+ All Categories
Home > Documents > Bd541Module VI E-Commerce Jan 2011

Bd541Module VI E-Commerce Jan 2011

Date post: 07-Apr-2018
Category:
Upload: kranti-chandra
View: 216 times
Download: 0 times
Share this document with a friend

of 41

Transcript
  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    1/41

    Amity School of Business

    1

    Amity School of Business

    BBA, Semester IV

    E-Commerce

    Ms Kareena Bhatia

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    2/41

    Amity School of Business

    2

    MODULE-VI

    Security Threats with E-Commerce

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    3/41

    Amity School of Business

    Internet Security Internet security is about protecting information. The risks inherent in

    e-commerce can be harnessed only through appropriate securitymeasures and business and legal procedures that ensure the integrity

    and reliability of Internet transactions. The electronic system that support e-commerce is susceptible to abuse

    and failure in many ways:

    - Fraud, resulting in direct financial loss. Funds may betransferred from one account to another

    - Theft of confidential, proprietary, technological, or marketinginformation belonging to the firm or to the customer

    - Disruption of service, resulting in major losses to the businessor inconvenience to the customer

    - Loss of customer confidence stemming from illegal interruptioninto customer files or company business

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    4/41

    Amity School of Business

    E-Commerce Security issuesThe following points outline the security issues related to e-commerce.

    Confidentially : Knowing who can read data and ensuring that

    information in the network remain private.

    Authentication : Making sure that message senders or principals are

    who they say they are.

    Access Control : Restricting the use of a resource to authorized

    principals.

    Integrity : Making sure that information is not accidentally or

    maliciously altered or corrupted in transit.

    Nonrepudiation : Ensuring that principals cannot deny that they sent

    the message.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    5/41

    Amity School of Business

    Designing e-security involves five steps:

    1. Assessing Web Security needs.2. Establishing a Good Policy.

    3. Fulfilling Web security needs.

    4. Structuring the Security Environment.

    5. Monitoring the System.

    Designing E-Security

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    6/41

    Amity School of Business

    Assessing Web Security Needs A chief security officer is in charge of overseeing the entire security

    setup of the firm. He or she should be well versed in the technology as

    well as the nature of the business.

    The person must also be able to pinpoint which security breaches

    threaten the companys business and how well the company is in

    compliance with various laws and regulations.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    7/41

    Amity School of Business

    Establishing A Good Policy Policies should cover the threats that attack confidentially, integrity

    and privacy.

    Security Polices should cover the entire e-commerce system includingthe merchants local area networks, hardware, software, firewalls,

    protocols, standards, databases, and the staff directly involved in thee-commerce process.

    The policies should spell out Internet security practices, the nature andlevel of risks, the level of protection, and the procedure to be followedin case of threats and recover from failure.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    8/41

    Amity School of Business

    Fulfilling Web Security Needs Design consideration for the company is to list top vulnerabilities and

    take a close look at critical applications to decide risk levels. Theamount of security a Web merchant needs depends on the sensitivity

    of its data and the demand for it. For example, if your site collectscredit card numbers for access, you want the highest security possiblefor the Web server, the network and the Web site.

    Consult with your Web administrator or an outside security consultantto see what options are available and how to put them to good use.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    9/41

    Amity School of Business

    Structuring The Security Environment The design begins with sketching out the stepping stones- the

    sequence and parameters in the security network based on the securitypolicy and requirements of the e-commerce system.

    How much security goes into a system depends on how much risk thecompany is willing to take, the security policy it willing to adopt, andthe present state of security practices in the workplace.

    A security perimeter generally includes firewalls, authentication,virtual private networks, and intrusion detection devices. Installingsuch software and devices is part of physical design. The challenge isto police the entire perimeter.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    10/41

    Amity School of Business

    Authorize and Monitoring TheSecurity system

    Once the perimeter is secure and only authorized users are allowed

    access to the e-commerce site, the next step is to install a system that

    generates authorization to different users to handle different jobs.

    These functions require that the security system be monitored via

    feedback mechanisms to ensure that the entire system is working

    properly.

    Monitoring means capturing processing details for evidence, verifyingthat e-commerce is operating within the security policy, and verifying

    that attacks have been unsuccessful.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    11/41

    Amity School of Business

    Kinds of Threats and Crimes1. Those that are physically related : For example, a hacker might

    attempt to steal or damage inventory. Other example include stolencredit card records, stolen computer hardware or software. An

    attacker, often by guessing passwords, might succeed in gainingaccess to another users account.

    2. Those that are order related: For example, a customer mightattempt to use an invalid or a stolen credit card or claim no

    merchandise was received on a good credit card. Children might usetheir parents credit card without permission. Insiders can do a lot toinfect an order because they have access to sensitive systems andinformation.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    12/41

    Amity School of Business

    Kinds of Threats and Crimes3. Those that are electronically related: A hacker might try to sniff

    e-mail information or attempt to steal credit card numbers and use

    them illegally at a later date. Sniffer (a person or a program thatuses the Internet to record information that transmits through a

    router from its source to its destination). Another example of an

    electronically related attack is damaging or destroying a Web site

    and infecting the entire business-to-consumer interface with

    malicious software called a virus.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    13/41

    Amity School of Business

    The Threats Posed to E-CommerceServers

    E-Commerce is the transaction of goods and services and the payment

    for those goods and services over the Internet. Therefore, the physical

    place where all of these transactions occur is at the Server level. The

    server can be viewed as the central repository for your E-Commerce

    Place of Business which consists of the actual website which displaysyour products and services, the customer database, and the payment

    mechanism.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    14/41

    Amity School of Business

    Threats to E-Commerce servers can be classified as either(1) Malicious Code Threats (2) Transmission Threats.

    Malicious code is introduced into the server in order to gain

    access to the system resources. Very often, the intent ofMalicious Code Attacks is to cause large scale damage to theE-Commerce server.

    The threats and risks can be classified as either as active or

    passive. With passive threats, the main goal is to listen totransmissions to the server. With active threats, the intent is toalter the flow of data transmission aimed directly at the E-Commerce server.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    15/41

    Amity School of Business

    Malicious Code ThreatsViruses and Worms

    A virus needs a host of some sort in order to cause damage to thesystem. The exact definition is . . . a virus attaches itself to

    executable code and is executed when the software program begins torun or an infected file is opened. So for example, a virus needs a filein which to attach itself to. Once that file is opened, the virus can thencause the damage. This damage can range from the deletion of somefiles to the total reformatting of the hard drive. The key to thing toremember about viruses is that they cannot by themselves spread-they

    require a host file. However, worms are very much different. Aworm does not need a host to replicate. Rather, the worm replicatesitself through the Internet, and can literally infect millions ofcomputers on a global basis in just a matter of hours. However,worms can shut down parts of the Internet or E-Commerce servers,

    because they can use up valuable resources of the Internet, as well asthe memory and processing power of servers and other computers.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    16/41

    Amity School of Business

    Malicious Code ThreatsTrojan Horses

    A Trojan Horse is a piece of programming code that is layered behindanother program, and can perform covert, malicious functions. Forexample, your E-Commerce server can display a cool-lookingscreen saver, but behind that could be a piece of hidden code, causingdamage to your system. One way to get a Trojan Horse attack is bydownloading software from the Internet.

    Logic Bombs A Logic Bomb is a version of a Trojan Horse, however, it is event or

    time specific. For example, a logic bomb will release malicious or

    rogue code in an E-Commerce server after some specific time has

    elapsed or a particular event in application or processing has occurred.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    17/41

    Amity School of Business

    Transmission ThreatsDenial of Service Attacks

    With a Denial of Service Attack, the main intention is to deny your

    customers the services provided on your E-Commerce server. Thereis no actual intent to cause damage to files or to the system, but the

    goal is to literally shut the server down. This happens when a massive

    amount of invalid data is sent to the server. Because the server can

    handle and process so much information at any given time, it is unable

    to keep with the information and data overflow. As a result, the server

    becomes confused, and subsequently shuts down.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    18/41

    Amity School of Business

    Transmission ThreatsPing of Death

    When we surf the Web, or send E-Mail, the communications betweenour computer and the server takes place via the data packet. It is thedata packet that contains the information and the request forinformation that is sent from our computer to other computers over theInternet. The communication protocol which is used to govern theflow of data packets is called Transmission Control Protocol/InternetProtocol, or TCP/IP for short. The TCP/IP protocol allows for data

    packets to be as large as 65,535 bytes. With a Ping of Death Attack, amassive data packet is sent i.e., > 65,535 bytes. As a result, thememory buffers of the E-Commerce Server are totally overloaded,thus causing it to crash.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    19/41

    Amity School of Business

    Phishing Attacks

    Phishing can be defined as the act of sending an e-mail to a user

    falsely claiming to be an established legitimate enterprise in an

    attempt to con the user into surrendering private information that will

    be used for identity theft. For example, fraudulent e-mail could be

    sent to your customers claiming that their online account is about to

    expire, or that there is a security upgrade that will take place

    affecting their online account. After they are tricked into believing

    the content of the Phishing e-mail, the customer then clicks on thelink, and submits all of their confidential information. All Phishing

    e-mail contains a link, or a web address, in which the customer clicks

    on thinking that they are using secure and legitimate site.

    Customer Related Threats

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    20/41

    Amity School of Business

    Transmission ThreatsData Packet Sniffing

    This refers to the use of Data Packet Sniffers, also known simply as

    sniffers. While it is an invaluable tool to the Network

    Administrator for troubleshooting and diagnosis, an attacker can alsouse a sniffer to intercept the data packet flow and analyze the

    individual data packets. Usernames, passwords, and other

    confidential customer data can then be hijacked from the E-Commerce

    server. This is a very serious problem, especially in wireless

    networks, as the data packets literally leave the confines of thenetwork cabling and travel in the air. Ultimately, Data Packet

    Sniffing can lead to hijacking sessions. This is when the attacker

    eventually takes control over the network connection, kicks off

    legitimate users (such as your customers) from the E-Commerce

    server, and ultimately gains control of it.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    21/41

    Amity School of Business

    Security Protection and Recovery

    Basic Internet Security Practices

    Passwords

    Firewalls

    Biometrics

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    22/41

    Amity School of Business

    FIREWALLS A firewall is a combination of hardware and software that sits between

    the internet and internal network of an organization to protect thenetwork from outside attack (Fig. 1). It can examine the data enteringor leaving from the network and can filter the data according to

    certain rules, thus, protects the network from an attack.

    It uses a set of rules to determine whether outgoing or incoming datapackets are allowed to pass through the firewall. For example, we can,as a rule, specify IP addresses of sending devices such that packets

    from these IP addresses are not allowed to enter the network. TheFirewall would stop them from entering.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    23/41

    Amity School of Business

    Cryptography Cryptography is the technique of converting a message intounintelligible or non-understandable form such that even if someunauthorized or unwanted person intercepts the message he/she wouldstill not be able to make any sense out of it. Cryptography isthousands of years old.

    Techniques used for cryptography Substitution In substitution wereplace each letter in the message with another to make the messagenon-understandable. For example, each letter a in the message can

    be replaced with letter d and letter b with letter e and so on.

    Transposition It is based on scrambling the characters in a message.

    A transposition system may first write a message into a table row byrow then the message can be read and rewritten column by column tomake it scrambled (see Fig 1)

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    24/41

    Amity School of Business

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    25/41

    Amity School of Business

    Cryptography Without cryptography, it is doubtful that banks, businesses and

    individuals would feel safe doing business online.

    Cryptography is a collection of mathematical techniques used toensure confidentiality of information. The process of scrambling amessage with the help of a key is called Encryption. The process ofunscrambling a message using an appropriate key is calledDecryption

    There are two types of cryptography - Symmetric and Asymmetriccryptography.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    26/41

    Amity School of Business

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    27/41

    Amity School of Business

    Symmetric Cryptography

    In symmetric cryptography same keys are used for encryption

    and decryption.

    Asymmetric or Public Key Cryptography

    In this type a pair of public and private keys is used for

    encryption and decryption

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    28/41

    Amity School of Business

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    29/41

    Amity School of Business

    PrivateKey Cryptography(Symmetric Encryption)

    In private-key cryptography, the sender and recipient agree

    beforehand on a secret private key. The plaintext is somehow

    combined with the key to create the cipher text. The method of

    combination is such that, it is hoped, an adversary could not

    determine the meaning of the message without decrypting the

    message, for which he needs the keys.

    The following diagram illustrates the Encryption Process .

    The following diagram illustrates the Decryption Process

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    30/41

    Amity School of Business

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    31/41

    Amity School of Business

    Private-key methods are efficient and difficult to break.

    However, one major drawback that the key must be

    exchanged between the sender and recipient beforehand,

    raising the issue of how to protect the secrecy of the key.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    32/41

    Amity School of Business

    Public-Key Cryptography (Asymmetric Encryption)

    A encryption system that uses two keys -- a public key

    known to everyone and a private or secret key known only to the

    recipient of the message.

    An important element to the public key system is that the

    public and private keys are related in such a way that only the

    public key can be used to encrypt messages and only thecorresponding private key can be used to decrypt them

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    33/41

    Amity School of Business

    E-Commerce : Encryption contd

    (Alices public key)

    (Alices private key)

    Bob Doug

    Alices public key is known

    to all

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    34/41

    Amity School of Business

    HNFmsEm6Un

    BejhhyCGKOK

    JUxhiygSBCEiC

    0QYIh/Hn3xgiK

    BcyLK1UcYiY

    lxx2lCFHDC/A

    "Hey,Alice, howabout lunch at Taco

    Bell. I hear they

    have free refills!"Encrypt with

    Alices public keyBob

    (S)

    HNFmsEm6Un

    BejhhyCGKOKJUxhiygSBCEiC

    0QYIh/Hn3xgiK

    BcyLK1UcYiY

    lxx2lCFHDC/ADecrypt with

    Alices private key

    "Hey,Alice, how

    about lunch at TacoBell. I hear they

    have free refills!"

    Alice

    (R)

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    35/41

    Amity School of Business

    Digital/Electronic Signature An electronic signature means any letters, numbers,

    symbols, images, characters or any combination thereof

    in electronic form applied to an electronic document whichcan ensure authenticity, integrity and non-repudiation.

    It uses public key cryptography Authenticity means that the

    message is from a particular source/individual. Integrity

    means that the message has not been altered duringtransmission. Non-repudiation means that the execution of

    the digital signatures cannot be denied by the one who is

    sending the message.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    36/41

    Amity School of Business

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    37/41

    Amity School of Business

    Digital Certificates

    These are the certificates in electronic form which establish whether

    or not a public key belongs to the purported owner. A digital

    certificate at least comprises a public key, certification information(name, ID etc.) and electronic signatures of a certification authority.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    38/41

    Amity School of Business

    Certification authority (CA) A certification authority is defined to be a trusted public/private body

    that attests the association of a particular individual with his/hercorresponding public key. A CA signs digital certificates with its

    private key.

    There are many CAs working in the field but the pioneering or themost reputed CA is Verisign which is based in America.

    Certification authorities work in a hierarchical fashion. There is the

    CA at the top called root CA (the most reputed CA). It can issuecertificates to CAs working below it and those CAs can further issuecertificates to CAs working under them. In this fashion a hierarchy ofCAs is developed with each CA confirming the public key of the CA

    below it through a digital certificate.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    39/41

    Amity School of Business

    Role of a Certification AuthorityThe role of a Certification Authority is analogous or similar to a passport

    office. The issuance of passport by the passport office attaches credibility

    that this particular person is entitled to travel. However, the passport is

    not issued by the office until detailed enquiry/verification about theIdentity of the person is made.

    Once a person holds the passport, that confirms that this particular

    person whose, name, address etc. is appearing on the passport is entitled

    to travel. Similarly, if a digital certificate is issued by a reputed CA thatwould confirm to other people that this particular public key certified by

    the CA belongs to this individual only.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    40/41

    Amity School of Business

    Reason why we use the concept of CAs.We use it for the verification of identify of a person. This is probably thebest solution envisaged for such verification, though it may have certain

    loopholes in it. You can realize that the best thing is that Mr. A

    personally hands over his public key. On the other hand if I try to trace

    his public key against his particulars (name, address, and identification

    no.) on a key server

    There is a possibility that I end up discovering that there are three, four,

    five different public keys against the particulars of same Mr. A. Assume

    that all of them have been certified by different CAs. Now, I amconfused that which of these is genuine so that I can use it. Indeed, only

    one of them is genuine and the rest are fraudulent keys registered by

    fraudulent people using particulars of Mr. A. In this situation I would use

    and rely upon that public key of Mr. A that has been certified by the

    most re uted CA amon all the CAs. I would treat others as fraudulent.

  • 8/6/2019 Bd541Module VI E-Commerce Jan 2011

    41/41

    Amity School of Business

    The objective of getting fraudulent keys is to intercept/receive the

    messages intended to be sent to a particular receiver. So, if someone

    intends to receive the messages delivered for Mr. A, he may register

    the key against his particulars and get a certificate in this behalf.

    Note: That CAs are supposed to issue the certificate after proper

    enquiry, otherwise they may also be held liable under different laws.


Recommended