copyright 2008-12 1 comp 3410 – i.t. in electronic commerce esecurity mobile security roger clarke...

Post on 26-Mar-2015

216 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Copyright2008-12

1

COMP 3410 – I.T. in Electronic Commerce

eSecurityMobile Security

Roger ClarkeXamax Consultancy, Canberra

Visiting Professor, A.N.U. and U.N.S.W.

http://www.rogerclarke.com/EC/ ...ETSecy4 {.html, .ppt}

ANU RSCS, 16 October 2012

Copyright2008-12

2

Mobile Security

Agenda

1. Mobile Technology• Devices• Wireless Comms

2. Mobile Technology Users3. Mobile Payments4. Risk Assessment for Mobile Payments5. Risk Assessment for Contactless Chips

Copyright2008-12

3

1. Mobile Devices 'Any device that provides users with the capacity to

participate in Transactions with Adjacent and Remote devices by Wireless Means'

• Mobiles / Smartphones• Handheld Computing Devices

PDAs, games machines, music-players, 'converged' / multi-function devices,Tablets esp. iPad but now many followers

• Processing Capabilities in Other 'Form Factors'Credit-cards, RFID tags, subcutaneous chips

• Wearable Computing DevicesWatches, finger-rings, key-rings, glasses, necklaces, bracelets, anklets, body-piercings

• ? Nomadic / Untethered PCs

Copyright2008-12

4

Wireless Comms and Mobile Security in 2011

• Wide Area Networks – Satellite• Geosynchronous (2 second latency)• Low-Orbit (Iridium)

• Wide Area Networks – ‘WiMax’ / IEEE 802.16; iBurst• Wide Area Networks – Cellular (0.5 to 20km per cell)

1 – Analogue Cellular, e.g. AMPS, TACS2 – Digital Cellular, e.g. GSM, CDMA3 – GSM/GPRS/EDGE, CDMA2000, UMTS/HSPA4G – LTE, with preliminary versions imminent

• Local Area Networks – ‘WiFi’ / 802.11x (10-100m radius)

• Personal Area Networks – Bluetooth (1-10 m radius)• Contactless Cards / RFID Tags / NFC (1-10cm radius)

Copyright2008-12

5

2. Mobile Technology UsersDimensions of Differentiation

• Education, Income, Wealth• Infrastructure Availability• Technical Capability

Copyright2008-12

6

2. Mobile Technology UsersDimensions of Differentiation

• Education, Income, Wealth• Infrastructure Availability• Technical Capability

• Opportunity-Awareness• Leadership / Followership• Risk-Awareness, Risk-

Aversion

Copyright2008-12

7

2. Mobile Technology UsersDimensions of Differentiation

• Education, Income, Wealth• Infrastructure Availability• Technical Capability

• Opportunity-Awareness• Leadership / Followership• Risk-Awareness, Risk-

Aversion

• Age / 'Generation'

Copyright2008-12

8

The 'Generations' of Computing Consumers

Indicative Indicative Generation Birth-Years Age in 2011Silent / Seniors 1910-45 66-100Baby Boomers – Early 1945-55 56-66Baby Boomers – Late 1955-65 46-56Generation X 1965-80 31-46Generation Y 1980-95 16-31The iGeneration 1995- 0-

16

Copyright2008-12

9

Generational Differences

Baby Boomers (45-65)Handshake/phone, PCs came late, had to adapt to mobile phonesWork is Life, the team discusses / the boss decides, process-oriented

GenXs (30-45)Grew up with PCs, email and mobile phones, hence multi-taskersWork to Have More Life, expect payback from work, product-oriented

GenYs (15-30)Grew up with IM/chat, texting and video-games, strong multi-taskersLife-Work Balance, expect fulfilment from work, highly interactive

iGens (to 15)Growing up with texting, multi-media social networking, networked games, multi-channel immersion / inherent multi-tasking?Life before Work, even more hedonistic, highly (e-)interactive

Copyright2008-12

10

3. Mobile Payments• Commerce

Purchases of physical goods and services, atphysical POS, road tolls (Contactless Chips, NFC)

Copyright2008-12

11

Mobile Payments• Commerce

Purchases of physical goods and services, atphysical POS, road tolls (Contactless Chips, NFC)

• eCommercePurchases of physical goods and servicesat virtual points of sale (Internet, Cellular phone)

Copyright2008-12

12

Mobile Payments• Commerce

Purchases of physical goods and services, atphysical POS, road tolls (Contactless Chips, NFC)

• eCommercePurchases of physical goods and servicesat virtual points of sale (Internet, Cellular phone)

• MCommercePurchases of digital goods and services, such as image, audio and video, and location-specific data

Copyright2008-12

13

Mobile Payments• Commerce

Purchases of physical goods and services, atphysical POS, road tolls (Contactless Chips, NFC)

• eCommercePurchases of physical goods and servicesat virtual points of sale (Internet, Cellular phone)

• MCommercePurchases of digital g&s, such as image, audio and video, and location-specific data

• Consumer-to-Consumer (C2C) Transfers of value between individuals

Copyright2008-12

14

4. Risk Assessment for Mobile Payments

(0) The Mainstream Security Model

(1) The Technical Architecture(2) The Commercial Architecture(3) The Transaction Process Aspect(4) The Harm Aspect(5) The Vulnerability Aspect(6) The Threat Aspects(7) The Safeguards Aspect

Copyright2008-12

15

(0) The Mainstream Security Model

Abstract ThreatsBecome Actual Threatening

Events ,Impinge on Vulnerabilities,

Overcome Safeguards& Cause Harm

Security is a (desirable) condition

in which Harm does not arisebecause Threats are countered

by Safeguards

Technical Architecture

of

Physical Infrastructure

Commercial Architecture

Trans-

action

Process

Security Model

Threats

Safeguards

Vulnerabilities

Harm

Copyright2008-12

16

(1) The Technical ArchitectureIndicative Model

QuickTime™ and aTIFF (LZW) decompressorare needed to see this picture.

QuickTime™ and aTIFF (LZW) decompressorare needed to see this picture.

User

AccessDevice

Personal

Area Network& Router / Proxy

InternetAccess

Provider (IAP)or

TransactionDevice (TD)

NetworkIntermediary

Nodes(Routers /Proxies)

NetworkIntermediary

Nodes(Routers /Proxies)

Gateways

AccessNetworks(Unwired)

Core Networks(Wired, Unwired)

–––––––––––– The Internet –––––––––––

PaymentIntermediaries

PaymentServices

Physical Context

IAP

TD

Copyright2008-12

17

(2) Commercial Architecture

• Customer/Payer• Seller/Payee• Payment Handler• Delivery Handler• Customer Support

Internet Online Trading Protocol (IOTP):

Copyright2008-12

18

(2) Commercial Architecture

• Customer/Payer• Seller/Payee• Payment Handler• Delivery Handler• Customer Support

BUT ALSO ...

• Internet Access Providers (IAPs)• Carriage Service Providers (CSPs)• Commercial Intermediaries, e.g.

Paypal• Transaction Service Providers

e.g. banks and credit-card companies• Payment Services Providers, e.g.

deposit-holders, lenders and insurers• Regulators and complaints bodies

e.g. financial services ombudsmen• Consumer Rights representative

and advocacy organisations• Consumer Segments, e.g. the

mobility-disadvantaged, the sight-impaired, people with limited financial assets

Internet Online Trading Protocol (IOTP):

Copyright2008-12

19

(3) The Transaction Process Aspect

From Herzberg (2003), p. 56

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Copyright2008-12

20

(4) The Harm Aspect• Injury to Persons• Damage to Property• Loss of Value of an Asset

Copyright2008-12

21

(4) The Harm Aspect• Injury to Persons• Damage to Property• Loss of Value of an Asset• Breach of Personal Data Security,

or Privacy more generally• Financial Loss

Copyright2008-12

22

(4) The Harm Aspect• Injury to Persons• Damage to Property• Loss of Value of an Asset• Breach of Personal Data Security,

or Privacy more generally• Financial Loss• Inconvenience and Consequential

Costs arising from Identity Fraud

• Serious Inconvenience and Consequential Costs arising from Identity Theft

• Loss of Reputation and Confidence

Copyright2008-12

23

(5) The Vulnerability Aspect• The Environment

• Physical Surroundings• Organisational Context• Social Engineering

• The Device• Hardware, Systems Software• Applications• Server-Driven Apps

(ActiveX, Java, AJAX, HTML5)• The Device's Functions:

Known, Unknown, Hidden• Software Installation• Software Activation

• Communications• Transaction

Partners• Data Transmission

• Intrusions• Malware Vectors• Malware Payloads• Hacking, incl.

Backdoors, Botnets

Copyright2008-12

24

(5) Threat Aspects – Second-Party• Situations of Threat:

• Banks• Telcos / Mobile Phone Providers• Toll-Road eTag Providers• Intermediaries• Devices

• Safeguards:• Terms of Contract• Risk Allocation• Enforceability• Consumer Rights

Copyright2008-12

25

(6) Threat Aspects – Third-Party, Within-System

(Who else can get at you, where, and how?)

• Points-of-Payment Physical:• Observation• Coercion

• Points-of-Payment Electronic:

• Rogue Devices• Rogue Transactions• Keystroke Loggers• Private Key Reapers

• Network Electronic• Interception• Decryption• Man-in-the-

Middle Attacks• Points-of-Processing

• Rogue Employee• Rogue Company• Error

Copyright2008-12

26

(6) Threat Aspects – Third-Party, Within-Device

• Physical Intrusion• Social Engineering

• Confidence Tricks• Phishing

• Masquerade• Abuse of Privilege

• Hardware• Software• Data

• Electronic Intrusion• Interception• Cracking / ‘Hacking’

• Bugs• Trojans• Backdoors• Masquerade

• Distributed Denialof Service (DDOS)

• Infiltration by Software with a Payload

Copyright2008-12

27

(6) Threat Aspects – Third-Party, Within-Device

Infiltration by Software with a Payload

Software (the ‘Vector’)

• Pre-Installed• User-Installed• Virus• Worm• ...

Payload• Trojan:

• Spyware• Performative• Communicative• Bot / Zombie

• Spyware:• Software Monitor• Adware• Keystroke Logger• ...

Copyright2008-12

28

Key Threat / Vulnerability Combinations

• Unauthorised Conduct of Transactions

• Interference with Legitimate Transactions

Copyright2008-12

29

Key Threat / Vulnerability Combinations

• Unauthorised Conduct of Transactions

• Interference with Legitimate Transactions

• Acquisition of Identity Authenticatorse.g. Cr-Card Details (card-number as identifier, plus the associated identity authenticators)

e.g. Username (identifier) plus Password/PIN/Passphrase/Private Signing Key (id authenticator)

e.g. Biometrics capture and comparison

Copyright2008-12

30

Key Threat / Vulnerability Combinations

• Unauthorised Conduct of Transactions

• Interference with Legitimate Transactions

• Acquisition of Identity Authenticatorse.g. Cr-Card Details (card-number as identifier, plus the associated identity authenticators)e.g. Username (identifier) plus Password/PIN/Passphrase/Private Signing Key (id authenticator)e.g. Biometrics capture and comparison

• Use of a Consumer Device as a Tool in a fraud perpetrated on another party

Copyright2008-12

31

5. Risk Assessment of Contactless Chips

• RFID / NFC chip embedded in card

• Wireless operation, up to 5cm from a terminal

• Visa Paywave and MasterCard PayPass

• Up to $100 (cf. original $25)

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Copyright2008-12

32

Contactless Chip-Cards as Payment Devices

• RFID / NFC chip embedded in card

• Wireless operation, up to 5cm from a terminal

• Visa Paywave and MasterCard PayPass

• Up to $100 and $35 resp. (cf. original $25)

• Presence of chip in card is not human-visible, butLogo / Brand may be visible

• No choice whether it's activated• Operation of chip in card

is not human-apparent• No action required when within

5cm range, i.e. automatic payment

• No receipt is the norm • Used as Cr-Card:

Unauthenticated auto-lending• Used as Dr-Card:

PIN-less charge to bank account

Copyright2008-12

33

• Authentication – None / A Non-Secret // For Higher-Value Transactions Only / AlwaysUK RingGo Parking Payment Scheme – last 4 digits

• Act of Consent – None / Unclear / Cleare.g. Tap the Pad in Response to Display of Fare

• Notification – None / Audio / DisplayIf 'None', then enables surreptitious payment extraction

• Receipt / Voucher – None / Option or Online / YOctopus, Drive-Through eTags for Road-TollsUK RingGo Parking Payment Scheme

Key Safeguards for Chip Payment Schemes

Copyright2008-12

34

• Authentication – None / A Non-Secret (but Yes, for Transactions >$100 Only)

• Act of Consent – None? / Unclear? / Clear?If the card is within 5cm of a device, whether seen or not

• Notification – None? / Audio? / Display?If 'None', then enables surreptitious payment extraction

• Receipt / Voucher – None? / Option? / Y?

Visa PayWave and MCard Paypass

Copyright2008-12

35

The (In)Security Profile ofContactless Chip-Card Payment

Transactions• Non-Authentication, or mere possession:

• presentation of the card within a device's field, when that device is ready to charge money for something

• Vulnerable to card-capture, rogue devices, rogue transactions by legitimate devices, ...

• Relies on:• general levels of honesty among merchants and FIs• (consumer reconciliation is infeasible – no

vouchers, and either very long statements or no statements)

• (fraudulent transactions are obscured)• self-insurance by consumers

Copyright2008-12

36

Key Safeguards Required• Choice of Activation or Not• Two-Sided Device Authentication, i.e.

• by Payee’s Chip of Payer’s Chip• by Payer’s Chip of Payee’s Chip

• Notification to Payer of:• Fact of Payment (e.g. Audio-Ack)• Amount of Payment

• At least one Authenticator• Protection of the Authenticator(s)• A Voucher (Physical and/or Electronic)• Regular Account Reconciliation by

Payers

Copyright2008-12

37

The Status of Consumer Protection

• EFT Code of Conduct – phasing outhttp://www.asic.gov.au/asic/pdflib.nsf/LookupByFileName/EFT-Code-as-amended-from-1-July-2012.pdf

• ePayments Code – phasing in by 30 March 2013http://www.asic.gov.au/asic/asic.nsf/byheadline/ePayments-Code?openDocument

• Soft regulation of such things as receipts, risk apportionment, complaints, privacy, ...

• The banks have sought to weaken the protections (In NZ they succeeded, but were beaten back by the tide of public opinion, and withdrew the changes)

• The Code's provisions apply to contactless-card transactions – but with a lot of 'buts'

Copyright2008-12

38

Payments in the Network EraInitially Wired, Increasingly

Unwired

‘Secure’ Models• ATMs• EFTPOS – Dr Tx• Internet

Banking• Debit Tx

over the Internet

Insecure Models• EFTPOS – Cr Tx• Credit Card Tx

over the Internet(CNP / MOTO)

Highly Insecure Models

• Contactless-Chip/ RFID / NFC

Copyright2008-12

39

Mobile Security

Agenda

1. The Motivation2. Mobile Technology3. Mobile Technology Users4. Mobile Payments5. Risk Assessment for Mobile Payments6. Risk Assessment for Contactless Chips

Copyright2008-12

40

COMP 3410 – I.T. in Electronic Commerce

eSecurityMobile Security

Roger ClarkeXamax Consultancy, Canberra

Visiting Professor, A.N.U. and U.N.S.W.

http://www.rogerclarke.com/EC/ ...ETSecy4 {.html, .ppt}

ANU RSCS, 16 October 2012

top related