Chapter 10: Electronic Commerce Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Other Organizations

1989: System Administrator, Audit, Network and Security (SANS) Institute -Education and research efforts -->Research reports, security alerts, and white papers -SANS Internet Storm Center Web site -->Current information on location, intensity of computer attacks worldwide CERIAS (Center for Education and Research in Information Assurance and Security) -Multidisciplinary information security research and education Center for Internet Security -Not-for-profit cooperative organization -Helps electronic commerce companies CSO Online -Articles from CSO Magazine -Computer security-related news items Infosecurity -Articles about all types of online security issues

Active Content

Active content -Program runs when client device loads Web page -Example actions: play audio, display moving graphics, place items into shopping cart Advantages -Moves processing work from server to client device Disadvantages -Can pose a threat to client device Methods to deliver active content -Cookies, Java applets, JavaScript, VBScript, ActiveX controls, graphics, Web browser plug-ins, e-mail attachments Scripting languages: provide executable script -Examples: JavaScript and VBScript Applet: small application program -Typically runs within Web browser -Most browsers include tools limiting applets' actions Active content modules -Embedded in Web pages ActiveX controls -Objects containing programs or properties -Placed on Web pages to perform particular tasks -Run only on Windows operating systems -Give full access to client system resources Crackers: embed malicious active content Trojan horse -Program hidden inside another program or Web page -Masking true purpose -May result in secrecy and integrity violations Zombie (Trojan horse) -Secretly takes over another computer -Launches attacks on other computers Botnet (robotic network, zombie farm) -All controlled computers act as an attacking unit

Integrity Threats

Also known as active wiretapping -Unauthorized party alters message information stream Integrity violation examples -Cybervandalism -->Electronic defacing of Web site Masquerading (spoofing) -Pretending to be someone else -Fake Web site representing itself as original Domain name servers (DNSs) Internet computers maintaining directories -Linking domain names to IP addresses Perpetrators use software security hole -Substitute their Web site address in place of real one -Spoofs Web site visitors Phishing expeditions -Victim tricked into disclosing confidential information -Common victims: online banking or payment system users

Necessity Threats

Also known as delay, denial, and denial-of-service (DoS) attack -Disrupt or deny normal computer processing -Intolerably slow-speed computer processing -Renders service unusable or unattractive Distributed denial-of-service (DDoS) attack -Launch simultaneous attack on a Web site via botnets DoS attacks -Remove information altogether -Delete transmission or file information Denial attack examples -Quicken accounting program diverted money to perpetrator's bank account -Company receives flood of data packets -->Overwhelms sites' servers -->Chokes off legitimate customers' access

Physical Security for Client Devices

Client computers -Control important business functions -Same physical security as early systems New physical security technologies -Fingerprint readers (less than $100) --Stronger protection than password approaches Biometric security device -Identification using part of person's biological makeup -Examples: signature recognition, eye scanners, palm scanners, reading back of hand vein pattern

CERT

Computer Emergency Response Team Housed at Carnegie Mellon University -Software Engineering Institute Maintains effective, quick communications infrastructure among security experts -Security incidents avoided, handled quickly Provides security risk information Posts security event alerts Primary authoritative source for viruses, worms, and other types of attack information

Computer Forensics and Ethical Hacking

Computer forensics experts (ethical hackers) -Computer sleuths hired to probe PCs -Locate information usable in legal proceedings -Job of breaking into client computers Computer forensics field -Responsible for collection, preservation, and computer-related evidence analysis Companies hire ethical hackers to test computer security safeguards

Computer Security and Risk Management

Computer security -Asset protection from unauthorized access, use, alteration, and destruction Physical security -Includes tangible protection devices --Alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings Logical security -Asset protection using nonphysical means Threat -Any act or object posing danger to computer assets Countermeasure -Procedure (physical or logical) --Recognizes, reduces, and eliminates threat -Extent and expense of countermeasures --Vary depending on asset importance

Digital Certificates

Digital certificate (digital ID) -E-mail message attachment or program embedded in Web page -Verifies sender or Web site -Contains a means to send encrypted message -Signed message or code --Provides proof of holder identified by the certificate -Used for online transactions --Electronic commerce, electronic mail, and electronic funds transfers

Computer Security and Risk Management Contd.

Electronic threat examples -Impostors, eavesdroppers, thieves Eavesdropper (person or device) -Listens in on and copies Internet transmissions Crackers or hackers (people) -Write programs; manipulate technologies -Obtain unauthorized access to computers and networks White hat hacker and black hat hacker -Distinction between good hackers and bad hackers Good security scheme implementation -Identify risks -Determine how to protect threatened assets -Calculate costs to protect assets

Encryption Solutions

Encryption: coding information using mathematically based program, secret key Cryptography: science studying encryption -Science of creating messages only sender and receiver can read Steganography -Makes text undetectable to naked eye Cryptography converts text to other visible text -With no apparent meaning

Firewalls

Firewall -Software, hardware-software combination -Installed in a network to control packet traffic Placed at Internet entry point of network -Defense between network and the Internet -Between network and any other network Principles -All traffic must pass through it -Only authorized traffic allowed to pass -Immune to penetration Trusted: networks inside firewall Untrusted: networks outside firewall Filter permits selected messages though network Separate corporate networks from one another -Coarse need-to-know filter -Firewalls segment corporate network into secure zones Large organizations with multiple sites -Install firewall at each location -All locations follow same security policy

Organizations that Promote Computer Security

Following the Internet Worm of 1988 -Organizations formed to share information -->About threats to computer systems Principle followed -Sharing information about attacks and defenses for attacks -->Helps everyone create better computer security

Intro

Government and large business Web sites constantly under attack from intruders Several incidents in 2009 -Sensitive military data stolen -North Korean and Chinese governments may have been involved Threats are constantly changing

Graphics and Plug-Ins

Graphics, browser plug-ins, and e-mail attachments can harbor executable content Graphic: embedded code can harm client computer Browser plug-ins (programs) -Enhance browser capabilities -Can pose security threats -Plug-ins executing commands buried within media

Online Security Issues Overview

Individuals and businesses concerned about security -Since Internet became a business communications tool Concerns increasing with steady increase in sales and all types of financial transactions Chapter topics -Key security problems -Solutions to those problems

Communication Channel Security

Internet -Not designed to be secure -Designed to provide redundancy -Remains unchanged from original insecure state Message traveling on the Internet -Subject to secrecy, integrity, and necessity threats

Cookies and Web Bugs

Internet connection between Web clients and servers -Multiple independent transmissions -No continuous connection (open session) maintained between any client and server Cookies -Small text files Web servers place on Web client -Identify returning visitors -Allow continuing open session Cookie sources -First-party cookies Web server site places them on client computer Third-party cookies -Different Web site places them on client computer Disable cookies entirely for complete cookie protection Disadvantages -Useful cookies blocked (along with others) -Full site resources not available Web browser cookie management functions -Refuse only third-party cookies -Review each cookie before allowing -Provided by most Web browsers Web bug -Tiny graphic that third-party Web site places on another site's Web page -Provides method for third-party site to place cookie on visitor's computer Web bugs (also called "clear GIFs" or "1-by-1 GIFs") -Graphics created in GIF format -Color value of "transparent" -As small as 1 pixel by 1 pixel

Threats of Physical Security of Internet Communications Channels

Internet's packet-based network design -Precludes it from being shut down by attack on single communications link Individual user's Internet service can be interrupted -Destruction of user's Internet link Larger companies, organizations -Use more than one link to main Internet backbone

Other Software-Based Threats

Java or C++ programs executed by server -Passed to Web servers by client or reside on server -Use a buffer -->Memory area set aside holding data read from file or database Buffer overrun (buffer overflow) error -Programs overfill buffer -->Cause: error in program or intentional -Excess data spills outside designated buffer memory -1998 Internet worm Insidious version of buffer overflow attack -Writes instructions into critical memory locations -Web server resumes execution by loading internal registers with address of attacking program's code Reducing potential buffer overflow damage -Good programming practices -Some hardware functionality Mail bomb attack -Hundreds or thousands of people send message to particular address

Origins of Security on Interconnected Computer Systems

Modern computer security techniques -Developed by US Department of Defense --"Orange Book": rules for mandatory access control Business computers -Initially adopted military's security methods Networks -Increased number of users accessing computers Computers now transmit valuable information

Viruses, Worms, and Antivirus Software

Programs display e-mail attachments by automatically executing associated programs -Macro viruses within attached files can cause damage Virus: software -Attaches itself to another program -Causes damage when host program activated Worm: virus -Replicates itself on computers it infects -Spreads quickly through the Internet Antivirus software -Detects viruses and worms -Either deletes or isolates them on client computer Companies that track viruses, sell antivirus software, provide virus descriptions on Web sites -Symantec (Symantec Security Response) -McAfee (McAfee Virus Information) Data files must be updated regularly -Recognize and eliminate newest viruses Some Web e-mail systems provide antivirus software -Scan attachments before downloading -Examples: Yahoo! Mail, Gmail

Secure Sockets Layer (SSL) Protcol

Provides security "handshake" Client and server exchange brief burst of messages All communication encrypted -Eavesdropper receives unintelligible information Secures many different communication types -HTTP, FTP, Telnet HTTPS: protocol implementing SSL -Precede URL with protocol name HTTPS

Secrecy Threats

Secrecy -Prevention of unauthorized information disclosure -Technical issue -->Requiring sophisticated physical and logical mechanisms Privacy -Protection of individual rights to nondisclosure -Legal matter E-mail message -Secrecy violations protected using encryption -->Protects outgoing messages -Privacy issues address whether supervisors are permitted to read employees' messages randomly Electronic commerce threat -Sensitive or personal information theft Sniffer programs -Record information passing through computer or router Backdoor: an electronic "hole" -Left open accidentally or intentionally -Content exposed to secrecy threats -Example: Cart32 shopping cart program backdoor Stolen corporate information -Eavesdropper example Web users continually reveal information -Secrecy breach -Possible solution: anonymous Web services

Elements of Computer Security

Secrecy -Protecting against unauthorized data disclosure -Ensuring data source authenticity Integrity -Preventing unauthorized data modification -Man-in-the-middle exploit --E-mail contents changed before forwarded to original destination Necessity -Preventing data delays or denials (removal)

Client Security for Mobile Devices

Security measures -Access password -Remote wipe: clears all personal data -->Can be added as an app -->Capability through corporate e-mail synchronization -Antivirus software Rogue apps: contain malware or collect information and forward to perpetrators -Apple App Store tests apps before authorizing sales -Android market does less extensive testing

Establishing a Security Policy

Security policy elements -Assets to protect and why -Protection responsibility -Acceptable and unacceptable behaviors -Physical and network security, access authorizations, virus protection, disaster recovery Corporate information classifications -Public -Company confidential Steps to create security policy -Determine which assets to protect from which threats -Determine access needs to various system parts -Identify resources to protect assets -Develop written security policy -Commit resources Comprehensive security plan goals -Protect privacy, integrity and availability -Authenticate users -Selected to satisfy Figure 10-2 requirements Security policy points -Authentication: Who is trying to access site? -Access control: Who is allowed to log on to and access site? -Secrecy: Who is permitted to view selected information? -Data integrity: Who is allowed to change data? -Audit: Who or what causes specific events to occur, and when?

Password Attack Threats

Sensitive file on Web server -Holds Web server username-password pairs -Solution: store authentication information in encrypted form Passwords threats -Dictionary attack programs cycle through electronic dictionary, trying every word as password -Solutions -->User password requirements -->Use password assignment software to check user password against dictionary Help creating very strong passwords -Gibson Research Corporation's Ultra High Security Password Generator

Steganography

Steganography -Hiding information within another piece of information Can be used for malicious purposes Hiding encrypted file within another file -Casual observer cannot detect anything of importance in container file -Two-step process -->Encrypting file protects it from being read -->Steganography makes it invisible Al Qaeda used steganography to hide attack orders

Encryption in Web Browsers

Two approaches used to establish secure connections between Web servers and clients -Secure Sockets Layer (SSL) -->Goal: secures connections between two computers -Secure Hypertext Transfer Protocol (S-HTTP) -->Goal: send individual messages securely

Database Threats

Usernames and passwords -Stored in unencrypted table in some databases -Database fails to enforce security -->Relies on Web server to enforce security Unauthorized users -Masquerade as legitimate database users Trojan horse programs hide within database system -Reveal information -Remove all access controls within database

Threats to Wireless Networks

Wireless Encryption Protocol (WEP) -Rule set for encrypting transmissions from the wireless devices to the wireless access points (WAPs) Wardrivers -Attackers drive around in cars -Search for accessible networks Warchalking -Place chalk mark on building -->Identifies easily entered wireless network nearby -Web sites include wireless access locations maps Preventing attacks by wardrivers -Turn on WEP -Change default login and password settings Example -Best Buy wireless point-of-sale (POS) -Failed to enable WEP -Customer launched sniffer program -->Intercepted data from POS terminals


Conjuntos de estudio relacionados

Chapter 11: Traditional Leadership Approaches

View Set

Georgia law, rules and regulations

View Set

(4) Ch. 26: Infectious Disease Prevention and Control

View Set

Test 4: Chapters 6,7,8 (Macro Economics)

View Set

Act cH4 + subject verb agreement

View Set