SlideShare uma empresa Scribd logo
1 de 38
ECOMMERCE:
SECURITY
OVERVIEW
Why are modern day information systems so vulnerable
to destruction, error, abuse, and system quality
problems?
What types of controls are available for ecommerce
systems?
What special measures must be taken to ensure the
reliability, availability and security of electronic
commerce and digital business processes?
Why are auditing ecommerce systems and safeguarding
data quality so important?
THE BUSINESS
PREDICAMENT
Do we design systems that over-controlled, and therefore not
functional, or unrestricted and under-controlled?
How do we applying quality assurance standards in large
ecommerce systems projects
THE BUSINESS
PREDICAMENTThe major concerns for businesses
Disaster
 The possible destruction of computer hardware, programs, data files,
and other equipment
Security
 Preventing unauthorized access, alteration, theft, or physical damage
to equipment
Errors
 Computer actions that may disrupt or destroy organization’s record-
keeping and operations
Bugs
 Program code defects or errors
Maintenance Nightmare
 Maintenance costs high due to organizational change, software
complexity, and faulty system analysis and design
THE GENERAL PROCESSING
MODEL
Unfortunately, all of these stages
can contain elements of failure,
unless a strategy is implemented,
and software quality assurance
standards are implemented
Figure 1
THE COST OF POOR
DESIGN
Figure 2
THE BUSINESS
PREDICAMENTControl
What is needed?
 Methods, policies, and procedures
Why is it needed?
 Ecommerce systems may provide (limited) access to a business
central infrastructure
 Ensures protection of organization’s assets
 Ensures accuracy and reliability of records, and operational
adherence to management standards
When should this occur?
 From the ideas inception, to the completion of the ecommerce
system
CONTROLLING OUR
ECOMMERCE PLANAt a business level:
Market research into user needs, and identified areas for
business expansion
A business and financial plan for forecasting frequency of
use, and suspected revenue turnover
A strategy on how to implement this plan, alongside our
current business plan (if we are expanding a “brick and
mortar” business that is).
 A review of our internal technical skills – are our staff
competent enough to implement this, or should we
outsource.
CONTROLLING OUR
ECOMMERCE PLANGeneral controls
Establish framework for controlling design, security, and
use of computer programs
Include software, hardware, computer operations, data
security, implementation, and administrative controls.
These may include:
 Personnel controls: Ensuring that only authorised personal
undertake elements of the project
 Customer controls: Ensuring that protection is provided from the
global customer layer of the ecommerce system, to the business
infrastructure layer of business operations
CONTROLLING OUR
ECOMMERCE PLANProtecting our company
On-line transaction processing: Transactions entered
online are immediately processed by computer, and
recorded for audit
Fault-tolerant computer systems: Contain extra hardware,
software, and power supply components in case of
element failure
High-availability computing: Tools and technologies
enabling system to recover from a crash, or power cut
Disaster recovery plan: Plan of action in case of
ecommerce system failure. Ask yourself the question, if
we trade online and the “shop front” is gone, how do we
trade?
Load balancing: Heavy traffic will need distribution over a
large servers
CONTROLLING OUR
ECOMMERCE PLAN
Protecting our company
Mirroring: Duplicating all processes and transactions of
ecommerce on backup server to prevent any interruption
Clustering: Linking two computers together so that a
second computer can act as a backup to the primary
computer or speed up processing
Firewalls: For prevent unauthorised users from accessing
a private internal network, or accessing private data. Don’t
forget this covered under the data protection act.
Intrusion Detection Systems or Personnel to monitor
vulnerable points in the network to detect or deter
unauthorized intruders
CONTROLLING OUR
ECOMMERCE PLAN
How many of you have assumed that security of ecommerce
systems is an Internet threat only?
I would bet the majority of you…..
Now we need to forget that we have planned for ecommerce
systems, and consider in depth our security issues
We shall look at security in terms of the whole networked
community, not just ecommerce.
Why? Because security is more often than not overlooked at a local
level, never mind at a global level!
Security is a major concern, not just at a global interface level, but
at an internal business level too…
SECURITY
This raises big questions…..
What is security?
What constitutes security?
What examples can we provide of security?
SECURITY NEEDS
Who says we need security?:
Data Protection Acts 1984 & 98
Telecommunications (Lawful Business Practice)
(Interception of Communications) Regulations 2000
Allows employers to monitor or record communications
without consent
to establish the existence of facts relevant to the business
to ascertain compliance with regulations
to ascertain standards which ought to be achieved by staff
to detect unauthorised use
INFORMATION SECURITY
Reformed:
Two major reforms over
last several decades
 Computer Security
 Network Security
Widespread use of data
processing
Security previously
handled by:
 Physical means: Filing
cabinet and lock
 Administrative means:
Personnel
Computers
Introduction meant that
new regulations had to
be imposed by
organisations to secure
data
Shared systems, were
worse because of
sending / retrieving data
of numerous systems
INFORMATION SECURITY
Routing Services
Security Office
Server Protection
WHY THE REFORMS?
Computer Security:
Evolved with the need
to protect data
Needed to prevent
hackers
Needed to abide by
data protection act
Network Security:
Heightened by the need
for distributed systems
Heightened by the need
for secure networks and
communications
Need to protect data
during transmission
Ensure data is authentic
LOCAL INFORMATION
SECURITY
Various methods available:
DVD-RAM Drive
SAN’s
RAID Arrays
Most efficient (and common) method:
DAT / DLT
Data security is big business!
Storage “off-site”
Storage in safes
 Fireproof!
 Bombproof!
SECURITY
REQUIREMENTSClassified in three ways:
Confidentiality:
 Authorised parties can read the data
 Disclosure of data to relevant source
Integrity:
 Authorised parties can modify the data
 Changes status of the data by relevant source
Availability:
 Authorised parties can access the data
WHAT NEXT?
We have planned….
We have designed….
We have restricted access….
We have investigated our needs….
We then sit back and wait while our systems are attacked….
NETWORK ATTACKS!
Passive:
“Eavesdropping”
“Release of message contents”:
 Extracting information from mail messages, telephone
conversations etc
“Traffic Analysis”:
 Analysis of message lengths, Tx & Rx, to guess the types of
information being Tx & Rx.
NETWORK ATTACKS
Active Attacks:
 “Masquerade”:
 One node pretends to be another node.
 Tx is fooled into thinking that Rx has received message.
 “Replay”:
 Captures data and then retransmits to fool Tx into thinking the message
was unauthorised
 “Modification of Message”:
 The Tx message is intercepted, and modified to the intruders benefit – e.g.
Funds Balances etc.
 Message is forwarded to intended Rx
 “Denial of Service”
 Inhibits or hinders data communications traffic, but targeting the
management and communications facilities
NETWORK ATTACKS
Passive:
Sniffers / Probes
Difficult to detect
Do not alter data
Can prevent these
attacks
Prevention, rather
than detection
Active:
Opposite to passive
Difficult to prevent
(Could be done by
physical protection)
Detect, and recover
Detection can also be
a prevention, as
intruder is often found
NETWORK ATTACKS
Passive Threats Active Threats
Release of
message
content
Traffic analysis Masquerade Replay Modification of
message
contents
Denial of
service
GLOBAL ELECTRONIC
SECURITY-ENCRYPTION
Automation
 Automation of Tx and Rx is done through encryption
 This ensures authenticated and unique data
 Provides a security layer to the network
Encryption:
 We shall look at encryption in two ways:
 Symmetric Encryption
 Public-key Encryption (Asymmetric)
 Well known examples
 THWATE
 Comodo
 Both versions of Verisign SSL.
ENCRYPTION
Symmetric (Single Key):
Pre-1970’s public key encryption standard
Stallings (2000) says that the idea has been used
by such adversaries as Julius Caesar and the
German U-Boot commanders
Requirements for symmetric encryption:
Strong algorithm to protect the key
Even if intruder access message, key should be
protected
Tx & Rx must obtain the secret key in a secret fashion
ENCRYPTION
Symmetric (Single Key):
 Encryption is made up of 5 major areas:
 Plaintext: Original method before encryption
 Encryption algorithm: Transforms plain text
 Secret Key: Provides extra substitutions and transformations to the Encryption Algorithm
 Ciphertext: The new message that is created to be sent
 Decryption algorithm: The encryption & secret key in reverse algorithm
ENCRYPTION
Symmetric:
Plain
Text
Plain
Text
Ciphertext
Encryption
Algorithm
Decryption
Algorithm
Adapted from Stallings (2000), Figure 18.2, page 653
Secret Key Secret Key
ENCRYPTION
Symmetric – Breaking the code:
Cryptanalysis:
Utilise analysis of the ciphertext to attempt to produce a
secret key.
Sometimes pairs two ciphertexts to attempt to deduce a
common encoding
If key is found, all future messages using that key are
compromised
Brute-force:
Attempts to try every combination of secret keys on the
ciphertext to deduce the plain text.
ENCRYPTION
Stallings (2000) quotes the times for breaking a secret key as
follows:
Key Size (bits) Number of
alternative keys
Time required to
decode at 1
Encryption per uS
Time required to
decode at 1 million
Encryption per uS
32 4.3 x 109
35.8 Minutes 2.15 milliseconds
56 7.2 x 1016
1142 years 10.01 hours
128 3.4 x 1038
5.4 x 1024
years 5.4 x 1018
years
168 3.7 x 1050
5.9 x 1036
years 5.9 x 1030
years
ENCRYPTION
Public Key:
Biggest advancement in encryption in years –
because it use Mathematics to calculate the key.
Public key cryptography uses two keys, rather than
one – hence, sometimes referred to asymmetric.
Symmetric encryption is still in use, and will
continue to be
This is because of the computational overhead
associated with public key encryption
ENCRYPTION
Asymmetric (Public Key):
Encryption is made up of 5(6) major areas:
Plaintext: Original method before encryption
Encryption algorithm: Transforms plain text
Public and Private Key: Pair of keys that have been selected
for encryption. One is used as encryption, one as decryption.
Ciphertext: The two new messages that are created to be
sent, one by the public key, and one by the private key
Decryption algorithm: The encryption & secret key in reverse
algorithm
ENCRYPTION
In English:
1. Each user generates a pair of keys for
encryption and decryption.
2. Each user places the public key in an
accessible file. The companion private key is
kept private.
3. If A wishes to send a message to B, A
encrypts the message using B’s public key.
4. When B receives the message, B decrypts the
message using it’s own private key. No one
else can, because no-one else uses B’s
private key
DIGITAL SIGNATURES
Confirming the source:
Used extensively now due to the Internet
When a digital signature is sent to the receiver, the
message is encoded using the senders private key
At the receiving end, the message should be able to be
decoded using the senders public key.
If it can be decoded, it can be assumed that the sender
must have made the message and it’s okay
If it can’t be decoded, it can be assumed that the
sender couldn’t have made the message, and should
be disposed of.
PROTECTING YOURSELF
Ports
 Open ports allow access to a variety of problems
 Port Scanner
 Nanoprobe
 Finding an open port tells you what services are available!
 Close down as many as necessary to make the system secure.
FIREWALLS
Firewalls:
 Firewalls are used to limit or allow connections through a network
 Firewalls are gateways that provide this
 They can limit or allow connections based on:
 IP Address
 Port Number
 If you like firewalls are watchdogs for your computer’s open doors.
SECURITY CHALLENGES
Figure 3
OVERVIEW OF
ELECTRONIC SECURITY
METHODSEncryption: Encoding and scrambling of messages to prevent their
access without specific authorization. Most commonly used when
transferring sensitive data electronically across (e.g.) the Internet
Authentication: Providing secure mechanisms for accessing specific
elements of the ecommerce system. Most common method is
registration with the ecommerce system, and using usernames and
passwords.
Digital signature: Digital code attached to electronically transmitted
message to uniquely identify contents and sender. Implemented
when receiver needs to be assured of author of message (adopted
now in hardware and operating system drivers)
Digital certificate: Attachment to electronic message to verify the
sender and to provide receiver with means to encode reply
Secure Electronic Transaction (SET): Standard for securing credit
card transactions over Internet and other networks

Mais conteúdo relacionado

Mais procurados

Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securityelmira282
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A PrimerJohn ILIADIS
 
Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measuresJeril Peter
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in DatabaseMentalist Akram
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commercenikitaTahilyani1
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E CommerceEamonnORagh
 

Mais procurados (20)

Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
E commerce
E commerceE commerce
E commerce
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
E commerce security
E commerce securityE commerce security
E commerce security
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measures
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 

Destaque

08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerceRebecca Jones
 
Designing e-commerce user interfaces
Designing e-commerce user interfacesDesigning e-commerce user interfaces
Designing e-commerce user interfacesLawrenceNajjar
 
P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questionsRebecca Jones
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmasterRebecca Jones
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttonsRebecca Jones
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycleRebecca Jones
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecificationRebecca Jones
 
E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)mmousavi
 
Session#3; enterprise e business & e-commerce systems
Session#3; enterprise e business & e-commerce systemsSession#3; enterprise e business & e-commerce systems
Session#3; enterprise e business & e-commerce systemsOmid Aminzadeh Gohari
 
Signing Up To Tumblr
Signing Up To TumblrSigning Up To Tumblr
Signing Up To TumblrjbellWCT
 
Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2Ivan Rabrenovic
 
02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicformsRebecca Jones
 
05 access howtolookupselect
05 access howtolookupselect05 access howtolookupselect
05 access howtolookupselectRebecca Jones
 
Zaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanjuZaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanjuMaja Todorovic
 

Destaque (20)

08 benefits of e-commerce
08 benefits of e-commerce08 benefits of e-commerce
08 benefits of e-commerce
 
Designing e-commerce user interfaces
Designing e-commerce user interfacesDesigning e-commerce user interfaces
Designing e-commerce user interfaces
 
P2 functions and equations from a graph questions
P2  functions and equations from a graph questionsP2  functions and equations from a graph questions
P2 functions and equations from a graph questions
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
03 access howtofrmmaster
03 access howtofrmmaster03 access howtofrmmaster
03 access howtofrmmaster
 
04 access howtobuttons
04 access howtobuttons04 access howtobuttons
04 access howtobuttons
 
Software development lifecycle
Software development lifecycleSoftware development lifecycle
Software development lifecycle
 
03 analysis of_requirementsspecification
03 analysis of_requirementsspecification03 analysis of_requirementsspecification
03 analysis of_requirementsspecification
 
E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)
 
Session#3; enterprise e business & e-commerce systems
Session#3; enterprise e business & e-commerce systemsSession#3; enterprise e business & e-commerce systems
Session#3; enterprise e business & e-commerce systems
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E commerce
E commerceE commerce
E commerce
 
Signing Up To Tumblr
Signing Up To TumblrSigning Up To Tumblr
Signing Up To Tumblr
 
Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2
 
02 access howtobasicforms
02 access howtobasicforms02 access howtobasicforms
02 access howtobasicforms
 
7
77
7
 
05 access howtolookupselect
05 access howtolookupselect05 access howtolookupselect
05 access howtolookupselect
 
8
88
8
 
Zaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanjuZaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanju
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 

Semelhante a Ecommerce Security

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...Erin Moore
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 

Semelhante a Ecommerce Security (20)

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...A Brief Note On Companies And The Largest Ever Consumer...
A Brief Note On Companies And The Largest Ever Consumer...
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 

Mais de Rebecca Jones

01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroductionRebecca Jones
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizRebecca Jones
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim bRebecca Jones
 
Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logRebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014Rebecca Jones
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entitiesRebecca Jones
 
18 database features
18 database features18 database features
18 database featuresRebecca Jones
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controlsRebecca Jones
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 
Threats to system power point 1
Threats to system power point 1Threats to system power point 1
Threats to system power point 1Rebecca Jones
 
2.1 environmental science
2.1 environmental science2.1 environmental science
2.1 environmental scienceRebecca Jones
 
4.4 aerobic respiration
4.4 aerobic respiration4.4 aerobic respiration
4.4 aerobic respirationRebecca Jones
 

Mais de Rebecca Jones (17)

01 access howtointroduction
01 access howtointroduction01 access howtointroduction
01 access howtointroduction
 
Fractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quizFractions decimals percentages multiple choice quiz
Fractions decimals percentages multiple choice quiz
 
Btec unit 1 the online world learning aim b
Btec unit 1  the online world learning aim bBtec unit 1  the online world learning aim b
Btec unit 1 the online world learning aim b
 
Intro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_logIntro to functional_skills_and_learning_log
Intro to functional_skills_and_learning_log
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
Pt induction slides 2014
Pt induction slides 2014Pt induction slides 2014
Pt induction slides 2014
 
08 e commerce entities
08 e commerce entities08 e commerce entities
08 e commerce entities
 
18 database features
18 database features18 database features
18 database features
 
1.4 adaptations
1.4 adaptations1.4 adaptations
1.4 adaptations
 
Codesof practice
Codesof practiceCodesof practice
Codesof practice
 
Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controls
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 
Layers of control
Layers of controlLayers of control
Layers of control
 
Threats to system power point 1
Threats to system power point 1Threats to system power point 1
Threats to system power point 1
 
2.1 environmental science
2.1 environmental science2.1 environmental science
2.1 environmental science
 
4.4 aerobic respiration
4.4 aerobic respiration4.4 aerobic respiration
4.4 aerobic respiration
 
Unit 4 it proposal
Unit 4 it proposalUnit 4 it proposal
Unit 4 it proposal
 

Último

Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...pujan9679
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 

Último (20)

WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 

Ecommerce Security

  • 2. OVERVIEW Why are modern day information systems so vulnerable to destruction, error, abuse, and system quality problems? What types of controls are available for ecommerce systems? What special measures must be taken to ensure the reliability, availability and security of electronic commerce and digital business processes? Why are auditing ecommerce systems and safeguarding data quality so important?
  • 3. THE BUSINESS PREDICAMENT Do we design systems that over-controlled, and therefore not functional, or unrestricted and under-controlled? How do we applying quality assurance standards in large ecommerce systems projects
  • 4. THE BUSINESS PREDICAMENTThe major concerns for businesses Disaster  The possible destruction of computer hardware, programs, data files, and other equipment Security  Preventing unauthorized access, alteration, theft, or physical damage to equipment Errors  Computer actions that may disrupt or destroy organization’s record- keeping and operations Bugs  Program code defects or errors Maintenance Nightmare  Maintenance costs high due to organizational change, software complexity, and faulty system analysis and design
  • 5. THE GENERAL PROCESSING MODEL Unfortunately, all of these stages can contain elements of failure, unless a strategy is implemented, and software quality assurance standards are implemented Figure 1
  • 6. THE COST OF POOR DESIGN Figure 2
  • 7. THE BUSINESS PREDICAMENTControl What is needed?  Methods, policies, and procedures Why is it needed?  Ecommerce systems may provide (limited) access to a business central infrastructure  Ensures protection of organization’s assets  Ensures accuracy and reliability of records, and operational adherence to management standards When should this occur?  From the ideas inception, to the completion of the ecommerce system
  • 8. CONTROLLING OUR ECOMMERCE PLANAt a business level: Market research into user needs, and identified areas for business expansion A business and financial plan for forecasting frequency of use, and suspected revenue turnover A strategy on how to implement this plan, alongside our current business plan (if we are expanding a “brick and mortar” business that is).  A review of our internal technical skills – are our staff competent enough to implement this, or should we outsource.
  • 9. CONTROLLING OUR ECOMMERCE PLANGeneral controls Establish framework for controlling design, security, and use of computer programs Include software, hardware, computer operations, data security, implementation, and administrative controls. These may include:  Personnel controls: Ensuring that only authorised personal undertake elements of the project  Customer controls: Ensuring that protection is provided from the global customer layer of the ecommerce system, to the business infrastructure layer of business operations
  • 10. CONTROLLING OUR ECOMMERCE PLANProtecting our company On-line transaction processing: Transactions entered online are immediately processed by computer, and recorded for audit Fault-tolerant computer systems: Contain extra hardware, software, and power supply components in case of element failure High-availability computing: Tools and technologies enabling system to recover from a crash, or power cut Disaster recovery plan: Plan of action in case of ecommerce system failure. Ask yourself the question, if we trade online and the “shop front” is gone, how do we trade? Load balancing: Heavy traffic will need distribution over a large servers
  • 11. CONTROLLING OUR ECOMMERCE PLAN Protecting our company Mirroring: Duplicating all processes and transactions of ecommerce on backup server to prevent any interruption Clustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing Firewalls: For prevent unauthorised users from accessing a private internal network, or accessing private data. Don’t forget this covered under the data protection act. Intrusion Detection Systems or Personnel to monitor vulnerable points in the network to detect or deter unauthorized intruders
  • 12. CONTROLLING OUR ECOMMERCE PLAN How many of you have assumed that security of ecommerce systems is an Internet threat only? I would bet the majority of you….. Now we need to forget that we have planned for ecommerce systems, and consider in depth our security issues We shall look at security in terms of the whole networked community, not just ecommerce. Why? Because security is more often than not overlooked at a local level, never mind at a global level! Security is a major concern, not just at a global interface level, but at an internal business level too…
  • 13. SECURITY This raises big questions….. What is security? What constitutes security? What examples can we provide of security?
  • 14. SECURITY NEEDS Who says we need security?: Data Protection Acts 1984 & 98 Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 Allows employers to monitor or record communications without consent to establish the existence of facts relevant to the business to ascertain compliance with regulations to ascertain standards which ought to be achieved by staff to detect unauthorised use
  • 15. INFORMATION SECURITY Reformed: Two major reforms over last several decades  Computer Security  Network Security Widespread use of data processing Security previously handled by:  Physical means: Filing cabinet and lock  Administrative means: Personnel Computers Introduction meant that new regulations had to be imposed by organisations to secure data Shared systems, were worse because of sending / retrieving data of numerous systems
  • 17. WHY THE REFORMS? Computer Security: Evolved with the need to protect data Needed to prevent hackers Needed to abide by data protection act Network Security: Heightened by the need for distributed systems Heightened by the need for secure networks and communications Need to protect data during transmission Ensure data is authentic
  • 18. LOCAL INFORMATION SECURITY Various methods available: DVD-RAM Drive SAN’s RAID Arrays Most efficient (and common) method: DAT / DLT Data security is big business! Storage “off-site” Storage in safes  Fireproof!  Bombproof!
  • 19. SECURITY REQUIREMENTSClassified in three ways: Confidentiality:  Authorised parties can read the data  Disclosure of data to relevant source Integrity:  Authorised parties can modify the data  Changes status of the data by relevant source Availability:  Authorised parties can access the data
  • 20. WHAT NEXT? We have planned…. We have designed…. We have restricted access…. We have investigated our needs…. We then sit back and wait while our systems are attacked….
  • 21. NETWORK ATTACKS! Passive: “Eavesdropping” “Release of message contents”:  Extracting information from mail messages, telephone conversations etc “Traffic Analysis”:  Analysis of message lengths, Tx & Rx, to guess the types of information being Tx & Rx.
  • 22. NETWORK ATTACKS Active Attacks:  “Masquerade”:  One node pretends to be another node.  Tx is fooled into thinking that Rx has received message.  “Replay”:  Captures data and then retransmits to fool Tx into thinking the message was unauthorised  “Modification of Message”:  The Tx message is intercepted, and modified to the intruders benefit – e.g. Funds Balances etc.  Message is forwarded to intended Rx  “Denial of Service”  Inhibits or hinders data communications traffic, but targeting the management and communications facilities
  • 23. NETWORK ATTACKS Passive: Sniffers / Probes Difficult to detect Do not alter data Can prevent these attacks Prevention, rather than detection Active: Opposite to passive Difficult to prevent (Could be done by physical protection) Detect, and recover Detection can also be a prevention, as intruder is often found
  • 24. NETWORK ATTACKS Passive Threats Active Threats Release of message content Traffic analysis Masquerade Replay Modification of message contents Denial of service
  • 25. GLOBAL ELECTRONIC SECURITY-ENCRYPTION Automation  Automation of Tx and Rx is done through encryption  This ensures authenticated and unique data  Provides a security layer to the network Encryption:  We shall look at encryption in two ways:  Symmetric Encryption  Public-key Encryption (Asymmetric)  Well known examples  THWATE  Comodo  Both versions of Verisign SSL.
  • 26. ENCRYPTION Symmetric (Single Key): Pre-1970’s public key encryption standard Stallings (2000) says that the idea has been used by such adversaries as Julius Caesar and the German U-Boot commanders Requirements for symmetric encryption: Strong algorithm to protect the key Even if intruder access message, key should be protected Tx & Rx must obtain the secret key in a secret fashion
  • 27. ENCRYPTION Symmetric (Single Key):  Encryption is made up of 5 major areas:  Plaintext: Original method before encryption  Encryption algorithm: Transforms plain text  Secret Key: Provides extra substitutions and transformations to the Encryption Algorithm  Ciphertext: The new message that is created to be sent  Decryption algorithm: The encryption & secret key in reverse algorithm
  • 29. ENCRYPTION Symmetric – Breaking the code: Cryptanalysis: Utilise analysis of the ciphertext to attempt to produce a secret key. Sometimes pairs two ciphertexts to attempt to deduce a common encoding If key is found, all future messages using that key are compromised Brute-force: Attempts to try every combination of secret keys on the ciphertext to deduce the plain text.
  • 30. ENCRYPTION Stallings (2000) quotes the times for breaking a secret key as follows: Key Size (bits) Number of alternative keys Time required to decode at 1 Encryption per uS Time required to decode at 1 million Encryption per uS 32 4.3 x 109 35.8 Minutes 2.15 milliseconds 56 7.2 x 1016 1142 years 10.01 hours 128 3.4 x 1038 5.4 x 1024 years 5.4 x 1018 years 168 3.7 x 1050 5.9 x 1036 years 5.9 x 1030 years
  • 31. ENCRYPTION Public Key: Biggest advancement in encryption in years – because it use Mathematics to calculate the key. Public key cryptography uses two keys, rather than one – hence, sometimes referred to asymmetric. Symmetric encryption is still in use, and will continue to be This is because of the computational overhead associated with public key encryption
  • 32. ENCRYPTION Asymmetric (Public Key): Encryption is made up of 5(6) major areas: Plaintext: Original method before encryption Encryption algorithm: Transforms plain text Public and Private Key: Pair of keys that have been selected for encryption. One is used as encryption, one as decryption. Ciphertext: The two new messages that are created to be sent, one by the public key, and one by the private key Decryption algorithm: The encryption & secret key in reverse algorithm
  • 33. ENCRYPTION In English: 1. Each user generates a pair of keys for encryption and decryption. 2. Each user places the public key in an accessible file. The companion private key is kept private. 3. If A wishes to send a message to B, A encrypts the message using B’s public key. 4. When B receives the message, B decrypts the message using it’s own private key. No one else can, because no-one else uses B’s private key
  • 34. DIGITAL SIGNATURES Confirming the source: Used extensively now due to the Internet When a digital signature is sent to the receiver, the message is encoded using the senders private key At the receiving end, the message should be able to be decoded using the senders public key. If it can be decoded, it can be assumed that the sender must have made the message and it’s okay If it can’t be decoded, it can be assumed that the sender couldn’t have made the message, and should be disposed of.
  • 35. PROTECTING YOURSELF Ports  Open ports allow access to a variety of problems  Port Scanner  Nanoprobe  Finding an open port tells you what services are available!  Close down as many as necessary to make the system secure.
  • 36. FIREWALLS Firewalls:  Firewalls are used to limit or allow connections through a network  Firewalls are gateways that provide this  They can limit or allow connections based on:  IP Address  Port Number  If you like firewalls are watchdogs for your computer’s open doors.
  • 38. OVERVIEW OF ELECTRONIC SECURITY METHODSEncryption: Encoding and scrambling of messages to prevent their access without specific authorization. Most commonly used when transferring sensitive data electronically across (e.g.) the Internet Authentication: Providing secure mechanisms for accessing specific elements of the ecommerce system. Most common method is registration with the ecommerce system, and using usernames and passwords. Digital signature: Digital code attached to electronically transmitted message to uniquely identify contents and sender. Implemented when receiver needs to be assured of author of message (adopted now in hardware and operating system drivers) Digital certificate: Attachment to electronic message to verify the sender and to provide receiver with means to encode reply Secure Electronic Transaction (SET): Standard for securing credit card transactions over Internet and other networks