SlideShare uma empresa Scribd logo
1 de 71
Baixar para ler offline
E-Commerce Security and Fraud Protection
Learning Objectives
1. Understand the importance and scope of security of
information systems for EC.
2. Describe the major concepts and terminology of EC
security.
3. Learn about the major EC security threats, vulnerabilities,
and technical attacks.
4. Understand Internet fraud, phishing, and spam.
5. Describe the information assurance security principles.
6. Identify and assess major technologies and methods for
securing EC access and communications.
8-1Copyright © 2012 Pearson Education
Learning Objectives
7. Describe the major technologies for protection of EC
networks.
8. Describe various types of controls and special defense
mechanisms.
9. Describe consumer and seller protection from fraud.
10. Describe the role of business continuity and disaster
recovery planning.
11. Discuss EC security’s enterprisewide implementation
issues.
12. Understand why it is not possible to stop computer
crimes.
8-2Copyright © 2012 Pearson Education
The Information Security Problem
information security
Protecting information and information systems from
unauthorized access, use, disclosure, disruption,
modification, perusal, inspection, recording or
destruction
WHAT IS EC SECURITY?
CSI Computer Crime and Security Survey
Annual security survey of U.S. corporations, government
agencies, financial and medical institutions, and
universities conducted by the Computer Security
Institute
8-3Copyright © 2012 Pearson Education
The Information Security Problem
Personal Security
National Security
Security Risks for 2011–2012
Cyberwars, Cyberespionage, and Cybercrimes
Across Borders
Types of Attacks
Corporate espionage that plagues businesses around the world
Political espionage and warfare
8-4Copyright © 2012 Pearson Education
8-5Copyright © 2012 Pearson Education
The Information Security Problem
THE DRIVERS OF EC SECURITY PROBLEMS
The Internet’s Vulnerable Design
Domain Name System (DNS)
Translates (converts) domain names to their numeric IP
addresses
IP address
An address that uniquely identifies each computer connected
to a network or the Internet
The Shift to Profit-Induced Crimes
8-6Copyright © 2012 Pearson Education
The Information Security Problem
Internet underground economy
E-markets for stolen information made up of thousands of
websites that sell credit card numbers, social security
numbers, other data such as numbers of bank accounts, social
network IDs, passwords, and much more
keystroke logging (keylogging)
A method of capturing and recording user keystrokes
The Dynamic Nature of EC Systems and the Role of
Insiders
WHY IS AN E-COMMERCE SECURITY STRATEGY
NEEDED?
The Computer Security Strategy Dilemma
8-7Copyright © 2012 Pearson Education
Basic E-commerce
Security Issues and Landscape
BASIC SECURITY TERMINOLOGY
business continuity plan
A plan that keeps the business running after a disaster
occurs; each function in the business should have a valid
recovery capability plan
cybercrime
Intentional crimes carried out on the Internet
cybercriminal
A person who intentionally carries out crimes over the
Internet
8-8Copyright © 2012 Pearson Education
Basic E-commerce
Security Issues and Landscape
exposure
The estimated cost, loss, or damage that can result if a
threat exploits a vulnerability
fraud
Any business activity that uses deceitful practices or
devices to deprive another of property or other rights
malware (malicious software)
A generic term for malicious software
phishing
A crimeware technique to steal the identity of a target
company to get the identities of its customers
8-9Copyright © 2012 Pearson Education
Basic E-Commerce
Security Issues and Landscape
risk
The probability that a vulnerability will be known and
used
social engineering
A type of nontechnical attack that uses some ruse to
trick users into revealing information or performing an
action that compromises a computer or network
spam
The electronic equivalent of junk mail
8-10Copyright © 2012 Pearson Education
Basic E-commerce
Security Issues and Landscape
vulnerability
Weakness in software or other mechanism that
threatens the confidentiality, integrity, or availability of
an asset (recall the CIA model); it can be directly used
by a hacker to gain access to a system or network
zombies
Computers infected with malware that are under the
control of a spammer, hacker, or other criminal
8-11Copyright © 2012 Pearson Education
8-12Copyright © 2012 Pearson Education
Basic E-Commerce
Security Issues and Landscape
THE THREATS, ATTACKS, AND ATTACKERS
Unintentional Threats
Intentional Attacks and Crimes
The Criminals and Methods
hacker
Someone who gains unauthorized access to a computer
system
cracker
A malicious hacker, such as Maxwell, in the opening case, who
may represent a serious problem for a corporation
8-13Copyright © 2012 Pearson Education
Basic E-Commerce
Security Issues and Landscape
THE TARGETS OF THE ATTACKS IN VULNERABLE
AREAS
Vulnerable Areas Are Being Attacked
The Vulnerabilities in Business IT and EC Systems
SECURITY SCENARIOS AND REQUIREMENTS IN
E-COMMERCE
The Content of Information Security
8-14Copyright © 2012 Pearson Education
Basic E-Commerce
Security Issues and Landscape
EC Security Requirements
authentication
Process to verify (assure) the real identity of an individual,
computer, computer program, or EC website
authorization
Process of determining what the authenticated entity is
allowed to access and what operations it is allowed to perform
Auditing
Availability
nonrepudiation
Assurance that online customers or trading partners cannot
falsely deny (repudiate) their purchase or transaction
8-15Copyright © 2012 Pearson Education
Basic E-Commerce
Security Issues and Landscape
THE DEFENSE: DEFENDERS, STRATEGY, AND
METHODS
EC security strategy
A strategy that views EC security as the process of preventing
and detecting unauthorized use of the organization’s brand,
identity, website, e-mail, information, or other asset and
attempts to defraud the organization, its customers, and
employees
deterring measures
Actions that will make criminals abandon their idea of
attacking a specific system (e.g., the possibility of losing a job
for insiders)
8-16Copyright © 2012 Pearson Education
Basic E-Commerce
Security Issues and Landscape
prevention measures
Ways to help stop unauthorized users (also known as
“intruders”) from accessing any part of the EC system
detection measures
Ways to determine whether intruders attempted to break into
the EC system; whether they were successful; and what they
may have done
information assurance (IA)
The protection of information systems against unauthorized
access to or modification of information whether in storage,
processing, or transit, and against the denial of service to
authorized users, including those measures necessary to
detect, document, and counter such threats
8-17Copyright © 2012 Pearson Education
8-18Copyright © 2012 Pearson Education
Technical Attack Methods:
From Viruses to Denial of Service
MALICIOUS CODE: VIRUSES, WORMS, AND
TROJAN HORSES
virus
A piece of software code that inserts itself into a host,
including the operating systems, in order to propagate;
it requires that its host program be run to activate it
worm
A software program that runs independently, consuming
the resources of its host in order to maintain itself, that
is capable of propagating a complete working version of
itself onto another machine
8-19Copyright © 2012 Pearson Education
8-20Copyright © 2012 Pearson Education
Technical Attack Methods:
From Viruses to Denial of Service
macro virus (macro worm)
A macro virus or macro worm is executed when the
application object that contains the macro is opened or a
particular procedure is executed
Trojan horse
A program that appears to have a useful function but that
contains a hidden function that presents a security risk
banking Trojan
A Trojan that comes to life when computer owners visit one of
a number of online banking or e-commerce sites
8-21Copyright © 2012 Pearson Education
Technical Attack Methods:
From Viruses to Denial of Service
denial-of-service (DoS) attack
An attack on a website in which an attacker uses
specialized software to send a flood of data packets to
the target computer with the aim of overloading its
resources
page hijacking
Creating a rogue copy of a popular website that shows
contents similar to the original to a Web crawler; once
there, an unsuspecting user is redirected to malicious
websites
8-22Copyright © 2012 Pearson Education
Technical Attack Methods:
From Viruses to Denial of Service
botnet
A huge number (e.g., hundreds of thousands) of
hijacked Internet computers that have been set up to
forward traffic, including spam and viruses, to other
computers on the Internet
Malvertising
8-23Copyright © 2012 Pearson Education
8-24Copyright © 2012 Pearson Education
Nontechnical Methods:
From Phishing To Spam
SOCIAL PHISHING
Sophisticated Phishing Methods
FRAUD ON THE INTERNET
Examples of Typical Online Fraud Attacks
Identity Theft and Identify Fraud
identity theft
Fraud that involves stealing an identity of a person and then
the use of that identity by someone pretending to be someone
else in order to steal money or get other benefits
8-25Copyright © 2012 Pearson Education
8-26Copyright © 2012 Pearson Education
Nontechnical Methods:
From Phishing To Spam
CYBER BANK ROBBERIES
Other Financial Fraud
SPAM AND SPYWARE ATTACKS
e-mail spam
A subset of spam that involves nearly identical messages
sent to numerous recipients by e-mail
Typical Examples of Spamming
spyware
Software that gathers user information over an Internet
connection without the user’s knowledge
8-27Copyright © 2012 Pearson Education
Nontechnical Methods:
From Phishing To Spam
SOCIAL NETWORKING MAKES SOCIAL
ENGINEERING EASY
How Hackers Are Attacking Social Networks
Spam in Social Networks and in the Web 2.0
Environment
8-28Copyright © 2012 Pearson Education
Nontechnical Methods:
From Phishing To Spam
search engine spam
Pages created deliberately to trick the search engine into
offering inappropriate, redundant, or poor-quality
search results
spam site
Page that uses techniques that deliberately subvert a
search engine’s algorithms to artificially inflate the
page’s rankings
splog
Short for spam blog, a site created solely for marketing
purposes
8-29Copyright © 2012 Pearson Education
Nontechnical Methods:
From Phishing To Spam
data breach
A security incident in which sensitive, protected, or
confidential data is copied, transmitted, viewed, stolen,
or used by an individual unauthorized to do so
8-30Copyright © 2012 Pearson Education
The Information Assurance Model
and Defense Strategy
CIA security triad (CIA triad)
Three security concepts important to information on
the Internet: confidentiality, integrity, and availability
confidentiality
Assurance of data privacy and accuracy; keeping private
or sensitive information from being disclosed to
unauthorized individuals, entities, or processes
8-31Copyright © 2012 Pearson Education
The Information Assurance Model
and Defense Strategy
integrity
Assurance that stored data has not been modified
without authorization; a message that was sent is the
same message as that which was received
availability
Assurance that access to data, the website, or other EC
data service is timely, available, reliable, and restricted
to authorized users
8-32Copyright © 2012 Pearson Education
The Information Assurance Model
and Defense Strategy
AUTHENTICATION, AUTHORIZATION, AND
NONREPUDIATION
E-COMMERCE SECURITY STRATEGY
The Objective of Security Defense
Security Spending Versus Needs Gap
Assessing Security Needs
vulnerability assessment
The process of identifying, quantifying, and prioritizing the
vulnerabilities in a system
8-33Copyright © 2012 Pearson Education
8-34Copyright © 2012 Pearson Education
The Information Assurance Model
and Defense Strategy
penetration test (pen test)
A method of evaluating the security of a computer
system or a network by simulating an attack from a
malicious source, (e.g., a cracker)
EC security programs
All the policies, procedures, documents, standards,
hardware, software, training, and personnel that work
together to protect information, the ability to conduct
business, and other assets
8-35Copyright © 2012 Pearson Education
The Information Assurance Model
and Defense Strategy
computer security incident management
The monitoring and detection of security events on a
computer or computer network, and the execution of
proper responses to those events. The primary purpose
of incident management is the development of a well
understood and predictable response to damaging
events and computer intrusions.
8-36Copyright © 2012 Pearson Education
8-37Copyright © 2012 Pearson Education
The Information Assurance Model
and Defense Strategy
THE DEFENSE SIDE OF EC SYSTEMS
1. Defending access to computing systems, data flow, and
EC transactions
2. Defending EC networks
3. General, administrative, and application controls
4. Protection against social engineering and fraud
5. Disaster preparation, business continuity, and risk
management
6. Implementing enterprisewide security programs
8-38Copyright © 2012 Pearson Education
The Defense I:
Access Control, Encryption, and PKI
access control
Mechanism that determines who can legitimately use a
network resource
Authorization and Authentication
biometric control
An automated method for verifying the identity of a
person based on physical or behavioral characteristics
biometric systems
Authentication systems that identify a person by
measurement of a biological characteristic, such as
fingerprints, iris (eye) patterns, facial features, or voice
8-39Copyright © 2012 Pearson Education
The Defense I:
Access Control, Encryption, and PKI
ENCRYPTION AND THE ONE-KEY (SYMMETRIC)
SYSTEM
encryption
The process of scrambling (encrypting) a message in such a
way that it is difficult, expensive, or time-consuming for an
unauthorized person to unscramble (decrypt) it
plaintext
An unencrypted message in human-readable form
ciphertext
A plaintext message after it has been encrypted into a
machine-readable form
8-40Copyright © 2012 Pearson Education
The Defense I:
Access Control, Encryption, and PKI
encryption algorithm
The mathematical formula used to encrypt the plaintext
into the ciphertext, and vice versa
key (key value)
The secret code used to encrypt and decrypt a message
key space
The large number of possible key values (keys) created
by the algorithm to use when transforming the message
8-41Copyright © 2012 Pearson Education
8-42Copyright © 2012 Pearson Education
The Defense I:
Access Control, Encryption, and PKI
symmetric (private) key encryption
An encryption system that uses the same key to encrypt
and decrypt the message
Data Encryption Standard (DES)
The standard symmetric encryption algorithm
supported by the NIST and used by U.S. government
agencies until October 2000
8-43Copyright © 2012 Pearson Education
The Defense I:
Access Control, Encryption, and PKI
public key infrastructure (PKI)
A scheme for securing e-payments using public key
encryption and various technical components
public (asymmetric) key encryption
Method of encryption that uses a pair of matched
keys—a public key to encrypt a message and a private
key to decrypt it, or vice versa
public key
Encryption code that is publicly available to anyone
private key
Encryption code that is known only to its owner
8-44Copyright © 2012 Pearson Education
The Defense I:
Access Control, Encryption, and PKI
digital signature or digital certificate
Validates the sender and time stamp of a transaction so
it cannot be later claimed that the transaction was
unauthorized or invalid
hash function
A mathematical computation that is applied to a
message, using a private key, to encrypt the message
message digest (MD)
A summary of a message converted into a string of digits
after the hash has been applied
8-45Copyright © 2012 Pearson Education
8-46Copyright © 2012 Pearson Education
The Defense I:
Access Control, Encryption, and PKI
digital envelope
The combination of the encrypted original message and
the digital signature, using the recipient’s public key
certificate authorities (CAs)
Third parties that issue digital certificates
Secure Socket Layer (SSL)
8-47Copyright © 2012 Pearson Education
The Defense II:
Securing E-Commerce Networks
firewall
A single point between two or more networks where all
traffic must pass (choke point); the device
authenticates, controls, and logs all traffic
packet
Segment of data sent from one computer to another on a
network
The Dual Firewall Architecture: The DMZ
8-48Copyright © 2012 Pearson Education
8-49Copyright © 2012 Pearson Education
The Defense II:
Securing E-Commerce Networks
personal firewall
A network node designed to protect an individual user’s
desktop system from the public network by monitoring
all the traffic that passes through the computer’s
network interface card
Additional Virus, Malware, and Botnet Protection
8-50Copyright © 2012 Pearson Education
The Defense II:
Securing E-Commerce Networks
virtual private network (VPN)
A network that uses the public Internet to carry
information but remains private by using encryption to
scramble the communications, authentication to ensure
that information has not been tampered with, and access
control to verify the identity of anyone using the network
protocol tunneling
Method used to ensure confidentiality and integrity of data
transmitted over the Internet by encrypting data packets,
sending them in packets across the Internet, and decrypting
them at the destination address
8-51Copyright © 2012 Pearson Education
The Defense II:
Securing E-Commerce Networks
intrusion detection system (IDS)
A special category of software that can monitor activity
across a network or on a host computer, watch for
suspicious activity, and take automated action based
on what it sees
Dealing with DoS Attacks
Cloud Computing Prevents DoS Attacks
8-52Copyright © 2012 Pearson Education
The Defense II:
Securing E-Commerce Networks
honeynet
A network of honeypots
honeypot
Production system (e.g., firewalls, routers, Web
servers, database servers) that looks like it does real
work, but that acts as a decoy and is watched to study
how network intrusions occur
E-Mail Security
8-53Copyright © 2012 Pearson Education
The Defense III: General Controls, Internal Controls,
Compliance, and Other Defense Mechanisms
general controls
Controls established to protect the system regardless
of the specific application; for example, protecting
hardware and controlling access to the data center are
independent of the specific application
application controls
Controls that are intended to protect specific
applications
8-54Copyright © 2012 Pearson Education
8-55Copyright © 2012 Pearson Education
The Defense III: General Controls, Internal Controls,
Compliance, and Other Defense Mechanisms
GENERAL, ADMINISTRATIVE, AND OTHER
CONTROLS
Physical Controls
Administrative Controls
APPLICATION CONTROLS AND INTELLIGENT
AGENTS
intelligent agents
Software applications that have some degree of reactivity,
autonomy, and adaptability—as is needed in unpredictable
attack situations; an agent is able to adapt itself based on
changes occurring in its environment
8-56Copyright © 2012 Pearson Education
8-57Copyright © 2012 Pearson Education
The Defense III: General Controls, Internal Controls,
Compliance, and Other Defense Mechanisms
PROTECTING AGAINST SPAM
Controlling the Assault of Non-Solicited
Pornography and Marketing (CAN-SPAM) Act
Law that makes it a crime to send commercial e-mail
messages with false or misleading message headers or
misleading subject lines
8-58Copyright © 2012 Pearson Education
The Defense III: General Controls, Internal Controls,
Compliance, and Other Defense Mechanisms
PROTECTING AGAINST POP-UP ADS
PROTECTING AGAINST SOCIAL ENGINEERING
ATTACKS
Protecting Against Phishing
Protecting Against Malvertising
PROTECTING AGAINST SPYWARE
Using Policies and Training
8-59Copyright © 2012 Pearson Education
Business Continuity, Disaster Recovery,
Security Auditing, and Risk Management
BUSINESS CONTINUITY AND DISASTER
RECOVERY PLANNING
disaster avoidance
An approach oriented toward prevention, the idea is to
minimize the chance of avoidable disasters (such as fire
or other human-caused threats)
8-60Copyright © 2012 Pearson Education
8-61Copyright © 2012 Pearson Education
Business Continuity, Disaster Recovery,
Security Auditing, and Risk Management
RISK-MANAGEMENT AND COST–BENEFIT
ANALYSIS
Risk-Management Analysis
Calculating the Cost of a Fraud-Prevention System
Ethical Issues
8-62Copyright © 2012 Pearson Education
Implementing
Enterprisewide E-Commerce Security
THE DRIVERS OF EC SECURITY MANAGEMENT
SENIOR MANAGEMENT COMMITMENT AND
SUPPORT
Unified Front
8-63Copyright © 2012 Pearson Education
Implementing
Enterprisewide E-Commerce Security
EC SECURITY POLICIES AND TRAINING
acceptable use policy (AUP)
Policy that informs users of their responsibilities when using
company networks, wireless devices, customer data, and so
forth
EC SECURITY PROCEDURES AND ENFORCEMENT
business impact analysis (BIA)
An exercise that determines the impact of losing the support
of an EC resource to an organization and establishes the
escalation of that loss over time, identifies the minimum
resources needed to recover, and prioritizes the recovery of
processes and supporting systems
8-64Copyright © 2012 Pearson Education
Implementing
Enterprisewide E-Commerce Security
WHY IS IT DIFFICULT TO STOP INTERNET
CRIME?
Making Shopping Inconvenient
Lack of Cooperation from Credit Card Issuers and
ISPs
Shoppers’ Negligence
Ignoring EC Security Best Practices
Computing Technology Industry Association (CompTIA)
Nonprofit trade group providing information security
research and best practices
8-65Copyright © 2012 Pearson Education
Implementing
Enterprisewide E-Commerce Security
Design and Architecture Issues
Lack of Due Care in Business Practices
standard of due care
Care that a company is reasonably expected to take based on
the risks affecting its EC business and online transactions
8-66Copyright © 2012 Pearson Education
Managerial Issues
1. What is the best EC security strategy for my company?
2. Is the budget for EC security adequate?
3. What steps should businesses follow in establishing a
security plan?
4. Should organizations be concerned with internal security
threats?
5. What is the key to establishing strong e-commerce
security?
8-67Copyright © 2012 Pearson Education
Summary
1. The key to establishing strong e-commerce security
2. Basic EC security issues and terminology
3. Threats, vulnerabilities, and technical attacks
4. Internet fraud, phishing, and spam
5. Information assurance
6. Securing EC access control and communications
8-68Copyright © 2012 Pearson Education
Summary
7. Technologies for protecting networks.
8. The different controls and special defense
mechanisms.
9. Protecting from fraud.
10. Role of business continuity and disaster recovery
planning.
11. Enterprisewide EC security.
12. Why is it impossible to stop computer crimes?
8-69Copyright © 2012 Pearson Education
Copyright © 2012 Pearson Education 8-70
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written
permission of the publisher. Printed in the United States of America.
Copyright © 2012 Pearson Education

Mais conteúdo relacionado

Mais procurados

E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 

Mais procurados (20)

Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
E commerce security
E commerce securityE commerce security
E commerce security
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
E commerce
E commerceE commerce
E commerce
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 

Semelhante a e commerce security and fraud protection

6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
alinainglis
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
Leena Reddy
 

Semelhante a e commerce security and fraud protection (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.ppt
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
CH11security-Cybersecurity and Firewall.ppt
CH11security-Cybersecurity and Firewall.pptCH11security-Cybersecurity and Firewall.ppt
CH11security-Cybersecurity and Firewall.ppt
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
C018131821
C018131821C018131821
C018131821
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Newethics
NewethicsNewethics
Newethics
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 

Mais de tumetr1

ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็คตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
tumetr1
 
ตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็คตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็ค
tumetr1
 
ตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็คตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
tumetr1
 
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็คตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
tumetr1
 
ตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็คตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็ค
tumetr1
 
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็คตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
tumetr1
 
ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)
tumetr1
 
ระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์กระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์ก
tumetr1
 
ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์
tumetr1
 
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการสถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
tumetr1
 
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่ายการส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
tumetr1
 
ความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูลความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูล
tumetr1
 

Mais de tumetr1 (20)

ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็คตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
ตัวอย่างประวัติผู้วิจัย เล่มโปรเจ็ค
 
ตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็คตัวอย่างภาคผนวก เล่มโปรเจ็ค
ตัวอย่างภาคผนวก เล่มโปรเจ็ค
 
ตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็คตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
ตัวอย่างบรรณานุกรม เล่มโปรเจ็ค
 
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็คตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
ตัวอย่างบทที่1 บทนำ เล่มโปรเจ็ค
 
ตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็คตัวอย่างสารบัญ เล่มโปรเจ็ค
ตัวอย่างสารบัญ เล่มโปรเจ็ค
 
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็คตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
ตัวอย่างกิตติกรรมประกาศ เล่มโปรเจ็ค
 
ตัวอย่างบทคัดย่อเล่มโปรเจ็ค
ตัวอย่างบทคัดย่อเล่มโปรเจ็คตัวอย่างบทคัดย่อเล่มโปรเจ็ค
ตัวอย่างบทคัดย่อเล่มโปรเจ็ค
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utility
 
network hardware
network hardwarenetwork hardware
network hardware
 
ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)ระบบเครือข่ายไร้สาย (wireless lan)
ระบบเครือข่ายไร้สาย (wireless lan)
 
routing
routingrouting
routing
 
the transport layer
the transport layerthe transport layer
the transport layer
 
ระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์กระดับชั้นเน็ตเวิร์ก
ระดับชั้นเน็ตเวิร์ก
 
ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์ระดับชั้นดาต้าลิงค์
ระดับชั้นดาต้าลิงค์
 
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการสถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
สถาปัตยกรรมเครือข่ายคอมพิวเตอร์และบริการ
 
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่ายการส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
การส่งข้อมูลผ่านสายส่งและเทคนิคการส่งข้อมูลผ่านเครือข่าย
 
ความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูลความรู้พื้นฐานของระบบการสื่อสารข้อมูล
ความรู้พื้นฐานของระบบการสื่อสารข้อมูล
 
พัฒนาเศรษฐกิจ
พัฒนาเศรษฐกิจพัฒนาเศรษฐกิจ
พัฒนาเศรษฐกิจ
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Último (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

e commerce security and fraud protection

  • 1. E-Commerce Security and Fraud Protection
  • 2. Learning Objectives 1. Understand the importance and scope of security of information systems for EC. 2. Describe the major concepts and terminology of EC security. 3. Learn about the major EC security threats, vulnerabilities, and technical attacks. 4. Understand Internet fraud, phishing, and spam. 5. Describe the information assurance security principles. 6. Identify and assess major technologies and methods for securing EC access and communications. 8-1Copyright © 2012 Pearson Education
  • 3. Learning Objectives 7. Describe the major technologies for protection of EC networks. 8. Describe various types of controls and special defense mechanisms. 9. Describe consumer and seller protection from fraud. 10. Describe the role of business continuity and disaster recovery planning. 11. Discuss EC security’s enterprisewide implementation issues. 12. Understand why it is not possible to stop computer crimes. 8-2Copyright © 2012 Pearson Education
  • 4. The Information Security Problem information security Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction WHAT IS EC SECURITY? CSI Computer Crime and Security Survey Annual security survey of U.S. corporations, government agencies, financial and medical institutions, and universities conducted by the Computer Security Institute 8-3Copyright © 2012 Pearson Education
  • 5. The Information Security Problem Personal Security National Security Security Risks for 2011–2012 Cyberwars, Cyberespionage, and Cybercrimes Across Borders Types of Attacks Corporate espionage that plagues businesses around the world Political espionage and warfare 8-4Copyright © 2012 Pearson Education
  • 6. 8-5Copyright © 2012 Pearson Education
  • 7. The Information Security Problem THE DRIVERS OF EC SECURITY PROBLEMS The Internet’s Vulnerable Design Domain Name System (DNS) Translates (converts) domain names to their numeric IP addresses IP address An address that uniquely identifies each computer connected to a network or the Internet The Shift to Profit-Induced Crimes 8-6Copyright © 2012 Pearson Education
  • 8. The Information Security Problem Internet underground economy E-markets for stolen information made up of thousands of websites that sell credit card numbers, social security numbers, other data such as numbers of bank accounts, social network IDs, passwords, and much more keystroke logging (keylogging) A method of capturing and recording user keystrokes The Dynamic Nature of EC Systems and the Role of Insiders WHY IS AN E-COMMERCE SECURITY STRATEGY NEEDED? The Computer Security Strategy Dilemma 8-7Copyright © 2012 Pearson Education
  • 9. Basic E-commerce Security Issues and Landscape BASIC SECURITY TERMINOLOGY business continuity plan A plan that keeps the business running after a disaster occurs; each function in the business should have a valid recovery capability plan cybercrime Intentional crimes carried out on the Internet cybercriminal A person who intentionally carries out crimes over the Internet 8-8Copyright © 2012 Pearson Education
  • 10. Basic E-commerce Security Issues and Landscape exposure The estimated cost, loss, or damage that can result if a threat exploits a vulnerability fraud Any business activity that uses deceitful practices or devices to deprive another of property or other rights malware (malicious software) A generic term for malicious software phishing A crimeware technique to steal the identity of a target company to get the identities of its customers 8-9Copyright © 2012 Pearson Education
  • 11. Basic E-Commerce Security Issues and Landscape risk The probability that a vulnerability will be known and used social engineering A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network spam The electronic equivalent of junk mail 8-10Copyright © 2012 Pearson Education
  • 12. Basic E-commerce Security Issues and Landscape vulnerability Weakness in software or other mechanism that threatens the confidentiality, integrity, or availability of an asset (recall the CIA model); it can be directly used by a hacker to gain access to a system or network zombies Computers infected with malware that are under the control of a spammer, hacker, or other criminal 8-11Copyright © 2012 Pearson Education
  • 13. 8-12Copyright © 2012 Pearson Education
  • 14. Basic E-Commerce Security Issues and Landscape THE THREATS, ATTACKS, AND ATTACKERS Unintentional Threats Intentional Attacks and Crimes The Criminals and Methods hacker Someone who gains unauthorized access to a computer system cracker A malicious hacker, such as Maxwell, in the opening case, who may represent a serious problem for a corporation 8-13Copyright © 2012 Pearson Education
  • 15. Basic E-Commerce Security Issues and Landscape THE TARGETS OF THE ATTACKS IN VULNERABLE AREAS Vulnerable Areas Are Being Attacked The Vulnerabilities in Business IT and EC Systems SECURITY SCENARIOS AND REQUIREMENTS IN E-COMMERCE The Content of Information Security 8-14Copyright © 2012 Pearson Education
  • 16. Basic E-Commerce Security Issues and Landscape EC Security Requirements authentication Process to verify (assure) the real identity of an individual, computer, computer program, or EC website authorization Process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform Auditing Availability nonrepudiation Assurance that online customers or trading partners cannot falsely deny (repudiate) their purchase or transaction 8-15Copyright © 2012 Pearson Education
  • 17. Basic E-Commerce Security Issues and Landscape THE DEFENSE: DEFENDERS, STRATEGY, AND METHODS EC security strategy A strategy that views EC security as the process of preventing and detecting unauthorized use of the organization’s brand, identity, website, e-mail, information, or other asset and attempts to defraud the organization, its customers, and employees deterring measures Actions that will make criminals abandon their idea of attacking a specific system (e.g., the possibility of losing a job for insiders) 8-16Copyright © 2012 Pearson Education
  • 18. Basic E-Commerce Security Issues and Landscape prevention measures Ways to help stop unauthorized users (also known as “intruders”) from accessing any part of the EC system detection measures Ways to determine whether intruders attempted to break into the EC system; whether they were successful; and what they may have done information assurance (IA) The protection of information systems against unauthorized access to or modification of information whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats 8-17Copyright © 2012 Pearson Education
  • 19. 8-18Copyright © 2012 Pearson Education
  • 20. Technical Attack Methods: From Viruses to Denial of Service MALICIOUS CODE: VIRUSES, WORMS, AND TROJAN HORSES virus A piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it requires that its host program be run to activate it worm A software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine 8-19Copyright © 2012 Pearson Education
  • 21. 8-20Copyright © 2012 Pearson Education
  • 22. Technical Attack Methods: From Viruses to Denial of Service macro virus (macro worm) A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed Trojan horse A program that appears to have a useful function but that contains a hidden function that presents a security risk banking Trojan A Trojan that comes to life when computer owners visit one of a number of online banking or e-commerce sites 8-21Copyright © 2012 Pearson Education
  • 23. Technical Attack Methods: From Viruses to Denial of Service denial-of-service (DoS) attack An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources page hijacking Creating a rogue copy of a popular website that shows contents similar to the original to a Web crawler; once there, an unsuspecting user is redirected to malicious websites 8-22Copyright © 2012 Pearson Education
  • 24. Technical Attack Methods: From Viruses to Denial of Service botnet A huge number (e.g., hundreds of thousands) of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet Malvertising 8-23Copyright © 2012 Pearson Education
  • 25. 8-24Copyright © 2012 Pearson Education
  • 26. Nontechnical Methods: From Phishing To Spam SOCIAL PHISHING Sophisticated Phishing Methods FRAUD ON THE INTERNET Examples of Typical Online Fraud Attacks Identity Theft and Identify Fraud identity theft Fraud that involves stealing an identity of a person and then the use of that identity by someone pretending to be someone else in order to steal money or get other benefits 8-25Copyright © 2012 Pearson Education
  • 27. 8-26Copyright © 2012 Pearson Education
  • 28. Nontechnical Methods: From Phishing To Spam CYBER BANK ROBBERIES Other Financial Fraud SPAM AND SPYWARE ATTACKS e-mail spam A subset of spam that involves nearly identical messages sent to numerous recipients by e-mail Typical Examples of Spamming spyware Software that gathers user information over an Internet connection without the user’s knowledge 8-27Copyright © 2012 Pearson Education
  • 29. Nontechnical Methods: From Phishing To Spam SOCIAL NETWORKING MAKES SOCIAL ENGINEERING EASY How Hackers Are Attacking Social Networks Spam in Social Networks and in the Web 2.0 Environment 8-28Copyright © 2012 Pearson Education
  • 30. Nontechnical Methods: From Phishing To Spam search engine spam Pages created deliberately to trick the search engine into offering inappropriate, redundant, or poor-quality search results spam site Page that uses techniques that deliberately subvert a search engine’s algorithms to artificially inflate the page’s rankings splog Short for spam blog, a site created solely for marketing purposes 8-29Copyright © 2012 Pearson Education
  • 31. Nontechnical Methods: From Phishing To Spam data breach A security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so 8-30Copyright © 2012 Pearson Education
  • 32. The Information Assurance Model and Defense Strategy CIA security triad (CIA triad) Three security concepts important to information on the Internet: confidentiality, integrity, and availability confidentiality Assurance of data privacy and accuracy; keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes 8-31Copyright © 2012 Pearson Education
  • 33. The Information Assurance Model and Defense Strategy integrity Assurance that stored data has not been modified without authorization; a message that was sent is the same message as that which was received availability Assurance that access to data, the website, or other EC data service is timely, available, reliable, and restricted to authorized users 8-32Copyright © 2012 Pearson Education
  • 34. The Information Assurance Model and Defense Strategy AUTHENTICATION, AUTHORIZATION, AND NONREPUDIATION E-COMMERCE SECURITY STRATEGY The Objective of Security Defense Security Spending Versus Needs Gap Assessing Security Needs vulnerability assessment The process of identifying, quantifying, and prioritizing the vulnerabilities in a system 8-33Copyright © 2012 Pearson Education
  • 35. 8-34Copyright © 2012 Pearson Education
  • 36. The Information Assurance Model and Defense Strategy penetration test (pen test) A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source, (e.g., a cracker) EC security programs All the policies, procedures, documents, standards, hardware, software, training, and personnel that work together to protect information, the ability to conduct business, and other assets 8-35Copyright © 2012 Pearson Education
  • 37. The Information Assurance Model and Defense Strategy computer security incident management The monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. The primary purpose of incident management is the development of a well understood and predictable response to damaging events and computer intrusions. 8-36Copyright © 2012 Pearson Education
  • 38. 8-37Copyright © 2012 Pearson Education
  • 39. The Information Assurance Model and Defense Strategy THE DEFENSE SIDE OF EC SYSTEMS 1. Defending access to computing systems, data flow, and EC transactions 2. Defending EC networks 3. General, administrative, and application controls 4. Protection against social engineering and fraud 5. Disaster preparation, business continuity, and risk management 6. Implementing enterprisewide security programs 8-38Copyright © 2012 Pearson Education
  • 40. The Defense I: Access Control, Encryption, and PKI access control Mechanism that determines who can legitimately use a network resource Authorization and Authentication biometric control An automated method for verifying the identity of a person based on physical or behavioral characteristics biometric systems Authentication systems that identify a person by measurement of a biological characteristic, such as fingerprints, iris (eye) patterns, facial features, or voice 8-39Copyright © 2012 Pearson Education
  • 41. The Defense I: Access Control, Encryption, and PKI ENCRYPTION AND THE ONE-KEY (SYMMETRIC) SYSTEM encryption The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it plaintext An unencrypted message in human-readable form ciphertext A plaintext message after it has been encrypted into a machine-readable form 8-40Copyright © 2012 Pearson Education
  • 42. The Defense I: Access Control, Encryption, and PKI encryption algorithm The mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa key (key value) The secret code used to encrypt and decrypt a message key space The large number of possible key values (keys) created by the algorithm to use when transforming the message 8-41Copyright © 2012 Pearson Education
  • 43. 8-42Copyright © 2012 Pearson Education
  • 44. The Defense I: Access Control, Encryption, and PKI symmetric (private) key encryption An encryption system that uses the same key to encrypt and decrypt the message Data Encryption Standard (DES) The standard symmetric encryption algorithm supported by the NIST and used by U.S. government agencies until October 2000 8-43Copyright © 2012 Pearson Education
  • 45. The Defense I: Access Control, Encryption, and PKI public key infrastructure (PKI) A scheme for securing e-payments using public key encryption and various technical components public (asymmetric) key encryption Method of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa public key Encryption code that is publicly available to anyone private key Encryption code that is known only to its owner 8-44Copyright © 2012 Pearson Education
  • 46. The Defense I: Access Control, Encryption, and PKI digital signature or digital certificate Validates the sender and time stamp of a transaction so it cannot be later claimed that the transaction was unauthorized or invalid hash function A mathematical computation that is applied to a message, using a private key, to encrypt the message message digest (MD) A summary of a message converted into a string of digits after the hash has been applied 8-45Copyright © 2012 Pearson Education
  • 47. 8-46Copyright © 2012 Pearson Education
  • 48. The Defense I: Access Control, Encryption, and PKI digital envelope The combination of the encrypted original message and the digital signature, using the recipient’s public key certificate authorities (CAs) Third parties that issue digital certificates Secure Socket Layer (SSL) 8-47Copyright © 2012 Pearson Education
  • 49. The Defense II: Securing E-Commerce Networks firewall A single point between two or more networks where all traffic must pass (choke point); the device authenticates, controls, and logs all traffic packet Segment of data sent from one computer to another on a network The Dual Firewall Architecture: The DMZ 8-48Copyright © 2012 Pearson Education
  • 50. 8-49Copyright © 2012 Pearson Education
  • 51. The Defense II: Securing E-Commerce Networks personal firewall A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card Additional Virus, Malware, and Botnet Protection 8-50Copyright © 2012 Pearson Education
  • 52. The Defense II: Securing E-Commerce Networks virtual private network (VPN) A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network protocol tunneling Method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address 8-51Copyright © 2012 Pearson Education
  • 53. The Defense II: Securing E-Commerce Networks intrusion detection system (IDS) A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees Dealing with DoS Attacks Cloud Computing Prevents DoS Attacks 8-52Copyright © 2012 Pearson Education
  • 54. The Defense II: Securing E-Commerce Networks honeynet A network of honeypots honeypot Production system (e.g., firewalls, routers, Web servers, database servers) that looks like it does real work, but that acts as a decoy and is watched to study how network intrusions occur E-Mail Security 8-53Copyright © 2012 Pearson Education
  • 55. The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms general controls Controls established to protect the system regardless of the specific application; for example, protecting hardware and controlling access to the data center are independent of the specific application application controls Controls that are intended to protect specific applications 8-54Copyright © 2012 Pearson Education
  • 56. 8-55Copyright © 2012 Pearson Education
  • 57. The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms GENERAL, ADMINISTRATIVE, AND OTHER CONTROLS Physical Controls Administrative Controls APPLICATION CONTROLS AND INTELLIGENT AGENTS intelligent agents Software applications that have some degree of reactivity, autonomy, and adaptability—as is needed in unpredictable attack situations; an agent is able to adapt itself based on changes occurring in its environment 8-56Copyright © 2012 Pearson Education
  • 58. 8-57Copyright © 2012 Pearson Education
  • 59. The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms PROTECTING AGAINST SPAM Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act Law that makes it a crime to send commercial e-mail messages with false or misleading message headers or misleading subject lines 8-58Copyright © 2012 Pearson Education
  • 60. The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms PROTECTING AGAINST POP-UP ADS PROTECTING AGAINST SOCIAL ENGINEERING ATTACKS Protecting Against Phishing Protecting Against Malvertising PROTECTING AGAINST SPYWARE Using Policies and Training 8-59Copyright © 2012 Pearson Education
  • 61. Business Continuity, Disaster Recovery, Security Auditing, and Risk Management BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING disaster avoidance An approach oriented toward prevention, the idea is to minimize the chance of avoidable disasters (such as fire or other human-caused threats) 8-60Copyright © 2012 Pearson Education
  • 62. 8-61Copyright © 2012 Pearson Education
  • 63. Business Continuity, Disaster Recovery, Security Auditing, and Risk Management RISK-MANAGEMENT AND COST–BENEFIT ANALYSIS Risk-Management Analysis Calculating the Cost of a Fraud-Prevention System Ethical Issues 8-62Copyright © 2012 Pearson Education
  • 64. Implementing Enterprisewide E-Commerce Security THE DRIVERS OF EC SECURITY MANAGEMENT SENIOR MANAGEMENT COMMITMENT AND SUPPORT Unified Front 8-63Copyright © 2012 Pearson Education
  • 65. Implementing Enterprisewide E-Commerce Security EC SECURITY POLICIES AND TRAINING acceptable use policy (AUP) Policy that informs users of their responsibilities when using company networks, wireless devices, customer data, and so forth EC SECURITY PROCEDURES AND ENFORCEMENT business impact analysis (BIA) An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time, identifies the minimum resources needed to recover, and prioritizes the recovery of processes and supporting systems 8-64Copyright © 2012 Pearson Education
  • 66. Implementing Enterprisewide E-Commerce Security WHY IS IT DIFFICULT TO STOP INTERNET CRIME? Making Shopping Inconvenient Lack of Cooperation from Credit Card Issuers and ISPs Shoppers’ Negligence Ignoring EC Security Best Practices Computing Technology Industry Association (CompTIA) Nonprofit trade group providing information security research and best practices 8-65Copyright © 2012 Pearson Education
  • 67. Implementing Enterprisewide E-Commerce Security Design and Architecture Issues Lack of Due Care in Business Practices standard of due care Care that a company is reasonably expected to take based on the risks affecting its EC business and online transactions 8-66Copyright © 2012 Pearson Education
  • 68. Managerial Issues 1. What is the best EC security strategy for my company? 2. Is the budget for EC security adequate? 3. What steps should businesses follow in establishing a security plan? 4. Should organizations be concerned with internal security threats? 5. What is the key to establishing strong e-commerce security? 8-67Copyright © 2012 Pearson Education
  • 69. Summary 1. The key to establishing strong e-commerce security 2. Basic EC security issues and terminology 3. Threats, vulnerabilities, and technical attacks 4. Internet fraud, phishing, and spam 5. Information assurance 6. Securing EC access control and communications 8-68Copyright © 2012 Pearson Education
  • 70. Summary 7. Technologies for protecting networks. 8. The different controls and special defense mechanisms. 9. Protecting from fraud. 10. Role of business continuity and disaster recovery planning. 11. Enterprisewide EC security. 12. Why is it impossible to stop computer crimes? 8-69Copyright © 2012 Pearson Education
  • 71. Copyright © 2012 Pearson Education 8-70 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2012 Pearson Education