Chapter 4
Chapter 4
Malicious Code:
Sometimes referred to as“malware”
Includes a variety of threats such as viruses, worms, Trojan
horses, ransomware and bots
Virus is a computer program that has the ability to replicate
or make copies of itself, and spread to other files; In
addition, most computer viruses deliver a “payload”; The
payload may be relatively benign, such as the display of a
message or image, or it may be highly destructive –
destroying files, reformatting the computer’s hard drive, or
causing programs to run improperly
Security Threats in the E-commerce Environment
Unwanted Programs:
Unwanted programs such as adware, browser parasites,
spyware, and other applications install themselves on a
computer, typically without the user’s informed consent; once
installed, these applications are usually exceedingly difficult to
remove from the computer
Adware is typically used to call for pop-up ads to display when
the user visits certain sites
Browser parasite is a program that can monitor and change
the settings of a user’s browser
Spyware is a program used to obtain information such as
user’s keystrokes, copies of e-mail and instant messages, and
even take screenshots
Security Threats in the E-commerce Environment
Insider Attacks:
The largest financial threats to business institutions come from
insiders
Malicious intruders seeking system access sometimes trick
employees into revealing their passwords by pretending to be
legitimate members of the company in need of information
Employees can introduce errors by entering faulty data or by not
following the proper instructions for processing data and using
computer equipment
Information systems specialists can also create software errors as
they design and develop new software or maintain existing
programs
Security Threats in the E-commerce Environment
Encryption
Transforms data into cipher text readable only by sender and
receiver
Key (or cipher) is any method for transforming plain text to
cipher text
Secures stored information and information transmission
Provides 4 of 6 key dimensions of e-commerce security:
Message integrity
Nonrepudiation
Authentication
Confidentiality
Symmetric Key Cryptography
Hash function:
Mathematical algorithm that produces fixed-length number called
message or hash digest
Hash digest of message sent to recipient along with
message to verify integrity
Hash digest and message encrypted with recipient’s
public key
Entire cipher text then encrypted with sender’s
private key—creating digital signature—for
authenticity, nonrepudiation
Public Key Cryptography with Digital
Signatures
Digital Envelopes
Firewall
Firewalls and proxy servers are intended to build a wall around
your network and the attached server and clients
Hardware or software that uses security policy to filter packets
Packet filters – examine packets for prohibited port or from prohibited IP
Application gateways – filters based on application being requested
Can filter traffic based on packet attributes
Proxy servers (proxies)
Software servers that handle all communications from or sent to
the Internet ; spokesperson or bodyguard for organization
Limit access of internal clients to external Internet server by
prohibiting users from communicating directly with the Internet
Intrusion detection systems
Intrusion prevention systems
Firewalls and Proxy Servers
Protecting Servers and Clients
Anti-virus software
Easiest and least expensive way to prevent threats to
system integrity
Requires daily updates
Developing an E-commerce Security Plan
The Role of Laws and Public Policy