0% found this document useful (0 votes)
63 views49 pages

E-Commerce: Business. Technology. Society

Uploaded by

Tanmay Gharpure
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views49 pages

E-Commerce: Business. Technology. Society

Uploaded by

Tanmay Gharpure
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 49

E-commerce

business. technology. society.


Second Edition

Kenneth C. Laudon
Carol Guercio Traver

Copyright © 2004 Pearson Education, Inc. Slide 5-1


Chapter 5
Security and Encryption

Copyright © 2004 Pearson Education, Inc. Slide 5-2


Learning Objectives
 Understand the scope of e-commerce crime and security
problems
 Describe the key dimensions of e-commerce security
 Understand the tension between security and other values
 Identify the key security threats in the e-commerce environment
 Describe how various forms of encryption technology help
protect the security of messages sent over the Internet
 Identify the tools used to establish secure Internet
communications channels
 Identify the tools used to protect networks, servers, and clients
 Appreciate the importance of policies, procedures, and laws in
creating security

Copyright © 2004 Pearson Education, Inc. Slide 5-3


The Merchant Pays
Page 249

Copyright © 2004 Pearson Education, Inc. Slide 5-4


The Merchant Pays
 Many security procedures that credit card companies rely on are
not applicable in online environment
 As a result, credit card companies have shifted most of the risks
associated with e-commerce credit card transactions to merchant
 Percentage of Internet transactions charged back to online
merchants much higher than for traditional retailers (3-10%
compared to ½-1%)
 To protect selves, merchants can:
 Refuse to process overseas purchases
 Insist that credit card and shipping address match
 Require users to input 3-digit security code printed on back of
card
 Use anti-fraud software

Copyright © 2004 Pearson Education, Inc. Slide 5-5


The Merchant Pays (cont’d)

 Credit card company solutions include:


 Verified by Visa (Visa)
 SecureCode (MasterCard)
 Requiring issuing banks to assume a large
share of risk and liability

Copyright © 2004 Pearson Education, Inc. Slide 5-6


The E-commerce Security Environment:
The Scope of the Problem
 2002 Computer Security Institute survey of 503
security personnel in U.S. corporations and
government
 80% of respondents had detected breaches of
computer security within last 12 months and suffered
financial loss as a result
 Only 44% were willing or able to quantify loss, which
totaled $456 million in aggregate
 40% reported attacks from outside the organization
 40% experienced denial of service attacks
 85% detected virus attacks

Copyright © 2004 Pearson Education, Inc. Slide 5-7


Internet Fraud Complaints
Reported to the IFCC
Figure 5.1, Page 253

Copyright © 2004 Pearson Education, Inc. Slide 5-8


The E-commerce Security
Environment
Figure 5.2, Page 255

Copyright © 2004 Pearson Education, Inc. Slide 5-9


Dimensions of E-commerce Security
 Integrity: ability to ensure that information being displayed on a
Web site or transmitted/received over the Internet has not been
altered in any way by an unauthorized party
 Nonrepudiation: ability to ensure that e-commerce participants do
not deny (repudiate) online actions
 Authenticity: ability to identify the identity of a person or entity with
whom you are dealing on the Internet
 Confidentiality: ability to ensure that messages and data are
available only to those authorized to view them
 Privacy: ability to control use of information a customer provides
about himself or herself to merchant
 Availability: ability to ensure that an e-commerce site continues to
function as intended

Copyright © 2004 Pearson Education, Inc. Slide 5-10


Customer and Merchant Perspectives on the
Different Dimensions of E-commerce Security
Table 5.1, Page 256

Copyright © 2004 Pearson Education, Inc. Slide 5-11


The Tension Between Security
and Other Values
 Security vs. ease of use: the more security
measures that are added, the more difficult a
site is to use, and the slower it becomes
 Security vs. desire of individuals to act
anonymously

Copyright © 2004 Pearson Education, Inc. Slide 5-12


Security Threats in the E-commerce
Environment
 Three key points of vulnerability:
 Client
 Server
 Communications channel
 Most common threats:
 Malicious code
 Hacking and cybervandalism
 Credit card fraud/theft
 Spoofing
 Denial of service attacks
 Sniffing
 Insider jobs

Copyright © 2004 Pearson Education, Inc. Slide 5-13


A Typical E-commerce Transaction
Figure 5.3,
Page 259

Copyright © 2004 Pearson Education, Inc. Slide 5-14


Vulnerable Points in an E-commerce
Environment
Figure 5.4, Page 260

Copyright © 2004 Pearson Education, Inc. Slide 5-15


Malicious Code
 Viruses: computer program that as ability to replicate and
spread to other files; most also deliver a “payload” of
some sort (may be destructive or benign); include macro
viruses, file-infecting viruses and script viruses
 Worms: designed to spread from computer to computer
 Trojan horse: appears to be benign, but then does
something other than expected
 Bad applets (malicious mobile code): malicious Java
applets or ActiveX controls that may be downloaded onto
client and activated merely by surfing to a Web site

Copyright © 2004 Pearson Education, Inc. Slide 5-16


Examples of Malicious Code
Table 5.2, Page 263

Copyright © 2004 Pearson Education, Inc. Slide 5-17


Hacking and Cybervandalism
 Hacker: Individual who intends to gain unauthorized access to
a computer systems
 Cracker: Used to denote hacker with criminal intent (two terms
often used interchangeably)
 Cybervandalism: Intentionally disrupting, defacing or destroying
a Web site
 Types of hackers include:
 White hats – Members of “tiger teams” used by corporate
security departments to test their own security measures
 Black hats – Act with the intention of causing harm
 Grey hats – Believe they are pursuing some greater good by
breaking in and revealing system flaws

Copyright © 2004 Pearson Education, Inc. Slide 5-18


Credit Card Fraud
 Fear that credit card information will be stolen
deters online purchases
 Hackers target credit card files and other
customer information files on merchant
servers; use stolen data to establish credit
under false identity
 One solution: New identity verification
mechanisms

Copyright © 2004 Pearson Education, Inc. Slide 5-19


Insight on Society: E-Signatures –
Bane or Boon to E-commerce?
 Electronic Signatures in Global and National
Commerce Act (E-Sign Law): Went into effect
October 2001
 Gives as much legal weight to electronic
signature as to traditional version
 Thus far not much impact
 Companies such as Silanis and others still
moving ahead with new e-signature options

Copyright © 2004 Pearson Education, Inc. Slide 5-20


Spoofing, DoS and dDoS
Attacks, Sniffing, Insider Jobs
 Spoofing: Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else
 Denial of service (DoS) attack: Hackers flood Web site
with useless traffic to inundate and overwhelm network
 Distributed denial of service (dDoS) attack: hackers use
numerous computers to attack target network from
numerous launch points
 Sniffing: type of eavesdropping program that monitors
information traveling over a network; enables hackers to
steal proprietary information from anywhere on a network
 Insider jobs:single largest financial threat

Copyright © 2004 Pearson Education, Inc. Slide 5-21


Technology Solutions
 Protecting Internet communications
(encryption)
 Securing channels of communication (SSL,
S-HTTP, VPNs)
 Protecting networks (firewalls)
 Protecting servers and clients

Copyright © 2004 Pearson Education, Inc. Slide 5-22


Tools Available to Achieve Site Security
Figure 5.5, Page 269

Copyright © 2004 Pearson Education, Inc. Slide 5-23


Protecting Internet
Communications: Encryption
 Encryption: The process of transforming plain text or
data into cipher text that cannot be read by anyone
other than the sender and receiver
 Purpose:
 Secure stored information
 Secure information transmission
 Provides:
 Message integrity
 Nonrepudiation
 Authentication
 Confidentiality

Copyright © 2004 Pearson Education, Inc. Slide 5-24


Symmetric Key Encryption
 Also known as secret key encryption
 Both the sender and receiver use the same
digital key to encrypt and decrypt message
 Requires a different set of keys for each
transaction
 Data Encryption Standard (DES): Most widely
used symmetric key encryption today; uses
56-bit encryption key; other types use 128-bit
keys up through 2048 bits

Copyright © 2004 Pearson Education, Inc. Slide 5-25


Public Key Encryption
 Public key cryptography solves symmetric key
encryption problem of having to exchange secret key
 Uses two mathematically related digital keys – public
key (widely disseminated) and private key (kept
secret by owner)
 Both keys are used to encrypt and decrypt message
 Once key is used to encrypt message, same key
cannot be used to decrypt message
 For example, sender uses recipient’s public key to
encrypt message; recipient uses his/her private key
to decrypt it

Copyright © 2004 Pearson Education, Inc. Slide 5-26


Public Key Cryptography – A
Simple Case
Figure 5.6, Page 273

Copyright © 2004 Pearson Education, Inc. Slide 5-27


Public Key Encryption using Digital
Signatures and Hash Digests
 Application of hash function (mathematical
algorithm) by sender prior to encryption
produces hash digest that recipient can use
to verify integrity of data
 Double encryption with sender’s private key
(digital signature) helps ensure authenticity
and nonrepudiation

Copyright © 2004 Pearson Education, Inc. Slide 5-28


Public Key Cryptography with
Digital Signatures
Figure 5.7, Page 274

Copyright © 2004 Pearson Education, Inc. Slide 5-29


Digital Envelopes
 Addresses weaknesses of public key
encryption (computationally slow, decreases
transmission speed, increases processing
time) and symmetric key encryption (faster,
but more secure)
 Uses symmetric key encryption to encrypt
document but public key encryption to
encrypt and send symmetric key

Copyright © 2004 Pearson Education, Inc. Slide 5-30


Public Key Cryptography:
Creating a Digital Envelope
Figure 5.8, Page 276

Copyright © 2004 Pearson Education, Inc. Slide 5-31


Digital Certificates and Public Key
Infrastructure (PKI)
 Digital certificate: Digital document that includes:
 Name of subject or company
 Subject’s public key
 Digital certificate serial number
 Expiration date
 Issuance date
 Digital signature of certification authority (trusted third
party (institution) that issues certificate
 Other identifying information
 Public Key Infrastructure (PKI): refers to the CAs and digital
certificate procedures that are accepted by all parties

Copyright © 2004 Pearson Education, Inc. Slide 5-32


Digital Certificates and
Certification Authorities
Figure 5.9, Page 278

Copyright © 2004 Pearson Education, Inc. Slide 5-33


Limits to Encryption Solutions
 PKI applies mainly to protecting messages in
transit
 PKI is not effective against insiders
 Protection of private keys by individuals may be
haphazard
 No guarantee that verifying computer of merchant
is secure
 CAs are unregulated, self-selecting organizations

Copyright © 2004 Pearson Education, Inc. Slide 5-34


Insight on Technology: Advances in
Quantum Cryptography May Lead to the
Unbreakable Key
 Existing encryption systems are subject to failure as
computers become more powerful
 Scientists at Northwestern University have developed
a high-speed quantum cryptography method
 Uses lasers and optical technology and a form of
secret (symmetric) key encryption
 Message is encoded using granularity of light
(quantum noise); pattern is revealed only through use
of secret key

Copyright © 2004 Pearson Education, Inc. Slide 5-35


Securing Channels of Communication
 Secure Sockets Layer (SSL): Most common form of
securing channels of communication; used to
establish a secure negotiated session (client-server
session in which URL of requested document, along
with contents, is encrypted)
 S-HTTP: Alternative method; provides a secure
message-oriented communications protocol designed
for use in conjunction with HTTP
 Virtual Private Networks (VPNs): Allow remote users
to securely access internal networks via the Internet,
using Point-to-Point Tunneling Protocol (PPTP)

Copyright © 2004 Pearson Education, Inc. Slide 5-36


Secure Negotiated Sessions Using SSL
Figure 5.10, Page 282

Copyright © 2004 Pearson Education, Inc. Slide 5-37


Protecting Networks: Firewalls
and Proxy Servers
 Firewall: Software application that acts as a filter
between a company’s private network and the
Internet
 Firewall methods include:
 Packet filters
 Application gateways
 Proxy servers: Software servers that handle all
communications originating from for being sent to the
Internet (act as “spokesperson” or “bodyguard” for
the organization)

Copyright © 2004 Pearson Education, Inc. Slide 5-38


Firewalls and Proxy Servers
Figure 5.11, Page 284

Copyright © 2004 Pearson Education, Inc. Slide 5-39


Protecting Servers and Clients
 Operating system controls: Authentication
and access control mechanisms
 Anti-virus software: Easiest and least
expensive way to prevent threats to system
integrity

Copyright © 2004 Pearson Education, Inc. Slide 5-40


A Security Plan: Management Policies
 Steps in developing a security plan:
 Perform risk assessment – assessment of risks and points of
vulnerability
 Develop security policy – set of statements prioritizing information
risks, identifying acceptable risk targets and identifying mechanisms
for achieving targets
 Develop implementation plan – action steps needed to achieve
security plan goals
 Create security organization – in charge of security; educates and
trains users, keeps management aware of security issues;
administers access controls, authentication procedures and
authorization policies
 Perform security audit – review of security practices and procedures

Copyright © 2004 Pearson Education, Inc. Slide 5-41


Developing an E-commerce
Security Plan
Figure 5.12, Page 286

Copyright © 2004 Pearson Education, Inc. Slide 5-42


Insight on Business: Tiger Teams –
Hiring Hackers to Locate Threats
 Tiger team: Group whose sole job activity is
attempting to break into a site
 Originated in 1970s with U.S. Air Force
 By 1980s-1990s, had spread to corporate
arena
 Most use just “white hats” and refuse to hire
known grey or black hats

Copyright © 2004 Pearson Education, Inc. Slide 5-43


The Role of Laws and Public Policy
 New laws have granted local and national authorities
new tools and mechanisms for identifying, tracing
and prosecuting cybercriminals
 National Infrastructure Protection Center – unit within
FBI whose mission is to identify and combat threats
against U.S. technology and telecommunications
infrastructure
 USA Patriot Act
 Homeland Security Act
 Government policies and controls on encryption
software

Copyright © 2004 Pearson Education, Inc. Slide 5-44


E-commerce Security Legislation
Table 5.3, Page 290

Copyright © 2004 Pearson Education, Inc. Slide 5-45


Government Efforts to Regulate
and Control Encryption
Table 5.4,
Page 292

Copyright © 2004 Pearson Education, Inc. Slide 5-46


OECD Guidelines
 2002 Organization for Economic Cooperation and
Development (OECD) Guidelines for the Security of
Information Systems and Networks has Nine principles:
 Awareness
 Responsibility
 Response
 Ethics
 Democracy
 Risk assessment
 Security design and implementation
 Security management
 Reassessment

Copyright © 2004 Pearson Education, Inc. Slide 5-47


VeriSign: The Web’s Security Blanket
Page 294

Copyright © 2004 Pearson Education, Inc. Slide 5-48


Case Study: VeriSign: The
Web’s Security Blanket
 University of Pittsburgh’s e-Store an example of Internet
trust (security) services offered by VeriSign
 VeriSign has grown early expertise in public key
encryption into related Internet security infrastructure
businesses
 Dominates the Web site encryption services market with
over 75% market share
 Provides secure payment services
 Provides businesses and government agencies with
managed security services
 Provides domain name registration, and manages the
.com and .net domains

Copyright © 2004 Pearson Education, Inc. Slide 5-49

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy