0% found this document useful (0 votes)
51 views43 pages

Chapter 4

E-commerce faces security threats from criminals seeking to profit illegally. The internet allows anonymous theft and vulnerabilities exist for clients, servers, and communication pipelines. Common threats include malware, identity theft, hacking, fraud, and denial of service attacks undermining integrity, authenticity, privacy and availability. Strong security requires coordinated technologies, policies, standards, and laws to protect the e-commerce environment from these risks.

Uploaded by

subash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views43 pages

Chapter 4

E-commerce faces security threats from criminals seeking to profit illegally. The internet allows anonymous theft and vulnerabilities exist for clients, servers, and communication pipelines. Common threats include malware, identity theft, hacking, fraud, and denial of service attacks undermining integrity, authenticity, privacy and availability. Strong security requires coordinated technologies, policies, standards, and laws to protect the e-commerce environment from these risks.

Uploaded by

subash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 43

E-commerce Security

The E-commerce Security


Environment

 For most law-abiding citizens , the Internet holds the promise


of a huge, convenient, global marketplace, providing access to
people, goods, services and business worldwide, at a bargain
price
 For criminals, the Internet has created entirely new – and
lucrative – ways to steal from the more than billion customers
worldwide
 It’s less risky to steal online anonymously
 Internet is an open, vulnerable-design network
 The actions of cybercriminals are costly for both businesses
and consumers
What Is Good E-commerce Security?

 To achieve highest degree of security


 New technologies available should be used
 Organizational policies and procedures required to ensure the
technologies are not subverted
 Industry standards and government laws are required to enforce
payment mechanism as well as investigate and prosecute violators of law
 Other factors
 Time value of money
 Cost of security vs. potential loss
 Security often breaks at weakest link
The E-commerce Security Environment
Dimensions of E-commerce Security

 Six key dimensions: integrity, nonrepudiation, authenticity,


confidentiality, privacy, and availability
 Integrity refers to the ability to ensure that information
being displayed on a Web site, or transmitted or received
over the Internet, has not been altered in any way by an
unauthorized party
 Nonrepudiation refers to the ability to ensure that e-
commerce participants do not deny their online actions
 Authenticity refers to the ability to identify the identity of
a person or entity with whom you are dealing on the
Internet
Dimensions of E-commerce Security

 Confidentiality refers to the ability to ensure that


messages and data are available only to those who are
authorized to view them
 Privacy refers to the ability to control the use of
information about oneself
 Availability refers to the ability to ensure that an e-
commerce site continues to function as intended
 E-commerce security is designed to protect these six
dimensions; When any one of them is compromised, it
is a security issue
The Tension Between Security and
Other Values

 Computer security adds overhead and expense to business


operations, and also gives criminals new opportunities to
hide their intentions and their crimes
 Ease of use
 The more security measures added, the more difficult a site is
to use, and the slower it becomes
 Public safety and criminal uses of the Internet
 Internet is both anonymous and pervasive; Use of technology
by criminals to plan crimes or threaten nation-state
Security Threats in the
E-commerce Environment

Three key points of vulnerability in


e-commerce environment:
1. Client
2. Server
3. Communications pipeline (Internet
communications channels)
Security Threats in the E-commerce Environment

 Three key points of vulnerability: the client, the server,


and the communications pipeline
 Some most common and most damaging forms of
security threats to e-commerce consumers and site
operators:  Denial of Service (DoS)
 Malicious code
 Distributed Denial of
 Unwanted programs
Service (DDoS)
 Phishing and identity theft
 Sniffing
 Hacking and cybervandalism
 Credit card fraud/theft  Insider attacks
 Spoofing (pharming)  Poorly designed server
 Spam (junk) Web sites and client softwares
A Typical E-commerce Transaction
Vulnerable Points in an E-commerce Transaction
Security Threats in the E-commerce Environment

 Malicious Code:
Sometimes referred to as“malware”
Includes a variety of threats such as viruses, worms, Trojan
horses, ransomware and bots
Virus is a computer program that has the ability to replicate
or make copies of itself, and spread to other files; In
addition, most computer viruses deliver a “payload”; The
payload may be relatively benign, such as the display of a
message or image, or it may be highly destructive –
destroying files, reformatting the computer’s hard drive, or
causing programs to run improperly
Security Threats in the E-commerce Environment

 Computer viruses fall into several major categories like


macro viruses, file-infecting viruses, script viruses
 Macro viruses are application specific, meaning that the
virus affects only the application for which it was written
 File-infecting viruses infect executable files, such as .com,
.exe, .drv, and .dll
 Script viruses are written in script programming
languages; The viruses are activated simply by double-
clicking an infected script file; For example ILOVEU virus
(also known as the Love Bug)
Security Threats in the E-commerce Environment

Instead of just spreading from file to file, worm is a malware


that is designed to spread from computer to computer; A
worm does not necessarily need to be activated by a user or
program in order for it to replicate itself
A Trojan horse is a software program that appears to be
gentle, but then does something other than expected; The
Trojan horse is not itself a virus because it does not
replicate, but is often a way for viruses or other malicious
code such as bots or rootkits (a program whose aim is to
subvert control of the computer’s operating system) to be
introduced into a computer system
Security Threats in the E-commerce Environment

 Bots (short for robots) are a typical malicious code


that can be covertly installed on your computer when
attached to the Internet; Once installed, the boot
responds to external commands sent by the attacker
 Botnets are collections of captured computers used
for malicious activities
 Ransomware (scareware) locks computer or flies to
stop you from accessing them and display notice to
pay to unlock the computer
Security Threats in the E-commerce Environment

 Unwanted Programs:
 Unwanted programs such as adware, browser parasites,
spyware, and other applications install themselves on a
computer, typically without the user’s informed consent; once
installed, these applications are usually exceedingly difficult to
remove from the computer
 Adware is typically used to call for pop-up ads to display when
the user visits certain sites
 Browser parasite is a program that can monitor and change
the settings of a user’s browser
 Spyware is a program used to obtain information such as
user’s keystrokes, copies of e-mail and instant messages, and
even take screenshots
Security Threats in the E-commerce Environment

 Phishing and Identity Theft:


 Phishing is any deceptive, online attempt by a third party
to obtain confidential information for financial gain; The
most popular phishing attack is the e-mail scam letter
 Hacking and Cybervandalism:
 A hacker is an individual who intends to gain
unauthorized access to a computer system
 Within the hacking community, the term cracker is
typically used to denote a hacker with criminal intent,
although in the public press, the terms hacker and cracker
are used interchangeably
Security Threats in the E-commerce Environment

Cybervandalism is the intentional disruption, defacement,


or even destruction of a Web site or corporate information
system
Types of hackers:
 White hats – good hackers who help organizations locate
and fix security flows
 Black hats – hackers who act with the intention of causing
harm
 Grey hats – hackers somewhere in the middle are the
grey hats who believe they are pursuing some greater
good by breaking in and revealing system flaws
Security Threats in the E-commerce Environment

 Credit Card Fraud/Theft:


 Fear of stolen credit card information deters online
purchases
 Hackers target merchant servers; use data to establish
credit under false identity
 Online companies at higher risk than offline
 Spoofing (Pharming) and Spam (Junk) Web Sites:
 Spoofing is, generally, the act of one person pretending
to be someone else
 Hackers attempt to hide their true identity by using fake
email address or masquerading as someone else
Security Threats in the E-commerce Environment

Spoofing a Web site is also called “pharming”, which


involves redirecting a Web link to an address different from
the intended one, with a site masquerading as the intended
destination
Spam Web sites promise to offer some product or service,
but in fact are a collection of advertisements for other sites,
some of which contain malicious code
 Denial of Service (DoS) and Distributed Denial of Service
(DDoS) Attacks:
In DoS attack, hackers flood a network server or Web server
with many thousands of false communications or requests
for services to crash the network
Security Threats in the E-commerce Environment

 A DDoS attack uses numerous computers to inundate


and overwhelm the network form numerous launch
points
Sniffing:
 A sniffer is a type of eavesdropping program that
monitors information traveling over a network
 Sniffers enable hackers to steal proprietary
information from anywhere on a network,
including email messages, company files, and
confidential reports
Security Threats in the E-commerce Environment

 Insider Attacks:
 The largest financial threats to business institutions come from
insiders
 Malicious intruders seeking system access sometimes trick
employees into revealing their passwords by pretending to be
legitimate members of the company in need of information
 Employees can introduce errors by entering faulty data or by not
following the proper instructions for processing data and using
computer equipment
 Information systems specialists can also create software errors as
they design and develop new software or maintain existing
programs
Security Threats in the E-commerce Environment

Poorly Designed Server and Client Software:


 Many security threats prey on poorly designed server
and client software, sometimes in the operating
system and sometimes in the application software,
including browsers
 The increase in complexity and size of software
programs has contributed to an increase in software
flaws or vulnerabilities that hackers can exploit
Technology Solutions

 The threats to e-commerce are very real, potentially devastating and


likely to be increasing in intensity along with the growth in e-
commerce
 There are two lines of defense: technology solutions and policy
solutions
 Technology solutions
 Protecting Internet communications
 Cryptography
 Securing channels of communication
 SSL, TLS, VPNs, Wi-Fi
 Protecting networks
 Firewalls, proxy servers, IDS, IPS
 Protecting servers and clients
 OS security, anti-virus
Tools Available to Achieve Site Security
Encryption

 Encryption
 Transforms data into cipher text readable only by sender and
receiver
 Key (or cipher) is any method for transforming plain text to
cipher text
 Secures stored information and information transmission
 Provides 4 of 6 key dimensions of e-commerce security:
 Message integrity
 Nonrepudiation
 Authentication
 Confidentiality
Symmetric Key Cryptography

 Used extensively throughout the World War II and is


still a part of Internet encryption
 Sender and receiver use same digital key to encrypt
and decrypt message
 Requires different set of keys for each transaction
 Strength of encryption
 Length of binary key used to encrypt data
 Data Encryption Standard (DES) 56-bit encryption key
 Advanced Encryption Standard (AES)
 Most widely used symmetric key algorithm
 Uses 128-, 192-, and 256-bit encryption keys
 Other standards use keys with up to 2,048 bits
Public Key Cryptography

 Uses two mathematically related digital keys


 Public key (widely disseminated)
 Private key (kept secret by owner)

 Both keys used to encrypt and decrypt message


 Once key used to encrypt message, same key
cannot be used to decrypt message
 Sender uses recipient’s public key to encrypt
message; recipient uses private key to decrypt it
Public Key Cryptography: A Simple Case
Public Key Cryptography using Digital
Signatures and Hash Digests

 Hash function:
 Mathematical algorithm that produces fixed-length number called
message or hash digest
 Hash digest of message sent to recipient along with
message to verify integrity
 Hash digest and message encrypted with recipient’s
public key
 Entire cipher text then encrypted with sender’s
private key—creating digital signature—for
authenticity, nonrepudiation
Public Key Cryptography with Digital
Signatures
Digital Envelopes

 Address weaknesses of:


 Public key cryptography
 Computationally slow, decreased transmission speed, increased
processing time
 Symmetric key cryptography
 Insecure transmission lines
 Uses symmetric key cryptography to encrypt
document
 Uses public key cryptography to encrypt and
send symmetric key
Creating a Digital Envelope
Digital Certificates and
Public Key Infrastructure (PKI)

 Ensures that people and institutions are who they claim to be


 Digital certificate includes:
Name of subject/company
Subject’s public key
Digital certificate serial number
Expiration date, issuance date
Digital signature of CA
 Public Key Infrastructure (PKI):
CAs and digital certificate procedures
PGP
Digital Certificates and Certification
Authorities
Securing Channels of Communication

 Secure Sockets Layer (SSL)/Transport Layer Security (TLS)


 Establishes secure, negotiated client–server session
 Provides data encryption, server authentication, client
authentication and message integrity for TCP/IP connections
 Virtual Private Network (VPN)
 Allows remote users to securely access internal network via
the Internet using point-to-point tunneling
 Primary use of VPN is to establish secure communication
among business partner- large suppliers and customers
Secure Negotiated Sessions Using SSL/TLS
Protecting Networks

 Firewall
 Firewalls and proxy servers are intended to build a wall around
your network and the attached server and clients
 Hardware or software that uses security policy to filter packets
 Packet filters – examine packets for prohibited port or from prohibited IP
 Application gateways – filters based on application being requested
 Can filter traffic based on packet attributes
 Proxy servers (proxies)
 Software servers that handle all communications from or sent to
the Internet ; spokesperson or bodyguard for organization
 Limit access of internal clients to external Internet server by
prohibiting users from communicating directly with the Internet
 Intrusion detection systems
 Intrusion prevention systems
Firewalls and Proxy Servers
Protecting Servers and Clients

 Operating system security enhancements


 Upgrades, patches

 Anti-virus software
 Easiest and least expensive way to prevent threats to
system integrity
 Requires daily updates
Developing an E-commerce Security Plan
The Role of Laws and Public Policy

 Laws that give authorities tools for identifying,


tracing, prosecuting cybercriminals:
 USA Patriot Act
 Homeland Security Act
 Private and private-public cooperation
 US-CERT
 CERT Coordination Center
 Government policies and controls on encryption
software
 OECD, G7/G8, Council of Europe, Wassener Arrangement

You might also like