

Copyright © 2012 Pearson Education Slide 4-58

Digital Certificates and Certification Authorities

Figure 4.11, Page 280

Copyright © 2012 Pearson Education Slide 4-59

Limits to Encryption Solutions

�PKI mainly protect messages in transit

�Doesn’t protect storage of private key�PKI not effective against insiders, employees

�Protection of private keys by individuals may be haphazard

�No guarantee that verifying computer of merchant is secure

�CAs are unregulated, self-selecting organizations

Page 29: 04-1 E-commerce Security slides

29

Copyright © 2012 Pearson Education Slide 4-61

Securing Channels of Communication

� Secure Sockets Layer (SSL): � Establishes a secure, negotiated client-server session in

which URL of requested document, along with contents,

is encrypted

� Designed to establish a secure connection between two

computers

� Virtual Private Network (VPN): � Allows remote users to securely access internal

network via the Internet, using Point-to-Point

Tunneling Protocol (PPTP)

Copyright © 2012 Pearson Education Slide 4-62

Secure Negotiated Sessions Using SSL

Figure 4.12, Page 285

Page 30: 04-1 E-commerce Security slides

30

Copyright © 2012 Pearson Education Slide 4-63

Protecting Networks� Firewall

� Hardware or software that filters packets (prevents some packets from entering the network) by using security policy

� Two main methods:� Packet filters – looks inside data packets to decide

whether they are destined for a prohibited port or originate from a prohibited IP address

� Application gateways – filters communications based on the application being requested, rather than the source or destination of the message

� Application gateways provide greater security than packet filters, but can compromise system performance

Copyright © 2012 Pearson Education Slide 4-64

Protecting Networks

�Proxy servers (proxies)

�Software servers that handle all communications originating from or being sent to the Internet

� Initially for limiting access of internal clients to external Internet servers

�Can be used to restrict access to certain types of sites, such as porno, auction, or stock-trading sites, or to cache frequently-accessed Web pages to reduce download times

Page 31: 04-1 E-commerce Security slides

31

Copyright © 2012 Pearson Education Slide 4-65

Firewalls and Proxy Servers

Figure 4.13, Page 288

Copyright © 2012 Pearson Education Slide 4-66

Protecting Servers and Clients

�Operating system security

enhancements

�Upgrades, patches

�Anti-virus software:

�Easiest and least expensive way to prevent

threats to system integrity

�Requires daily updates

Page 32: 04-1 E-commerce Security slides

32

Copyright © 2012 Pearson Education Slide 4-67

Management Policies, Business Procedures, and Public Laws

�U.S. firms and organizations spend 14%

of IT budget on security hardware,

software, services ($35 billion in 2010)

�Managing risk includes

�Technology a foundation of security

�Effective management policies also required

�Public laws and active enforcement

Copyright © 2012 Pearson Education Slide 4-68

A Security Plan: Management Policies

� Risk assessment: assessment of risks and points of vulnerability

� Develop security policy: set of statements prioritizing information risks, identifying acceptable risk targets, and identifying mechanisms for achieving targets

� Develop implementation plan� Create security organization

� Administers access controls

� Authentication procedures, including biometrics

� Authorization policies, authorization management systems

� Perform security audit: review of security practices and procedures

Page 33: 04-1 E-commerce Security slides

33

Copyright © 2012 Pearson Education Slide 4-69

Developing an E-commerce Security Plan

Figure 4.14, Page 290

Copyright © 2012 Pearson Education Slide 4-70

The Role of Laws and Public Policy

� Laws that give authorities tools for identifying,

tracing, prosecuting cybercriminals:� National Information Infrastructure Protection Act of 1996

� USA Patriot Act

� Homeland Security Act

� Private and private-public cooperation� CERT Coordination Center

� US-CERT

� Government policies and controls on encryption

software

� OECD guidelines

Page 34: 04-1 E-commerce Security slides

34

Copyright © 2012 Pearson Education Slide 4-71

Copyright © 2012 Pearson Education Slide 4-72

Page 35: 04-1 E-commerce Security slides

35

Copyright © 2012 Pearson Education Slide 4-73