Title: Adapted from Ecommerce, Laudon and Traver
1CHAPTER 5
Security and Encryption
Adapted from Ecommerce, Laudon and Traver
2Learning Objectives
- Understand the scope of e-commerce crime and
security problems - Describe the key dimensions of e-commerce
security - Understand the tension between security and other
values - Identify the key security threats in the
e-commerce environment
3Learning Objectives
- Describe how various forms of encryption
technology help protect the security of messages
sent over the Internet - Identify the tools used to establish secure
Internet communications channels - Identify the tools used to protect networks,
servers, and clients - Appreciate the importance of policies,
procedures, and laws in creating security
4The E-commerce Security Environment
- Recent survey of 538 security practitioners in
U.S. corporations and government agencies
reported - 85 detected breaches of computer security within
the last 12 months - 64 acknowledged financial loss as a result
- 35 quantified their financial loss to total 337
million in aggregate
5The E-commerce Security Environment
- Most serious losses involved theft of proprietary
information or financial fraud - 40 reported attacks from outside the
organization - 38 experienced denial of service attacks
- 94 detected virus attacks
6The E-commerce Security Environment
7Dimensions of E-commerce Security
- Integrity
- Nonrepudiation
- Authenticity
- Confidentiality
- Privacy
- Availability
8Dimensions of E-commerce Security
9The Tension Between Security and Other Values
- Ease of use
- Public Safety and the Criminal Uses of Security
10Security Threats in the E-commerce Environment
- Three key points of vulnerability
- the client
- the server
- communications pipeline
11A Typical E-commerce Transaction
12Vulnerable Points in an E-commerce Environment
13Seven Security Threats to E-commerce Sites
- Malicious code
- Hacking and Cybervandelism
- Credit card fraud
- Spoofing
- Denial of Service Attacks
- Sniffing
- Insider Jobs
14Examples of Malicious Code
15Tools Available to Achieve Site Security
16Encryption
- The process of transforming plain text or data
into cipher text that cannot be read by anyone
outside of the sender and the receiver. The
purpose of encryption is (a) to secure stored
information and (b) to secure information
transmission. - Cipher text is text that has been encrypted and
thus cannot be read by anyone besides the sender
and the receiver
17Public Key Cryptography - A Simple Case
18Public Key Cryptography with Digital Signatures
19Public Key Cryptography Creating a Digital
Envelope
20Digital Certificates and Public Key Infrastructure
21Encryption
- Public Key Infrastructure (PKI) are certification
authorities and digital certificate procedures
that are accepted by all parties - Pretty Good Privacy (PGP) is a widely used email
public key encryption software program
22Securing Channels of Communications
- Secure Sockets Layer (SSL) is the most common
form of securing channels - Secure negotiated session is a client-server
session in which the URL of the requested
document, along with the contents, the contents
of forms, and the cookies exchanged, are
encrypted. - Session key is a unique symmetric encryption key
chosen for a single secure session
23Secure Negotiated Sessions Using SSL
24Protecting Networks
- Firewalls are software applications that act as a
filter between a companys private network and
the Internet itself - Proxy server is a software server that handles
all communications originating from or being sent
to the Internet, acting as a spokesperson or
bodyguard for the organization
25Firewalls and Proxy Servers
26Protecting Servers and Clients
- Operating system controls allow for the
authentication of the user and access controls to
files, directories, and network paths - Anti-virus software is the easiest and least
expensive way to prevent threats to system
integrity
27Policies, Procedures, and Laws
- Developing an e-commerce security plan
- perform a risk assessment
- develop a security policy
- develop an implementation plan
- create a security organization
- perform a security audit
28E-commerce Security Legislation
29Government Efforts to Regulate and Control
Encryption