e-business ninth edition chapter 8 online security

108
E-Business Ninth Edition Chapter 8 Online Security

Upload: catherine-fletcher

Post on 25-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: E-Business Ninth Edition Chapter 8 Online Security

E-BusinessNinth Edition

Chapter 8Online Security

Page 2: E-Business Ninth Edition Chapter 8 Online Security

22

Learning Objectives

In this chapter, you will learn:

• What security risks arise in online business and how to manage them

• How to create a security policy

• How to implement security on Web client computers

• How to implement security in the communication channels between computers

Page 3: E-Business Ninth Edition Chapter 8 Online Security

Learning Objectives (cont’d.)

• How to implement security on Web server computers

• What organizations promote computer, network, and Internet security

3

Page 4: E-Business Ninth Edition Chapter 8 Online Security

4

Online Security Issues Overview

• Early Internet days– Most popular use: electronic mail

• Today’s higher stakes– Electronic mail, shopping, all types of financial

transactions

• Common worry of Web shoppers– Stolen credit card as it transmits over the Internet– More likely to be stolen from computer where stored

• Chapter topic: security in the context of electronic commerce

Page 5: E-Business Ninth Edition Chapter 8 Online Security

5

Origins of Security on Interconnected Computer Systems

• Data security measures taken by Roman Empire– Coded information to prevent enemies from reading

secret war and defense plans

• Modern electronic security techniques– Defense Department wartime use

• “Orange Book”: rules for mandatory access control

• Business computers– Initially adopted military’s security methods

• Today’s computing– Requires comprehensive computer security plans

5

Page 6: E-Business Ninth Edition Chapter 8 Online Security

6

Computer Security and Risk Management

• Computer security– Asset protection from unauthorized access, use,

alteration, and destruction

• Physical security– Includes tangible protection devices

• Alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings

• Logical security– Asset protection using nonphysical means

Page 7: E-Business Ninth Edition Chapter 8 Online Security

7

Computer Security and Risk Management (cont’d.)

• Threat– Any act or object posing danger to computer assets

• Countermeasure– Procedure (physical or logical)

• Recognizes, reduces, and eliminates threat

– Extent and expense of countermeasures• Vary depending on asset importance

7

Page 8: E-Business Ninth Edition Chapter 8 Online Security

8

Computer Security and Risk Management (cont’d.)

• Risk management model– Four general organizational actions

• Impact (cost) and probability of physical threat

– Also applicable for protecting Internet and electronic commerce assets from physical and electronic threats

• Electronic threat examples:– Impostors, eavesdroppers, thieves

• Eavesdropper (person or device)– Listen in on and copy Internet transmissions

8

Page 9: E-Business Ninth Edition Chapter 8 Online Security

9

FIGURE 10-1 Risk management model

© C

enga

ge L

earn

ing

2013

Page 10: E-Business Ninth Edition Chapter 8 Online Security

10

Computer Security and Risk Management (cont’d.)

• Crackers or hackers (people)– Write programs; manipulate technologies

• Obtain unauthorized access to computers and networks

• White hat hacker and black hat hacker– Distinction between good hackers and bad hackers

• Good security scheme implementation– Identify risks– Determine how to protect threatened assets– Calculate costs to protect assets

Page 11: E-Business Ninth Edition Chapter 8 Online Security

11

Elements of Computer Security

• Secrecy – Protecting against unauthorized data disclosure– Ensuring data source authenticity

• Integrity– Preventing unauthorized data modification– Man-in-the-middle exploit

• E-mail message intercepted; contents changed before forwarded to original destination

• Necessity– Preventing data delays or denials (removal)– Delaying message or completely destroying it

Page 12: E-Business Ninth Edition Chapter 8 Online Security

Establishing a Security Policy

• Security policy– Assets to protect and why, protection responsibility,

acceptable and unacceptable behaviors– Physical security, network security, access

authorizations, virus protection, disaster recovery

• Military policy: stresses separation of multiple levels of security

• Corporate information classifications– Public– Company confidential

12

Page 13: E-Business Ninth Edition Chapter 8 Online Security

13

Establishing a Security Policy (cont’d.)

• Steps to create security policy– Determine assets to protect from threats– Determine access to various system parts– Identify resources to protect assets– Develop written security policy– Commit resources

• Comprehensive security plan goals– Protect privacy, integrity, availability; authentication– Selected to satisfy Figure 10-2 requirements

Page 14: E-Business Ninth Edition Chapter 8 Online Security

14

FIGURE 10-2 Requirements for secure electronic commerce

© C

enga

ge L

earn

ing

2013

Page 15: E-Business Ninth Edition Chapter 8 Online Security

15

Establishing a Security Policy (cont’d.)

• Security policies information sources– WindowSecurity.com site– Information Security Policy World site

• Absolute security: difficult to achieve– Create barriers deterring intentional violators– Reduce impact of natural disasters and terrorist acts

• Integrated security – Having all security measures work together

• Prevents unauthorized disclosure, destruction, modification of assets

Page 16: E-Business Ninth Edition Chapter 8 Online Security

16

Establishing a Security Policy (cont’d.)

• Security policy points– Authentication: Who is trying to access site?– Access control: Who is allowed to log on to and

access site?– Secrecy: Who is permitted to view selected

information?– Data integrity: Who is allowed to change data?– Audit: Who or what causes specific events to occur,

and when?

Page 17: E-Business Ninth Edition Chapter 8 Online Security

17

Security for Client Computers

• Client computers– Must be protected from threats

• Threats– Originate in software and downloaded data– Malevolent server site masquerades as legitimate

Web site

• Chapter topics organized to follow the transaction-processing flow– Beginning with consumer– Ending with Web server at electronic commerce site

Page 18: E-Business Ninth Edition Chapter 8 Online Security

18

Cookies and Web Bugs

• Internet connection between Web clients and servers– Stateless connection

• Each information transmission is independent

• No continuous connection (open session) maintained between any client and server

• Cookies– Small text files Web servers place on Web client– Identify returning visitors– Allow continuing open session

Page 19: E-Business Ninth Edition Chapter 8 Online Security

19

Cookies and Web Bugs (cont’d.)

• Time duration cookie categories– Session cookies: exist until client connection ends– Persistent cookies: remain indefinitely– Electronic commerce sites use both

• Cookie sources– First-party cookies

• Web server site places them on client computer

– Third-party cookies• Different Web site places them on client computer

Page 20: E-Business Ninth Edition Chapter 8 Online Security

20

Cookies and Web Bugs (cont’d.)

• Disable cookies entirely– Complete cookie protection– Problem

• Useful cookies blocked (along with others)

• Full site resources not available

• Web browser cookie management functions– Refuse only third-party cookies– Review each cookie before accepted– Provided by most Web browsers

Page 21: E-Business Ninth Edition Chapter 8 Online Security

21

FIGURE 10-3 Mozilla Firefox dialog box for managing stored cookies

Page 22: E-Business Ninth Edition Chapter 8 Online Security

22

Cookies and Web Bugs (cont’d.)

• Web bug– Tiny graphic that third-party Web site places on

another site’s Web page– Purpose

• Provide a way for a third-party site to place cookie on visitor’s computer

• Internet advertising community:– Calls Web bugs “clear GIFs” or “1-by-1 GIFs”

• Graphics created in GIF format

• Color value of “transparent,” small as 1 pixel by 1 pixel

Page 23: E-Business Ninth Edition Chapter 8 Online Security

23

Active Content

• Active content– Programs embedded transparently in Web pages– Cause action to occur– E-commerce example

• Place items into shopping cart; compute tax and costs

• Advantages– Extends HTML functionality– Moves data processing chores to client computer

• Disadvantages– Can damage client computer

Page 24: E-Business Ninth Edition Chapter 8 Online Security

24

Active Content (cont’d.)

• Cookies, Java applets, JavaScript, VBScript, ActiveX controls, graphics, Web browser plug-ins, e-mail attachments

• Scripting languages: provide executable script– Examples: JavaScript and VBScript

• Applet: small application program– Typically runs within Web browser

• Some browsers include tools limiting applets’ actions

• Active content modules– Embedded in Web pages (invisible)

Page 25: E-Business Ninth Edition Chapter 8 Online Security

25

FIGURE 10-4 Advanced JavaScript settings in Mozilla Firefox

Page 26: E-Business Ninth Edition Chapter 8 Online Security

26

Active Content (cont’d.)

• Crackers: embed malicious active content

• Trojan horse– Program hidden inside another program or Web page

• Masking true purpose

– May result in secrecy and integrity violations

• Zombie (Trojan horse)– Secretly takes over another computer– Launches attacks on other computers

• Botnet (robotic network, zombie farm)– All controlled computers act as an attacking unit

Page 27: E-Business Ninth Edition Chapter 8 Online Security

27

Java Applets

• Java programming language– Developed by Sun Microsystems– Widespread use in Web pages: active content

• Java: platform-independent programming language– Provides Web page active content– Server sends applets with client-requested pages – Most cases: operation visible to visitor– Possibility: functions not noticed by visitor

Page 28: E-Business Ninth Edition Chapter 8 Online Security

28

Java Applets (cont’d.)

• Advantages– Adds functionality to business application’s

functionality; relieves server-side programs

• Disadvantage– Possible security violations (Trojan horse, zombie)

Page 29: E-Business Ninth Edition Chapter 8 Online Security

Java Applets (cont’d.)

• Java sandbox– Confines Java applet actions to set of rules defined by

security model– Rules apply to all untrusted Java applets

• Not established as secure

– Java applets running within sandbox constraint• Does not allow full client system access

• Prevents secrecy (disclosure) and integrity (deletion or modification) violations

29

Page 30: E-Business Ninth Edition Chapter 8 Online Security

30

JavaScript

• JavaScript– Scripting language developed by Netscape– Enables Web page designers to build active content– Based loosely on Sun’s Java programming language– Can be used for attacks

• Cannot commence execution on its own

• User must start ill-intentioned JavaScript program

Page 31: E-Business Ninth Edition Chapter 8 Online Security

31

ActiveX Controls

• ActiveX control– Objects containing programs and properties Web

designers place on Web pages

• Component construction– Many different programming languages

• Common: C++ and Visual Basic

• Run on Windows operating systems computers

• Executed on client computer like any other program

Page 32: E-Business Ninth Edition Chapter 8 Online Security

32

ActiveX Controls (cont’d.)

• Comprehensive ActiveX controls list– ActiveX page at Download.com

• Security danger– Execute like other client computer programs– Have access to full system resources

• Cause secrecy, integrity, and necessity violations

– Actions cannot be halted once started

• Web browsers– Provide notice of Active-X download or install

Page 33: E-Business Ninth Edition Chapter 8 Online Security

33

FIGURE 10-5 ActiveX control download warning dialog box in Internet Explorer

Page 34: E-Business Ninth Edition Chapter 8 Online Security

34

Graphics and Plug-Ins• Graphics, browser plug-ins, and e-mail attachments

can harbor executable content• Graphic: embedded code can harm client computer• Browser plug-ins (programs)

– Enhance browser capabilities

– Popular plug-ins: Adobe Flash Player, Apple’s QuickTime Player, Microsoft Silverlight, RealNetworks’ RealPlayer

– Can pose security threats• 1999 RealPlayer plug-in• Plug-ins executing commands buried within media

Page 35: E-Business Ninth Edition Chapter 8 Online Security

35

Viruses, Worms, and Antivirus Software

• Programs display e-mail attachments by automatically executing associated programs– Macro viruses within attached files can cause damage

• Virus: software– Attaches itself to another program– Causes damage when host program activated

• Worm: virus– Replicates itself on computers it infects– Spreads quickly through the Internet

• Macro virus– Small program (macro) embedded in file

Page 36: E-Business Ninth Edition Chapter 8 Online Security

36

Viruses, Worms, and Antivirus Software (cont’d.)

• ILOVEYOU virus (“love bug”)– Spread with amazing speed– Infected computers and clogged e-mail systems– Replicated itself explosively through Outlook e-mail– Caused other harm

• 2001 Code Red and Nimda: virus-worm combinations– Multivector virus: entered computer system in

several different ways (vectors)• 2002 and 2003: new virus-worm combinations

– Example: Bugbear

Page 37: E-Business Ninth Edition Chapter 8 Online Security

37

Viruses, Worms, and Antivirus Software (cont’d.)

• Antivirus software– Detects viruses and worms– Either deletes or isolates them on client computer

• 2005 and 2006 Zotob– New breed of Trojan horse-worm combination

• 2007: Storm virus

• 2008 and continuing into 2009: Conflicker

• 2009 and 2010: URLzone and Clampi– New viruses designed specifically to hijack users’

online banking sessions

Page 38: E-Business Ninth Edition Chapter 8 Online Security

Viruses, Worms, and Antivirus Software (cont’d.)

• 2010: new Trojan horse-worm combination attack– Spread through a computer operating system– Designed to target industrial equipment

• German industrial giant Siemens’ control systems

• 2011: Zeus and SpyEye combined – Targeted bank account information– Not visible in Microsoft Windows Task Manager– Intercept credit card or online banking data entered in

Web browser

38

Page 39: E-Business Ninth Edition Chapter 8 Online Security

39

FIGURE 10-6 Major viruses, worms, and Trojan horses

Page 40: E-Business Ninth Edition Chapter 8 Online Security

4040FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)

Page 41: E-Business Ninth Edition Chapter 8 Online Security

41

FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)

Page 42: E-Business Ninth Edition Chapter 8 Online Security

42

FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)

Page 43: E-Business Ninth Edition Chapter 8 Online Security

43

FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)

Page 44: E-Business Ninth Edition Chapter 8 Online Security

44

FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)

Page 45: E-Business Ninth Edition Chapter 8 Online Security

Viruses, Worms, and Antivirus Software (cont’d.)

• Companies that track viruses, sell antivirus software, provide virus descriptions on Web sites– Symantec (Symantec Security Response) – McAfee (McAfee Virus Information)

• Data files must be updated regularly– Recognize and eliminate newest viruses

• Some Web e-mail systems:– Provide and update antivirus software

• Used to scan attachments before downloading

– Example: Yahoo! Mail

45

Page 46: E-Business Ninth Edition Chapter 8 Online Security

46

Digital Certificates

• Digital certificate (digital ID)– E-mail message attachment or program embedded in

Web page– Verifies sender or Web site– Contains a means to send encrypted message– Signed message or code

• Provides proof of holder identified by the certificate

– Used for online transactions• Electronic commerce, electronic mail, and electronic

funds transfers

Page 47: E-Business Ninth Edition Chapter 8 Online Security

47

FIGURE 10-7 Delmar Cengage Learning’s digital certificate information displayed in Firefox browser

© C

enga

ge L

earn

ing

2013

Page 48: E-Business Ninth Edition Chapter 8 Online Security

48

Digital Certificates (cont’d.)

• Digital certificate for software:– Assurance software was created by specific company– Does not attest to quality of software

• Certification authority (CA)– Issues digital certificates to organizations, individuals

• Digital certificates cannot be forged easily

• Six main elements: owner’s identifying information, owner’s public key, dates certificate is valid, serial number, issuer name, issuer digital signature

Page 49: E-Business Ninth Edition Chapter 8 Online Security

49

Digital Certificates (cont’d.)

• Key – Number: usually long binary number

• Used with encryption algorithm

• “Lock” message characters being protected

– Longer keys provide better protection

• Identification requirements vary– Driver’s license, notarized form, fingerprints

• Companies offering CA services– Thawte, VeriSign, Comodo, DigiCert, Entrust,

GeoTrust, RapidSSL.com

Page 50: E-Business Ninth Edition Chapter 8 Online Security

50

Digital Certificates (cont’d.)

• Secure Sockets Layer-Extended Validation (SSL-EV) digital certificate– Issued after more extensive verification confirmed

• Annual fees– $200 to more than $1500

• Digital certificates expire after period of time– Provides protection (users and businesses)– Must submit credentials for reevaluation periodically

Page 51: E-Business Ninth Edition Chapter 8 Online Security

51

FIGURE 10-8 Internet Explorer address window display for an SSL-EV Web site

51

Page 52: E-Business Ninth Edition Chapter 8 Online Security

52

Steganography

• Steganography– Hiding information within another piece of information

• Can be used for malicious purposes

• Hiding encrypted file within another file – Casual observer cannot detect anything of importance

in container file – Two-step process

• Encrypting file protects it from being read

• Steganography makes it invisible

• Al Qaeda used steganography to hide attack orders

Page 53: E-Business Ninth Edition Chapter 8 Online Security

53

Physical Security for Clients

• Client computers– Control important business functions– Same physical security as early systems

• New physical security technologies– Fingerprint readers (less than $100)

• Stronger protection than password approaches

• Biometric security device– Identification using element of person’s biological

makeup• Writing pads, eye scanners, palm reading scanners,

reading back of hand vein pattern

Page 54: E-Business Ninth Edition Chapter 8 Online Security

Client Security for Mobile Devices

• Security measures– Access password

– Remote wipe: clears all personal data• Can be added as an app• Capability through corporate e-mail synchronization

– Antivirus software

• Rogue apps: contain malware or collect information and forward to perpetrators– Apple App Store tests apps before authorizing sales

– Android Market does less extensive testing

– Users should not rush to install latest app

54

Page 55: E-Business Ninth Edition Chapter 8 Online Security

55

Communication Channel Security

• Internet– Not designed to be secure– Designed to provide redundancy

• Remains unchanged from original insecure state– Message traveling on the Internet

• Subject to secrecy, integrity, and necessity threats

Page 56: E-Business Ninth Edition Chapter 8 Online Security

56

Secrecy Threats

• Secrecy– Prevention of unauthorized information disclosure– Technical issue

• Requiring sophisticated physical and logical mechanisms

• Privacy– Protection of individual rights to nondisclosure– Legal matter

Page 57: E-Business Ninth Edition Chapter 8 Online Security

Secrecy Threats (cont’d.)

• E-mail message– Secrecy violations protected using encryption

• Protects outgoing messages

– Privacy issues address whether supervisors are permitted to read employees’ messages randomly

• Electronic commerce threat– Sensitive or personal information theft– Sniffer programs

• Record information passing through computer or router

57

Page 58: E-Business Ninth Edition Chapter 8 Online Security

58

Secrecy Threats (cont’d.)

• Electronic commerce threat (cont’d.)– Backdoor: electronic holes

• Left open accidentally or intentionally

• Content exposed to secrecy threats

• Example: Cart32 shopping cart program backdoor

– Stolen corporate information• Eavesdropper example

• Web users continually reveal information– Secrecy breach– Possible solution: anonymous Web surfing

Page 59: E-Business Ninth Edition Chapter 8 Online Security

59

Integrity Threats

• Also known as active wiretapping– Unauthorized party alters message information

stream

• Integrity violation example– Cybervandalism

• Electronic defacing of Web site

• Masquerading (spoofing)– Pretending to be someone else– Fake Web site representing itself as original

Page 60: E-Business Ninth Edition Chapter 8 Online Security

60

Integrity Threats (cont’d.)

• Domain name servers (DNSs) – Internet computers maintaining directories

• Linking domain names to IP addresses

– Perpetrators use software security hole • Substitute their Web site address in place of real one

• Spoofs Web site visitors

• Phishing expeditions– Capture confidential customer information– Common victims

• Online banking, payment system users

Page 61: E-Business Ninth Edition Chapter 8 Online Security

61

Necessity Threats

• Also known as delay, denial, denial-of-service (DoS) attack– Disrupt or deny normal computer processing– Intolerably slow-speed computer processing

• Renders service unusable or unattractive

• Distributed denial-of-service (DDoS) attack– Launch simultaneous attack on a Web site via botnets

• DoS attacks– Remove information altogether– Delete transmission or file information

Page 62: E-Business Ninth Edition Chapter 8 Online Security

62

Necessity Threats (cont’d.)

• Denial attack examples:– Quicken accounting program diverted money to

perpetrator’s bank account– High-profile electronic commerce company received

flood of data packets• Overwhelmed sites’ servers

• Choked off legitimate customers’ access

Page 63: E-Business Ninth Edition Chapter 8 Online Security

63

Threats to the Physical Security of Internet Communications Channels

• Internet’s packet-based network design:– Precludes it from being shut down

• By attack on single communications link

• Individual user’s Internet service can be interrupted – Destruction of user’s Internet link

• Larger companies, organizations– Use more than one link to main Internet backbone

Page 64: E-Business Ninth Edition Chapter 8 Online Security

64

Threats to Wireless Networks

• Wireless Encryption Protocol (WEP)– Rule set for encrypting transmissions from the

wireless devices to the wireless access points (WAPs)

• Wardrivers – Attackers drive around in cars– Search for accessible networks

• Warchalking– Place chalk mark on building

• Identifies easily entered wireless network nearby

– Web sites include wireless access locations maps

Page 65: E-Business Ninth Edition Chapter 8 Online Security

65

Threats to Wireless Networks (cont’d.)

• Preventing attacks by wardrivers– Turn on WEP– Change default login and password settings

• Example– Best Buy wireless point-of-sale (POS)

• Failed to enable WEP

• Customer launched sniffer program

• Intercepted data from POS terminals

Page 66: E-Business Ninth Edition Chapter 8 Online Security

66

Encryption Solutions

• Encryption: coding information using mathematically based program, secret key

• Cryptography: science studying encryption– Science of creating messages only sender and

receiver can read

• Steganography– Makes text undetectable to naked eye

• Cryptography converts text to other visible text – With no apparent meaning

Page 67: E-Business Ninth Edition Chapter 8 Online Security

Encryption Solutions (cont’d.)

• Encryption algorithms– Encryption program

• Transforms normal text (plain text) into cipher text (unintelligible characters string)

– Encryption algorithm• Logic behind encryption program

• Includes mathematics to do transformation

– Decryption program• Encryption-reversing procedure: message is decoded

or decrypted

67

Page 68: E-Business Ninth Edition Chapter 8 Online Security

68

Encryption Solutions (cont’d.)

• Encryption algorithms (cont’d.)– National Security Agency controls dissemination– U.S. government banned publication of details

• Illegal for U.S. companies to export

– Encryption algorithm property• May know algorithm details

• Unable to decipher encrypted message without knowing key encrypting the message

– Key type subdivides encryption into three functions• Hash coding, asymmetric encryption, symmetric

encryption

Page 69: E-Business Ninth Edition Chapter 8 Online Security

69

Encryption Solutions (cont’d.)

• Hash coding– Process uses Hash algorithm – Calculates number (hash value) from any length

message– Unique message fingerprint– Good hash algorithm design

• Probability of collision is extremely small (two different messages resulting in same hash value)

– Determining message alteration during transit • Mismatch between original hash value and receiver

computed value

Page 70: E-Business Ninth Edition Chapter 8 Online Security

70

Encryption Solutions (cont’d.)

• Asymmetric encryption (public-key encryption)– Encodes messages using two mathematically related

numeric keys– Public key: one key freely distributed to public

• Encrypt messages using encryption algorithm

– Private key: second key belongs to key owner• Kept secret

• Decrypt all messages received

Page 71: E-Business Ninth Edition Chapter 8 Online Security

71

Encryption Solutions (cont’d.)

– Pretty Good Privacy (PGP)– Software tools using different encryption algorithms

• Perform public key encryption

– Individuals download free versions • PGP Corporation site, PGP International site

• Encrypt e-mail messages

– Sells business site licenses

Page 72: E-Business Ninth Edition Chapter 8 Online Security

72

Encryption Solutions (cont’d.)

• Symmetric encryption (private-key encryption)– Encodes message with one of several available

algorithms• Single numeric key to encode and decode data

– Message receiver must know the key– Very fast and efficient encoding and decoding– Key must be guarded

Page 73: E-Business Ninth Edition Chapter 8 Online Security

73

Encryption Solutions (cont’d.)

– Problems• Difficult to distribute new keys to authorized parties

while maintaining security, control over keys

• Private keys do not work well in large environments

– Data Encryption Standard (DES)• Encryption algorithms adopted by U.S. government

• Most widely used private-key encryption system

• Fast computers break messages encoded with smaller keys

Page 74: E-Business Ninth Edition Chapter 8 Online Security

74

Encryption Solutions (cont’d.)

– Triple Data Encryption Standard (Triple DES, 3DES)

• Stronger version of Data Encryption Standard

– Advanced Encryption Standard (AES)• Alternative encryption standard

• Most government agencies use today

– Longer bit lengths increase difficulty of cracking keys

Page 75: E-Business Ninth Edition Chapter 8 Online Security

75

Encryption Solutions (cont’d.)

• Comparing asymmetric and symmetric encryption systems– Advantages of public-key (asymmetric) systems

• Small combination of keys required• No problem in key distribution• Implementation of digital signatures possible

– Disadvantages of public-key systems • Significantly slower than private-key systems

– Public-key systems: complement rather than replace private-key systems

Page 76: E-Business Ninth Edition Chapter 8 Online Security

76

FIGURE 10-9 Comparison of (a) hash coding, (b) private-key,

and (c) public-key encryption

© C

enga

ge L

earn

ing

2013

Page 77: E-Business Ninth Edition Chapter 8 Online Security

77

Encryption Solutions (cont’d.)

– Web servers accommodate encryption algorithms• Must communicate with variety of Web browsers

– Secure Sockets Layer (SSL)• Goal: secures connections between two computers

– Secure Hypertext Transfer Protocol (S-HTTP)• Goal: send individual messages securely

Page 78: E-Business Ninth Edition Chapter 8 Online Security

78

Encryption Solutions (cont’d.)

• Secure sockets layer (SSL) protocol– Provides security “handshake”– Client and server exchange brief burst of messages– All communication encoded

• Eavesdropper receives unintelligible information

– Secures many different communication types• HTTP, FTP, Telnet

– HTTPS: protocol implementing SSL• Precede URL with protocol name HTTPS

Page 79: E-Business Ninth Edition Chapter 8 Online Security

Encryption Solutions (cont’d.)

– Encrypted transaction generates private session key• Bit lengths vary (40-bit, 56-bit, 128-bit, 168-bit)

– Session key• Used by encryption algorithm

• Creates cipher text from plain text during single secure session

– Secrecy implemented using public-key and private-key encryption

• Private-key encryption for nearly all communications

79

Page 80: E-Business Ninth Edition Chapter 8 Online Security

80

FIGURE 10-10 Establishing an SSL session

© C

enga

ge L

earn

ing

2013

Page 81: E-Business Ninth Edition Chapter 8 Online Security

Encryption Solutions (cont’d.)

– After secure session established:• Public-key encryption no longer used

• Message transmission protected by private-key encryption

• Session key (private key) discarded when session ends

– Each new connection between client and secure server requires entire process:

• Beginning with handshake

81

Page 82: E-Business Ninth Edition Chapter 8 Online Security

82

Encryption Solutions (cont’d.)

• Secure HTTP (S-HTTP)– Extension to HTTP providing security features

• Client and server authentication, spontaneous encryption, request/response nonrepudiation

– Symmetric encryption for secret communications– Public-key encryption to establish client/server

authentication– Session negotiation: process between client and

server of proposing and accepting (or rejecting) various transmission conditions

Page 83: E-Business Ninth Edition Chapter 8 Online Security

83

Encryption Solutions (cont’d.)

– Establishing secure session• SSL carries out client-server handshake exchange to

set up secure communication

• S-HTTP sets up security details with special packet headers exchanged in S-HTTP

– Headers define security technique type– Header exchanges state:

• Which specific algorithms that each side supports

• Whether client or server (or both) supports algorithm

• Whether security technique required, optional, refused

Page 84: E-Business Ninth Edition Chapter 8 Online Security

84

Encryption Solutions (cont’d.)

– Secure envelope (complete package)• Encapsulates message

• Provides secrecy, integrity, and client/server authentication

• SSL has become:– More generally accepted standard over S-HTTP

Page 85: E-Business Ninth Edition Chapter 8 Online Security

85

Using a Hash Function to Create a Message Digest

• Integrity violation– Message altered while in transit

• Difficult and expensive to prevent

• Security techniques to detect

• Harm: unauthorized message changes undetected

• Apply two algorithms to eliminate fraud and abuse– Hash algorithm– Message digest

• Number summarizing encrypted information

Page 86: E-Business Ninth Edition Chapter 8 Online Security

86

Converting a Message Digest into a Digital Signature

• Hash functions: potential for fraud– Solution: sender encrypts message digest using

private key• Digital signature

– Encrypted message digest (message hash value)• Digital signature provides:

– Integrity, nonrepudiation, and authentication• Provide transaction secrecy

– Encrypt entire string (digital signature, message)• Digital signatures: same legal status as traditional

signatures

Page 87: E-Business Ninth Edition Chapter 8 Online Security

87

FIGURE 10-11 Sending and receiving a digitally signed message

© C

enga

ge L

earn

ing

2013

Page 88: E-Business Ninth Edition Chapter 8 Online Security

88

Security for Server Computers

• Server vulnerabilities– Exploited by anyone determined to cause destruction

or acquire information illegally

• Entry points– Web server and its software– Any back-end programs containing data

• No system is completely safe

• Web server administrator– Ensures security policies documented; considered in

every electronic commerce operation

Page 89: E-Business Ninth Edition Chapter 8 Online Security

89

Web Server Threats

• Compromise of secrecy– By allowing automatic directory listings– Solution: turn off folder name display feature

• Sensitive file on Web server – Holds Web server username-password pairs– Solution: store authentication information in encrypted

form

Page 90: E-Business Ninth Edition Chapter 8 Online Security

90

Web Server Threats (cont’d.)

• Passwords that users select– Easily guessable

• Dictionary attack programs cycle through electronic dictionary, trying every word as password

– Solutions• User password requirements

• Use password assignment software to check user password against dictionary

• Help creating very strong passwords:– Gibson Research Corporation’s Ultra High Security

Password Generator

Page 91: E-Business Ninth Edition Chapter 8 Online Security

91

© C

enga

ge L

earn

ing

2013

FIGURE 10-12 Examples of passwords, from very weak to very strong

Page 92: E-Business Ninth Edition Chapter 8 Online Security

92

Database Threats

• Usernames and passwords– Stored in unencrypted table– Database fails to enforce security altogether

• Relies on Web server to enforce security

• Unauthorized users– Masquerade as legitimate database users

• Trojan horse programs hide within database system– Reveal information– Remove all access controls within database

Page 93: E-Business Ninth Edition Chapter 8 Online Security

93

Other Programming Threats

• Java or C++ programs executed by server– Passed to Web servers by client– Reside on server– Use a buffer

• Memory area set aside holding data read from file or database

– Buffer overrun (buffer overflow) error• Programs filling buffers malfunction and overfill buffer• Excess data spilled outside designated buffer memory• Cause: error in program or intentional• 1998 Internet worm

Page 94: E-Business Ninth Edition Chapter 8 Online Security

94

Other Programming Threats (cont’d.)

• Insidious version of buffer overflow attack– Writes instructions into critical memory locations– Web server resumes execution by loading internal

registers with address of attacking program’s code

• Reducing potential buffer overflow damage– Good programming practices– Some hardware functionality

• Mail bomb attack– Hundreds (thousands) send message to particular

address

Page 95: E-Business Ninth Edition Chapter 8 Online Security

95

Threats to the Physical Security of Web Servers

• Protecting Web servers– Put computers in commerce service provider (CSP)

facility• Very high-level physical security on CSP

– Maintain server content’s backup copies at remote location

– Rely on service providers• Offer managed services including Web server security

– Hire smaller, specialized security service providers

Page 96: E-Business Ninth Edition Chapter 8 Online Security

Access Control and Authentication

• Controlling who and what has access to Web server• Authentication

– Identity verification of entity requesting computer access

• Server user authentication– Server must successfully decrypt user’s digital

signature-contained certificate

– Server checks certificate timestamp

– Server uses callback system

• Certificates authenticate client computers and their users

96

Page 97: E-Business Ninth Edition Chapter 8 Online Security

Access Control and Authentication (cont’d.)

• Usernames and passwords– Provide some protection element

• Maintain usernames in plain text – Encrypt passwords with one-way encryption algorithm

• Problem– Site visitor may save username and password as a

cookie• Might be stored in plain text

• Access control list (ACL)– Restrict file access to selected users

97

Page 98: E-Business Ninth Edition Chapter 8 Online Security

98

Firewalls

• Firewall– Software, hardware-software combination– Installed in a network to control packet traffic

• Placed at Internet entry point of network– Defense between network and the Internet

• Between network and any other network

• Principles– All traffic must pass through it– Only authorized traffic allowed to pass – Immune to penetration

Page 99: E-Business Ninth Edition Chapter 8 Online Security

99

Firewalls (cont’d.)

• Trusted: networks inside firewall

• Untrusted: networks outside firewall

• Filter permits selected messages though network

• Separate corporate networks from one another– Coarse need-to-know filter

• Firewalls segment corporate network into secure zones

• Large organizations with multiple sites – Install firewall at each location

• All locations follow same security policy

Page 100: E-Business Ninth Edition Chapter 8 Online Security

100

Firewalls (cont’d.)

• Should be stripped of unnecessary software• Packet-filter firewalls

– Examine all data flowing back and forth between trusted network (within firewall) and the Internet

• Gateway servers– Filter traffic based on requested application– Limit access to specific applications

• Telnet, FTP, HTTP

• Proxy server firewalls– Communicate with the Internet on private network’s

behalf

Page 101: E-Business Ninth Edition Chapter 8 Online Security

101

Firewalls (cont’d.)• Perimeter expansion problem

– Computers outside traditional physical site boundary• Servers under almost constant attack

– Install intrusion detection systems• Monitor server login attempts• Analyze for patterns indicating cracker attack• Block further attempts originating from same IP address

• Cloud computing: firewall products lagging behind• Personal firewalls

– Software-only firewalls on individual client computers– Gibson Research Shields Up! Web site

Page 102: E-Business Ninth Edition Chapter 8 Online Security

Organizations that Promote Computer Security

• Following the Internet Worm of 1988– Organizations formed to share information

• About threats to computer systems

• Principle followed– Sharing information about attacks and defenses for

attacks• Helps everyone create better computer security

102102

Page 103: E-Business Ninth Edition Chapter 8 Online Security

103

CERT

• Computer Emergency Response Team

• Housed at Carnegie Mellon University– Software Engineering Institute

• Maintains effective, quick communications infrastructure among security experts– Security incidents avoided, handled quickly

• Provides security risk information

• Posts security event alerts

• Primary authoritative source for viruses, worms, and other types of attack information

Page 104: E-Business Ninth Edition Chapter 8 Online Security

Other Organizations

• 1989: System Administrator, Audit, Network and Security (SANS) Institute– Education and research efforts

• Research reports, security alerts, and white papers

– SANS Internet Storm Center Web site• Current information on location, intensity of computer

attacks worldwide

• CERIAS (Center for Education and Research in Information Assurance and Security)– Multidisciplinary information security research and

education104

Page 105: E-Business Ninth Edition Chapter 8 Online Security

105

Other Organizations (cont’d.)

• Center for Internet Security– Not-for-profit cooperative organization– Helps electronic commerce companies

• CSO Online– Articles from CSO Magazine – Computer security-related news items

• Infosecurity.com– Articles about all types of online security issues

Page 106: E-Business Ninth Edition Chapter 8 Online Security

106

Computer Forensics and Ethical Hacking

• Computer forensics experts (ethical hackers)– Computer sleuths hired to probe PCs– Locate information usable in legal proceedings– Job of breaking into client computers

• Computer forensics field– Responsible for collection, preservation, and

computer-related evidence analysis

• Companies hire ethical hackers to test computer security safeguards

Page 107: E-Business Ninth Edition Chapter 8 Online Security

Summary

• Physical and logical computer security important in electronic commerce– Security policy can identify risks and countermeasures

to reduce risks

• Key security provisions– Secrecy, integrity, available service

• Client threats and solutions– Virus threats, active content threats, cookies

• Communication channels’ threats and solutions– Encryption provides secrecy

107

Page 108: E-Business Ninth Edition Chapter 8 Online Security

Summary (cont’d.)

• Web Server threats and solutions– Threats from programs, backdoors

• Security organizations– Share information about threats, defenses

• Computer forensics– “Break into” computers searching for legal use data– Assist in identifying security weaknesses

108