Uploaded by Dr. Anisur Rehman

Online Security & E-Payment Systems: EMEA E-Business

advertisement
E-Business
EMEA 1e
Europe, Middle East, Africa First Edition
Chapter 12
Online Security and E-Payment
Systems
Learning Objectives
In this chapter, you will learn:
• What security risks arise in online business and how to manage them
• How to create a security policy & implement on Web client computers
• How to implement security in the communication channels between
computers and on web server computers
• What organizations promote computer, network, and Internet security
• The basic functions of online payment systems & how payment cards
are used in electronic commerce
• About the history and future of electronic cash
• How digital wallets work
• Stored-value cards and how they are used in electronic commerce
• How the banking industry uses Internet technologies
E-Business, Europe, Middle East, Africa First Edition
2
Online Security Issues
Overview
• Early Internet days
– Most popular use: electronic mail
• Today’s higher stakes
– Electronic mail, shopping, all types of financial
transactions
• Common worry of Web shoppers
– Stolen credit card as it transmits over the Internet
– More likely to be stolen from computer where stored
• Chapter topic: security in the context of electronic
commerce
E-Business, Europe, Middle East, Africa First Edition
Origins of Security on Interconnected
Computer Systems
• Data security measures taken by Roman Empire
– Coded information to prevent enemies from reading
secret war and defense plans
• Modern electronic security techniques
– Defense Department wartime use
• “Orange Book”: rules for mandatory access control
• Business computers
– Initially adopted military’s security methods
• Today’s computing
– Requires comprehensive computer security plans
E-Business, Europe, Middle East, Africa First Edition
4
Computer Security and Risk Management
• Computer security
Asset protection from unauthorized access, use, alteration, and
destruction
• Physical security
Includes tangible protection devices like alarms, guards, fireproof
doors, security fences, safes or vaults, and bombproof buildings
• Logical security
Asset protection using nonphysical means
• Threat:
Any act or object posing danger to computer assets
• Countermeasure:
– Procedure (physical or logical)
• Recognizes, reduces, and eliminates threat
– Extent and expense of countermeasures
• Vary depending on asset importance
E-Business, Europe, Middle East, Africa First Edition
Computer Security and Risk
Management (cont’d.)
• Risk management model
– Four general organizational actions
• Impact (cost) and probability of physical threat
– Also applicable for protecting Internet and electronic commerce assets
from physical and electronic threats
• Electronic threat examples:
– Impostors, eavesdroppers, thieves
• Eavesdropper (person or device)
– Listen in on and copy Internet transmissions
E-Business, Europe, Middle East, Africa First
6
© Cengage Learning 2013
Risk management model
E-Business, Europe, Middle East, Africa First Edition
Computer Security and Risk
Management (cont’d.)
• Crackers or hackers (people)
– Write programs; manipulate technologies
• Obtain unauthorized access to computers and networks
• White hat hacker and black hat hacker
– Distinction between good hackers and bad hackers
• Good security scheme implementation
– Identify risks
– Determine how to protect threatened assets
– Calculate costs to protect assets
E-Business, Europe, Middle East, Africa First Edition
Elements of Computer Security
• Secrecy
– Protecting against unauthorized data disclosure
– Ensuring data source authenticity
• Integrity
– Preventing unauthorized data modification
– Man-in-the-middle exploit
• E-mail message intercepted; contents changed before
forwarded to original destination
• Necessity
– Preventing data delays or denials (removal)
– Delaying message or completely destroying it
E-Business, Europe, Middle East, Africa First Edition
Establishing a Security Policy
• Security policy
– Assets to protect and why, protection responsibility, acceptable
and unacceptable behaviors
– Physical security, network security, access authorizations, virus
protection, disaster recovery
• Military policy:
Stresses separation of multiple levels of security
• Corporate information classifications
– Public
– Company confidential
E-Business, Europe, Middle East, Africa First Edition
Establishing a Security Policy (cont’d.)
• Steps to create security policy
– Determine assets to protect from threats
– Determine access to various system parts
– Identify resources to protect assets
– Develop written security policy
– Commit resources
• Comprehensive security plan goals
– Protect privacy, integrity, availability; authentication
– Selected to satisfy requirements of following diagram
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Requirements for secure electronic commerce
E-Business, Europe, Middle East, Africa First Edition
Establishing a Security Policy (cont’d.)
• Security policies information sources
– WindowSecurity.com site
– Information Security Policy World site
• Absolute security: difficult to achieve
– Create barriers deterring intentional violators
– Reduce impact of natural disasters and terrorist acts
• Integrated security
– Having all security measures work together
• Prevents unauthorized disclosure, destruction, modification of assets
• Security policy points
– Authentication: Who is trying to access site?
– Access control: Who is allowed to log on to and access site?
– Secrecy: Who is permitted to view selected information?
– Data integrity: Who is allowed to change data?
– Audit: Who or what causes specific events to occur, and when?
E-Business, Europe, Middle East, Africa First Edition
Security for Client Computers
• Client computers
– Must be protected from threats
• Threats
– Originate in software and downloaded data
– Malevolent server site masquerades as legitimate
Web site
• Chapter topics organized to follow the
transaction-processing flow
– Beginning with consumer
– Ending with Web server at electronic commerce site
E-Business, Europe, Middle East, Africa First Edition
Cookies and Web Bugs
•
Internet connection between Web clients and servers
Stateless connection
• Each information transmission is independent
• No continuous connection (open session) maintained between any
client and server
•
Cookies
– Small text files Web servers place on Web client
– Identify returning visitors
– Allow continuing open session
•
Time duration cookie categories
– Session cookies: exist until client connection ends
– Persistent cookies: remain indefinitely
– Electronic commerce sites use both
•
Cookie sources
– First-party cookies
• Web server site places them on client computer
– Third-party cookies
• Different Web site places them on client computer
E-Business, Europe, Middle East, Africa First Edition
Cookies and Web Bugs (cont’d.)
• Disable cookies entirely
– Complete cookie protection
– Problem
• Useful cookies blocked (along with others)
• Full site resources not available
• Web browser cookie management functions
– Refuse only third-party cookies
– Review each cookie before accepted
– Provided by most Web browsers
E-Business, Europe, Middle East, Africa First Edition
Mozilla Firefox dialog box for managing stored cookies
E-Business, Europe, Middle East, Africa First Edition
Cookies and Web Bugs (cont’d.)
• Web bug
– Tiny graphic that third-party Web site places on
another site’s Web page
– Purpose
• Provide a way for a third-party site to place cookie on
visitor’s computer
• Internet advertising community:
– Calls Web bugs “clear GIFs” or “1-by-1 GIFs”
• Graphics created in GIF format
• Color value of “transparent,” small as 1 pixel by 1 pixel
E-Business, Europe, Middle East, Africa First Edition
Active Content
• Active content
– Programs embedded transparently in Web pages
– Cause action to occur
– E-commerce example
• Place items into shopping cart; compute tax and costs
• Advantages
– Extends HTML functionality
– Moves data processing chores to client computer
• Disadvantages
– Can damage client computer
E-Business, Europe, Middle East, Africa First Edition
Active Content (cont’d.)
• Cookies, Java applets, JavaScript, VBScript,
ActiveX controls, graphics, Web browser plug-ins,
e-mail attachments
• Scripting languages: provide executable script
– Examples: JavaScript and VBScript
• Applet: small application program
– Typically runs within Web browser
• Some browsers include tools limiting applets’ actions
• Active content modules
– Embedded in Web pages (invisible)
E-Business, Europe, Middle East, Africa First Edition
Advanced JavaScript settings in Mozilla Firefox
E-Business, Europe, Middle East, Africa First Edition
Active Content (cont’d.)
• Crackers: embed malicious active content
• Trojan horse
– Program hidden inside another program or Web
page
• Masking true purpose
– May result in secrecy and integrity violations
• Zombie (Trojan horse)
– Secretly takes over another computer
– Launches attacks on other computers
• Botnet (robotic network, zombie farm)
– All controlled computers act as an attacking unit
E-Business, Europe, Middle East, Africa First Edition
Java Applets
• Java programming language
– Developed by Sun Microsystems
– Widespread use in Web pages: active content
• Java: platform-independent programming language
– Provides Web page active content
– Server sends applets with client-requested pages
– Most cases: operation visible to visitor
– Possibility: functions not noticed by visitor
Advantages
– Adds functionality to business application’s functionality; relieves serverside programs
• Disadvantage
– Possible security violations (Trojan horse, zombie)
E-Business, Europe, Middle East, Africa First Edition
Java Applets (cont’d.)
• Java sandbox
– Confines Java applet actions to set of rules defined
by security model
– Rules apply to all untrusted Java applets
• Not established as secure
– Java applets running within sandbox constraint
• Does not allow full client system access
• Prevents secrecy (disclosure) and integrity (deletion or
modification) violations
E-Business, Europe, Middle East, Africa First Edition
JavaScript
• JavaScript
– Scripting language developed by Netscape
– Enables Web page designers to build active content
– Based loosely on Sun’s Java programming language
– Can be used for attacks
• Cannot commence execution on its own
• User must start ill-intentioned JavaScript program
E-Business, Europe, Middle East, Africa First Edition
ActiveX Controls
• ActiveX control
– Objects containing programs and properties Web
designers place on Web pages
• Component construction
– Many different programming languages
• Common: C++ and Visual Basic
• Run on Windows operating systems computers
• Executed on client computer like any other program
E-Business, Europe, Middle East, Africa First Edition
ActiveX Controls (cont’d.)
• Comprehensive ActiveX controls list
– ActiveX page at Download.com
• Security danger
– Execute like other client computer programs
– Have access to full system resources
• Cause secrecy, integrity, and necessity violations
– Actions cannot be halted once started
• Web browsers
– Provide notice of Active-X download or install
E-Business, Europe, Middle East, Africa First Edition
ActiveX control download warning dialog box in Internet Explorer
E-Business, Europe, Middle East, Africa First Edition
Graphics and Plug-Ins
• Graphics, browser plug-ins, and e-mail attachments
can harbor executable content
• Graphic: embedded code can harm client computer
• Browser plug-ins (programs)
– Enhance browser capabilities
– Popular plug-ins: Adobe Flash Player, Apple’s
QuickTime Player, Microsoft Silverlight,
RealNetworks’ RealPlayer
– Can pose security threats
• 1999 RealPlayer plug-in
• Plug-ins executing commands buried within media
E-Business, Europe, Middle East, Africa First Edition
Viruses, Worms, and Antivirus Software
• Programs display e-mail attachments by
automatically executing associated programs
– Macro viruses within attached files can cause damage
• Virus: software
– Attaches itself to another program
– Causes damage when host program activated
• Worm: virus
– Replicates itself on computers it infects
– Spreads quickly through the Internet
• Macro virus
– Small program (macro) embedded in file
E-Business, Europe, Middle East, Africa First Edition
Viruses, Worms, and Antivirus
Software (cont’d.)
• ILOVEYOU virus (“love bug”)
– Spread with amazing speed
– Infected computers and clogged e-mail systems
– Replicated itself explosively through Outlook e-mail
– Caused other harm
• 2001 Code Red and Nimda: virus-worm
combinations
– Multivector virus: entered computer system in
several different ways (vectors)
• 2002 and 2003: new virus-worm combinations
– Example: Bugbear
E-Business, Europe, Middle East, Africa First Edition
Viruses, Worms, and Antivirus
Software (cont’d.)
• Antivirus software
– Detects viruses and worms
– Either deletes or isolates them on client computer
• 2005 and 2006 Zotob
– New breed of Trojan horse-worm combination
• 2007: Storm virus
• 2008 and continuing into 2009: Conflicker
• 2009 and 2010: URLzone and Clampi
– New viruses designed specifically to hijack users’
online banking sessions
E-Business, Europe, Middle East, Africa First Edition
Viruses, Worms, and Antivirus
Software (cont’d.)
• 2010: new Trojan horse-worm combination attack
– Spread through a computer operating system
– Designed to target industrial equipment
• German industrial giant Siemens’ control systems
• 2011: Zeus and SpyEye combined
– Targeted bank account information
– Not visible in Microsoft Windows Task Manager
– Intercept credit card or online banking data entered
in Web browser
E-Business, Europe, Middle East, Africa First Edition
Major viruses, worms, and Trojan horses
E-Business, Europe, Middle East, Africa First Edition
Major viruses, worms, and Trojan horses (continued)
E-Business, Europe, Middle East, Africa First Edition
35
Major viruses, worms, and Trojan horses (continued)
E-Business, Europe, Middle East, Africa First Edition
Major viruses, worms, and Trojan horses (continued)
E-Business, Europe, Middle East, Africa First Edition
Major viruses, worms, and Trojan horses (continued)
E-Business, Europe, Middle East, Africa First Edition
Major viruses, worms, and Trojan horses (continued)
E-Business, Europe, Middle East, Africa First Edition
Viruses, Worms, and Antivirus
Software (cont’d.)
• Companies that track viruses, sell antivirus
software, provide virus descriptions on Web sites
– Symantec (Symantec Security Response)
– McAfee (McAfee Virus Information)
• Data files must be updated regularly
– Recognize and eliminate newest viruses
• Some Web e-mail systems:
– Provide and update antivirus software
• Used to scan attachments before downloading
– Example: Yahoo! Mail
E-Business, Europe, Middle East, Africa First Edition
Digital Certificates
• Digital certificate (digital ID)
– E-mail message attachment or program embedded
in Web page
– Verifies sender or Web site
– Contains a means to send encrypted message
– Signed message or code
• Provides proof of holder identified by the certificate
– Used for online transactions
• Electronic commerce, electronic mail, and electronic
funds transfers
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Delmar Cengage Learning’s digital certificate information displayed in
Firefox browser
E-Business, Europe, Middle East, Africa First Edition
Digital Certificates (cont’d.)
• Digital certificate for software:
– Assurance software was created by specific
company
– Does not attest to quality of software
• Certification authority (CA)
– Issues digital certificates to organizations, individuals
• Digital certificates cannot be forged easily
• Six main elements: owner’s identifying information,
owner’s public key, dates certificate is valid, serial
number, issuer name, issuer digital signature
E-Business, Europe, Middle East, Africa First Edition
Digital Certificates (cont’d.)
Key
Number (usually long binary number)
•
•
- Used with encryption algorithm
- “Lock” message characters being protected
Identification requirements vary from driver’s license, notarized form, fingerprints…
Companies offering CA services
– Thawte, VeriSign, Comodo, DigiCert, Entrust, GeoTrust, RapidSSL.com
Secure Sockets Layer-Extended Validation (SSL-EV)
digital certificate
Issued after more extensive verification confirmed:
•
•
Annual fees
– €200 to more than €1500
Digital certificates expire after period of time
– Provides protection (users and businesses), must submit credentials for
reevaluation periodically
E-Business, Europe, Middle East, Africa First Edition
Internet Explorer address window display for an SSL-EV Web site
E-Business, Europe, Middle East, Africa First Edition
45
Steganography
• Steganography
– Hiding information within another piece of information
• Can be used for malicious purposes
• Hiding encrypted file within another file
– Casual observer cannot detect anything of importance
in container file
– Two-step process
• Encrypting file protects it from being read
• Steganography makes it invisible
• Al Qaeda used steganography to hide attack orders
E-Business, Europe, Middle East, Africa First Edition
Physical Security for Clients
• Client computers
– Control important business functions
– Same physical security as early systems
• New physical security technologies
– Fingerprint readers (less than €100)
• Stronger protection than password approaches
• Biometric security device
– Identification using element of person’s biological
makeup
• Writing pads, eye scanners, palm reading scanners,
reading back of hand vein pattern
E-Business, Europe, Middle East, Africa First Edition
Client Security for Mobile Devices
• Security measures
– Access password
– Remote wipe: clears all personal data
• Can be added as an app
• Capability through corporate e-mail synchronization
– Antivirus software
• Rogue apps: contain malware or collect information
and forward to perpetrators
– Apple App Store tests apps before authorizing sales
– Android Market does less extensive testing
– Users should not rush to install latest app
E-Business, Europe, Middle East, Africa First Edition
Communication Channel Security
• Internet
– Not designed to be secure
– Designed to provide redundancy
• Remains unchanged from original insecure state
– Message traveling on the Internet
• Subject to secrecy, integrity, and necessity threats
• Secrecy Threats
– Prevention of unauthorized information disclosure
– Technical issue
• Requiring sophisticated physical and logical mechanisms
• Privacy
– Protection of individual rights to nondisclosure
– Legal matter
E-Business, Europe, Middle East, Africa First Edition
Secrecy Threats (cont’d.)
• E-mail message
– Secrecy violations protected using encryption protects outgoing messages
– Privacy issues address whether supervisors are permitted to read
employees’ messages randomly
• Electronic commerce threat
– Sensitive or personal information theft
– Sniffer programs record information passing through computer or router
• Electronic commerce threat (cont’d.)
– Backdoor: electronic holes
• Left open accidentally or intentionally
• Content exposed to secrecy threats
• Example: Cart32 shopping cart program backdoor
– Stolen corporate information (Eavesdropper example)
• Web users continually reveal information
– Secrecy breach
– Possible solution: anonymous Web surfing
E-Business, Europe, Middle East, Africa First Edition
Integrity Threats
• Also known as active wiretapping
– Unauthorized party alters message information
stream
• Integrity violation example
– Cybervandalism
• Electronic defacing of Web site
• Masquerading (spoofing)
– Pretending to be someone else
– Fake Web site representing itself as original
E-Business, Europe, Middle East, Africa First Edition
Integrity Threats (cont’d.)
• Domain name servers (DNSs)
– Internet computers maintaining directories
• Linking domain names to IP addresses
– Perpetrators use software security hole
• Substitute their Web site address in place of real one
• Spoofs Web site visitors
• Phishing expeditions
– Capture confidential customer information
– Common victims
• Online banking, payment system users
E-Business, Europe, Middle East, Africa First Edition
Necessity Threats
• Also known as delay, denial, denial-of-service
(DoS) attack
– Disrupt or deny normal computer processing
– Intolerably slow-speed computer processing
• Renders service unusable or unattractive
• Distributed denial-of-service (DDoS) attack
– Launch simultaneous attack on a Web site via
botnets
• DoS attacks
– Remove information altogether
– Delete transmission or file information
E-Business, Europe, Middle East, Africa First Edition
Necessity Threats (cont’d.)
• Denial attack examples:
– Quicken accounting program diverted money to
perpetrator’s bank account
– High-profile electronic commerce company received
flood of data packets
• Overwhelmed sites’ servers
• Choked off legitimate customers’ access
E-Business, Europe, Middle East, Africa First Edition
Threats to the Physical Security of
Internet Communications Channels
• Internet’s packet-based network design:
– Precludes it from being shut down
• By attack on single communications link
• Individual user’s Internet service can be interrupted
– Destruction of user’s Internet link
• Larger companies, organizations
– Use more than one link to main Internet backbone
E-Business, Europe, Middle East, Africa First Edition
Threats to Wireless Networks
• Wireless Encryption Protocol (WEP)
– Rule set for encrypting transmissions from the
wireless devices to the wireless access points (WAPs)
• Wardrivers
– Attackers drive around in cars
– Search for accessible networks
• Warchalking
– Place chalk mark on building
• Identifies easily entered wireless network nearby
– Web sites include wireless access locations maps
E-Business, Europe, Middle East, Africa First Edition
Threats to Wireless Networks (cont’d.)
• Preventing attacks by wardrivers
– Turn on WEP
– Change default login and password settings
• Example
– Best Buy wireless point-of-sale (POS)
• Failed to enable WEP
• Customer launched sniffer program
• Intercepted data from POS terminals
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions
• Encryption: coding information using
mathematically based program, secret key
• Cryptography: science studying encryption
– Science of creating messages only sender and
receiver can read
• Steganography
– Makes text undetectable to naked eye
• Cryptography converts text to other visible text
– With no apparent meaning
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
• Encryption algorithms
– Encryption program
• Transforms normal text (plain text) into cipher text
(unintelligible characters string)
– Encryption algorithm
• Logic behind encryption program
• Includes mathematics to do transformation
– Decryption program
• Encryption-reversing procedure: message is decoded
or decrypted
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
• Encryption algorithms (cont’d.)
– National Security Agency controls dissemination
– U.S. government banned publication of details
• Illegal for U.S. companies to export
– Encryption algorithm property
• May know algorithm details
• Unable to decipher encrypted message without
knowing key encrypting the message
– Key type subdivides encryption into three functions
• Hash coding, asymmetric encryption, symmetric
encryption
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
• Hash coding
– Process uses Hash algorithm
– Calculates number (hash value) from any length
message
– Unique message fingerprint
– Good hash algorithm design
• Probability of collision is extremely small (two
different messages resulting in same hash value)
– Determining message alteration during transit
• Mismatch between original hash value and receiver
computed value
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
• Asymmetric encryption (public-key encryption)
– Encodes messages using two mathematically related numeric
keys
Public key: one key freely distributed to public
• Encrypt messages using encryption algorithm
Private key: second key belongs to key owner
• Kept secret, decrypt all messages received
Pretty Good Privacy (PGP)
– Software tools using different encryption algorithms
• Perform public key encryption
– Individuals download free versions
• PGP Corporation site, PGP International site
• Encrypt e-mail messages
– Sells business site licenses
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
• Symmetric encryption (private-key encryption)
– Encodes message with one of several available algorithms
• Single numeric key to encode and decode data
– Message receiver must know the key
– Very fast and efficient encoding and decoding
– Key must be guarded
Problems: difficult to distribute new keys to authorized
parties while maintaining security, control over keys &
Private keys do not work well in large environments
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
Data Encryption Standard (DES)
• Encryption algorithms adopted by U.S. government
• Most widely used private-key encryption system
• Fast computers break messages encoded with
smaller keys
Data Encryption Standard (DES)
• Encryption algorithms adopted by U.S. government
• Most widely used private-key encryption system
• Fast computers break messages encoded with
smaller keys
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
– Triple Data Encryption Standard (Triple DES,
3DES)
• Stronger version of Data Encryption Standard
– Advanced Encryption Standard (AES)
• Alternative encryption standard
• Most government agencies use today
Longer bit lengths increase difficulty of cracking keys
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
• Comparing asymmetric and symmetric
encryption systems
Advantages of public-key (asymmetric) systems
• Small combination of keys required
• No problem in key distribution
• Implementation of digital signatures possible
Disadvantages of public-key systems
• Significantly slower than private-key systems
Public-key systems: complement rather than replace
private-key systems
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Comparison of
(a) hash coding, (b) private-key,
and (c) public-key encryption
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
Web servers accommodate encryption algorithms
Must communicate with variety of Web browsers
Secure Sockets Layer (SSL)
Goal: secures connections between two computers
Secure Hypertext Transfer Protocol (S-HTTP)
Goal: send individual messages securely
Secure sockets layer (SSL) protocol
– Provides security “handshake”
– Client and server exchange brief burst of messages
– All communication encoded - eavesdropper receives unintelligible
information
– Secures many different communication types (HTTP, FTP, Telnet)
– HTTPS: protocol implementing SSL
• Precede URL with protocol name HTTPS
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
– Encrypted transaction generates private session key
• Bit lengths vary (40-bit, 56-bit, 128-bit, 168-bit)
– Session key
• Used by encryption algorithm
• Creates cipher text from plain text during single
secure session
– Secrecy implemented using public-key and privatekey encryption
• Private-key encryption for nearly all communications
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Establishing an SSL session
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
After secure session established:
• Public-key encryption no longer used
• Message transmission protected by private-key encryption
• Session key (private key) discarded when session ends
Each new connection between client and secure server requires entire
process: Beginning with handshake
Secure HTTP (S-HTTP)
Extension to HTTP providing security features
• Client and server authentication, spontaneous encryption,
request/response nonrepudiation
– Symmetric encryption for secret communications
– Public-key encryption to establish client/server authentication
– Session negotiation: process between client and server of proposing and
accepting (or rejecting) various transmission conditions
E-Business, Europe, Middle East, Africa First Edition
Encryption Solutions (cont’d.)
•
– Establishing secure session
• SSL carries out client-server handshake exchange to set up secure
communication
• S-HTTP sets up security details with special packet headers exchanged in
S-HTTP
– Headers define security technique type
– Header exchanges state:
• Which specific algorithms that each side supports
• Whether client or server (or both) supports algorithm
• Whether security technique required, optional, refused
– Secure envelope (complete package)
• Encapsulates message
• Provides secrecy, integrity, and client/server authentication
SSL has become more generally accepted standard over S-HTTP
E-Business, Europe, Middle East, Africa First Edition
Using a Hash Function to Create a
Message Digest
• Integrity violation
– Message altered while in transit
• Difficult and expensive to prevent
• Security techniques to detect
• Harm: unauthorized message changes undetected
• Apply two algorithms to eliminate fraud and abuse
– Hash algorithm
– Message digest
• Number summarizing encrypted information
E-Business, Europe, Middle East, Africa First Edition
Converting a Message Digest into a
Digital Signature
• Hash functions: potential for fraud
– Solution: sender encrypts message digest using private key
• Digital signature
– Encrypted message digest (message hash value)
• Digital signature provides:
– Integrity, nonrepudiation, and authentication
• Provide transaction secrecy
– Encrypt entire string (digital signature, message)
• Digital signatures: same legal status as traditional
signatures
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Sending and receiving a digitally signed message
E-Business, Europe, Middle East, Africa First Edition
Security for Server Computers
• Server vulnerabilities
– Exploited by anyone determined to cause
destruction or acquire information illegally
• Entry points
– Web server and its software
– Any back-end programs containing data
• No system is completely safe
• Web server administrator
– Ensures security policies documented; considered in
every electronic commerce operation
E-Business, Europe, Middle East, Africa First Edition
Web Server Threats
• Compromise of secrecy
– By allowing automatic directory listings
– Solution: turn off folder name display feature
• Sensitive file on Web server
– Holds Web server username-password pairs
– Solution: store authentication information in
encrypted form
E-Business, Europe, Middle East, Africa First Edition
Web Server Threats (cont’d.)
• Passwords that users select
– Easily guessable
• Dictionary attack programs cycle through electronic
dictionary, trying every word as password
– Solutions
• User password requirements
• Use password assignment software to check user
password against dictionary
• Help creating very strong passwords:
– Gibson Research Corporation’s Ultra High Security
Password Generator
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Examples of passwords, from very weak to very strong
E-Business, Europe, Middle East, Africa First Edition
Database Threats
• Usernames and passwords
– Stored in unencrypted table
– Database fails to enforce security altogether
• Relies on Web server to enforce security
• Unauthorized users
– Masquerade as legitimate database users
• Trojan horse programs hide within database
system
– Reveal information
– Remove all access controls within database
E-Business, Europe, Middle East, Africa First Edition
Other Programming Threats
• Java or C++ programs executed by server
– Passed to Web servers by client
– Reside on server
– Use a buffer
• Memory area set aside holding data read from file or
database
– Buffer overrun (buffer overflow) error
• Programs filling buffers malfunction and overfill buffer
• Excess data spilled outside designated buffer memory
• Cause: error in program or intentional
• 1998 Internet worm
E-Business, Europe, Middle East, Africa First Edition
Other Programming Threats (cont’d.)
• Insidious version of buffer overflow attack
– Writes instructions into critical memory locations
– Web server resumes execution by loading internal
registers with address of attacking program’s code
• Reducing potential buffer overflow damage
– Good programming practices
– Some hardware functionality
• Mail bomb attack
– Hundreds (thousands) send message to particular
address
E-Business, Europe, Middle East, Africa First Edition
Threats to the Physical Security of
Web Servers
• Protecting Web servers
– Put computers in commerce service provider (CSP)
facility
• Very high-level physical security on CSP
– Maintain server content’s backup copies at remote
location
– Rely on service providers
• Offer managed services including Web server security
– Hire smaller, specialized security service providers
E-Business, Europe, Middle East, Africa First Edition
Access Control and Authentication
• Controlling who and what has access to Web server
• Authentication
– Identity verification of entity requesting computer access
• Server user authentication
– Server must successfully decrypt user’s digital signaturecontained certificate
– Server checks certificate timestamp
– Server uses callback system
• Certificates authenticate client computers and their users
E-Business, Europe, Middle East, Africa First Edition
Access Control and Authentication
(cont’d.)
• Usernames and passwords
– Provide some protection element
• Maintain usernames in plain text
– Encrypt passwords with one-way encryption algorithm
• Problem
– Site visitor may save username and password as a cookie
• Might be stored in plain text
• Access control list (ACL)
– Restrict file access to selected users
E-Business, Europe, Middle East, Africa First Edition
Firewalls
• Firewall
– Software, hardware-software combination
– Installed in a network to control packet traffic
• Placed at Internet entry point of network
– Defense between network and the Internet
• Between network and any other network
• Principles
– All traffic must pass through it
– Only authorized traffic allowed to pass
– Immune to penetration
E-Business, Europe, Middle East, Africa First Edition
Firewalls (cont’d.)
• Trusted: networks inside firewall
• Untrusted: networks outside firewall
• Filter permits selected messages though network
• Separate corporate networks from one another
– Coarse need-to-know filter
• Firewalls segment corporate network into secure
zones
• Large organizations with multiple sites
– Install firewall at each location
• All locations follow same security policy
E-Business, Europe, Middle East, Africa First Edition
Firewalls (cont’d.)
• Should be stripped of unnecessary software
• Packet-filter firewalls
– Examine all data flowing back and forth between
trusted network (within firewall) and the Internet
• Gateway servers
– Filter traffic based on requested application
– Limit access to specific applications
• Telnet, FTP, HTTP
• Proxy server firewalls
– Communicate with the Internet on private network’s
behalf
E-Business, Europe, Middle East, Africa First Edition
Firewalls (cont’d.)
• Perimeter expansion problem
– Computers outside traditional physical site boundary
• Servers under almost constant attack
– Install intrusion detection systems
• Monitor server login attempts
• Analyze for patterns indicating cracker attack
• Block further attempts originating from same IP
address
• Cloud computing: firewall products lagging behind
• Personal firewalls
– Software-only firewalls on individual client computers
– Gibson Research Shields Up! Web site
E-Business, Europe, Middle East, Africa First Edition
Organizations that Promote Computer
Security
• Following the Internet Worm of 1988
– Organizations formed to share information
• About threats to computer systems
• Principle followed
– Sharing information about attacks and defenses for
attacks
• Helps everyone create better computer security
E-Business, Europe, Middle East, Africa First Edition
90
CERT
• Computer Emergency Response Team
• Housed at Carnegie Mellon University
– Software Engineering Institute
• Maintains effective, quick communications
infrastructure among security experts
– Security incidents avoided, handled quickly
• Provides security risk information
• Posts security event alerts
• Primary authoritative source for viruses, worms,
and other types of attack information
E-Business, Europe, Middle East, Africa First Edition
Other Organizations
• 1989: System Administrator, Audit, Network and Security (SANS)
Institute
– Education & research efforts: research reports, security alerts & white papers
– SANS Internet Storm Center Web site - current information on location,
intensity of computer attacks worldwide
• CERIAS (Center for Education & Research in Information
Assurance & Security) - Multidisciplinary information security research and
education
• Center for Internet Security
– Not-for-profit cooperative organization
– Helps electronic commerce companies
• CSO Online
– Articles from CSO Magazine
– Computer security-related news items
• Infosecurity.com
– Articles about all types of online security issues
E-Business, Europe, Middle East, Africa First Edition
Computer Forensics and Ethical Hacking
• Computer forensics experts (ethical hackers)
– Computer sleuths hired to probe PCs
– Locate information usable in legal proceedings
– Job of breaking into client computers
• Computer forensics field
– Responsible for collection, preservation, and
computer-related evidence analysis
• Companies hire ethical hackers to test computer
security safeguards
E-Business, Europe, Middle East, Africa First Edition
Summary of Online Security
• Physical and logical computer security important in electronic
commerce Security policy can identify risks and countermeasures to
reduce risks
• Key security provisions - Secrecy, integrity, available service
• Client threats and solutions - Virus threats, active content threats,
cookies
• Communication channels’ threats and solutions
– Encryption provides secrecy
• Web Server threats and solutions
– Threats from programs, backdoors
• Security organizations
– Share information about threats, defenses
• Computer forensics
– “Break into” computers searching for legal use data
– Assist in identifying security weaknesses
E-Business, Europe, Middle East, Africa First Edition
E-Payment Systems
Online Payment Basics
• Online payments
– Important electronic commerce site function
– Several online payment options available
• Vary in size and processing method
• Micropayments
Internet payments for items costing few cents to a euro
• Micropayments barriers
– Not yet implemented very well on the Web
– Human psychology
• People prefer to buy small value items in fixed price chunks
• Example: mobile phone fixed monthly payment plans
E-Business, Europe, Middle East, Africa First Edition
Micropayments and Small Payments
(cont’d.)
• Companies which have developed micropayment systems:
 Millicent, DigiCash, Yaga, BitPass – ALL FAILED
 No company gained broad acceptance of its system
 No company devoted solely to offering micropayment services
• Small payments
– All payments of less than €10
– Being offered through mobile telephone carrier
• Buyers make purchases using their mobile phones
• Charges appear on monthly mobile phone bill
• Bright future held back by mobile carriers’ substantial charges
E-Business, Europe, Middle East, Africa First Edition
Online Payment Methods
• Four ways to purchase items (traditional and electronic)
1. Cash 2. Cheques 3. Credit cards 4. Debit cards
• Electronic transfer: small but growing segment
– Popular example: automated payments
• Credit and debit cards
– Worldwide: 85% of online payments
– Remainder of payments primarily PayPal
E-Business, Europe, Middle East, Africa First Edition
Forms of payment for U.S. online transactions, estimates for 2015
Source: Adapted from forecasts by Javelin Strategy & Research and Internet Retailer.
E-Business, Europe, Middle East, Africa First Edition
Online Payment Methods (cont’d.)
• Online payment systems
– Still evolving, competition for dominance
– Cheaper than mailing paper checks
– Convenient for customers & save companies money
• Costs per bill
– Billing by mail: between €1.00 and €1.50
– Internet billing and payment costs: 50 cents
• Significant environmental impact
E-Business, Europe, Middle East, Africa First Edition
Online Payment Methods (cont’d.)
Online business payment requirements:
– Safe, convenient, and widely accepted
– determine which choices best for company and customers
Each payment technology:
• Unique properties, costs, advantages, and disadvantages
• Online business payment requirements
– Safe, convenient, and widely accepted
• Determine which choices best for company and customers
• Each payment technology:
– Unique properties, costs, advantages, and disadvantages
E-Business, Europe, Middle East, Africa First Edition
100
Payment Cards
• Payment card
– Describes all types of plastic cards used to make purchases
– Categories: credit cards, debit cards, charge cards, prepaid
cards, and gift cards
• Credit card (Visa, MasterCard)
– Spending limit based on user’s credit history
– Pay off entire credit card balance
• May pay minimum amount
– Card issuers charge unpaid balance interest
– Widely accepted
– Consumer protection: 30-day dispute period
E-Business, Europe, Middle East, Africa First Edition
Payment Cards (cont’d.)
• Credit Cards (cont.)
– Card not present transactions
• Cardholder not present during transaction
• Extra degree of risk for merchant and bank
• Debit card (electronic funds transfer at point of
sale (EFTPOS) cards)
– Removes sales amount from cardholder’s bank account
– Transfers sales amount to seller’s bank account
– Issued by cardholder’s bank
• Carries major credit card issuer name
E-Business, Europe, Middle East, Africa First Edition
Payment Cards (cont’d.)
• Charge card (e.g., American Express)
– No spending limit
– Entire amount due at end of billing period
– No line of credit or interest charges
– Examples: department store, oil company cards
• Retailers may offer their own charge cards
– Store charge cards or store-branded cards
E-Business, Europe, Middle East, Africa First Edition
Payment Cards (cont’d.)
• Prepaid cards
– Cards that can be redeemed by anyone for future purchase
– Gift cards: prepaid cards sold to be given as gift
• Single-use cards
– Cards with disposable numbers
• Addresses concern of giving online vendors payment card
numbers, valid for one transaction only
• Designed to prevent unscrupulous vendor fraud
– Withdrawn from market due to lack of consumer use
E-Business, Europe, Middle East, Africa First Edition
Advantages and Disadvantages of
Payment Cards
•
Greatest advantages
– Worldwide acceptance & simplicity of usage
• Currency conversion handled by card issuer
• Entities involved in payment card processes: Merchant, merchant’s bank,
customer, customer’s bank, and payment card issuer (company)
– Fraud protection for merchants & build in security
• Can authenticate and authorize purchases using a payment card processing
network
• Interchange network: set of connections between credit card issuing banks,
associations owning credit cards, and merchants’ banks
•
Disadvantage for merchants
– Per-transaction fees for merchants & monthly processing fees, viewed as cost of
doing business.
– Goods and services prices: slightly higher, compared to environment free of
payment cards
•
Disadvantage for consumers
– Annual fee
E-Business, Europe, Middle East, Africa First Edition
Payment Acceptance and Processing
• Internet payment card process made easier due to standards
• Online stores, mail order stores often must ship merchandise
within e.g. 30 days of charging payment
• Significant violation penalties
• Charge account when shipped
• Processing payment card transaction online
– Payment acceptance
• Establish card validity
• Verify card’s limit not exceeded by transaction
– Clearing the transaction
• All steps to move funds from card holder’s bank account into
merchant’s bank account
E-Business, Europe, Middle East, Africa First Edition
Payment Acceptance and Processing
(cont’d.)
• Open and closed loop systems
– Closed loop systems
• Card issuer pays merchant directly
• Does not use intermediary
• American Express, Discover Card
– Open loop systems (three or more parties)
• Additional payment processing intermediaries
• Visa, MasterCard: not issued directly to consumers
• Credit card associations: operated by association member
banks
• Customer issuing banks (issuing banks): banks issuing cards
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Closed loop payment card system
E-Business, Europe, Middle East, Africa First Edition
© Cengage Learning 2013
Open loop payment card system
E-Business, Europe, Middle East, Africa First Edition
Payment Acceptance and Processing
(cont’d.)
• Merchant accounts
– Acquiring bank:
• Does business with Internet and non-Internet sellers
• Wants to accept payment cards
– Merchant account required by online merchant to
process Internet transactions payment cards
– Obtaining account
• Merchant provides business information
• Bank assesses business type risk
• Bank assesses percentage of sales likely to be
contested
E-Business, Europe, Middle East, Africa First Edition
Payment Acceptance and Processing
(cont’d.)
– Chargeback process
• Cardholder successfully contests charge
• Merchant bank must retrieve money from merchant
account
• Merchant may have to keep funds on deposit
– Additional fees
• Acquirer fees: charges for providing payment card
processing service
• Interchange fees: set by the card association,
charged to acquiring bank, passed along to merchant
E-Business, Europe, Middle East, Africa First Edition
Payment Acceptance and Processing
Problems facing online businesses: Fraud
• Under 15 percent of all credit card transactions completed online
• Responsible for 64 percent of total euro amount of credit card fraud
• Online transaction fraud increased steadily through 2008
• Slight decline since 2008
Merchants’ use of antifraud measures
• Scoring services providing risk ratings for individual transactions in
real time
• Shipping only to card billing address
• Requiring card verification numbers (CVNs) for card not present
transactions
CVN
• Three- or four-digit number printed on the credit card
• Not encoded in the card’s magnetic strip
E-Business, Europe, Middle East, Africa First Edition
112
Payment Acceptance and Processing
Processing payment card transactions
– Most online merchants have internal systems:
• Handling closed loop and open loop system cards
– Some accept direct deductions from customer’s
checking account
• Automated Clearing House (ACH): network of banks
involved in direct deduction transactions
– Business size considerations
• Large: entire department to build/maintain systems
• Mid-size: purchased software with skilled staff to
manage system
• Small: rely on service provider
E-Business, Europe, Middle East, Africa First Edition
Payment Acceptance and Processing
Payment processing service providers (payment
processors)
• Companies offering payment card processing
Front-end processor (payment gateway):
• Obtains transaction authorization
• Stores approval or denial record
Back-end processor: takes front-end processor
transactions and coordinates information flows
• Handles chargebacks, other reconciliation items
through the interchange network and acquiring and
issuing banks, including ACH transfers
E-Business, Europe, Middle East, Africa First Edition
Payment Acceptance and Processing
Payment processors:
• IPPay, Authorize.Net, Global Payments, and FirstData
Specialized payment processing services:
• Digital River’s*shareit!
Third party payment processor may be evident or
transparent to customer
• Well-recognized name provides customers with sense
of security
E-Business, Europe, Middle East, Africa First Edition
Electronic Cash
• Electronic cash (e-cash, digital cash)
– Describes any value storage and exchange system
created by private (nongovernmental) entity
• Does not use paper documents or coins
• Can serve as substitute for government-issued
physical currency
• Potential market
– Purchases below €10
– Majority of world’s population who do not have credit
cards
E-Business, Europe, Middle East, Africa First Edition
Privacy and Security of Electronic Cash
• Electronic payment method concerns
– Privacy and security, independence, portability,
convenience
– Privacy and security: most important to consumers
• Vulnerable transactions
• Electronic currency: copied, reused, forged
• Important characteristics of electronic cash
– Ability to spend only once
– Anonymous use
• Anonymous electronic cash: can’t be traced to person
who spent it
– Convenience
E-Business, Europe, Middle East, Africa First Edition
Holding Electronic Cash:
Online and Offline Cash
• Online cash storage
– Consumer has no personal possession of electronic
cash
• Trusted third party (online bank) involved in all
transfers, holds consumers’ cash accounts
• Online system payment
– Merchants contact consumer’s bank
• Helps prevent fraud (confirm valid cash)
• Resembles process of checking with consumer’s bank
to ensure valid credit card and matching name
E-Business, Europe, Middle East, Africa First Edition
Holding Electronic Cash: Online and
Offline Cash (cont’d.)
• Offline cash storage
– Virtual equivalent of money kept in wallet
– Customer holds it
• No third party involved in transaction
– Protection against fraud concern
• Hardware or software safeguards needed
– Double-spending
• Spending electronic cash twice
• Submit same electronic currency to two different
vendors
• Not enough time to prevent fraudulent act
E-Business, Europe, Middle East, Africa First Edition
Holding Electronic Cash: Online and
Offline Cash (cont’d.)
• Main deterrent to double-spending
– Threat of detection and prosecution
• System must provide tamperproof electronic cash
traceable back to origins
– Two-part lock
• Provides anonymous security
• Signals an attempt to double-spend cash that is
traceable
• Electronic cash used correctly:
– Preserves user’s anonymity
E-Business, Europe, Middle East, Africa First Edition
120
© Cengage Learning 2013
Detecting double spending of electronic cash
E-Business, Europe, Middle East, Africa First Edition
Advantages and Disadvantages
of Electronic Cash
• Traditional brick-and-mortar billing methods
– Costly and inefficient
• Online stores have the same payment collection
inefficiencies
• Most online customers use credit cards to pay for
purchases
• Electronic cash system
– Less popular than other payment methods
– Provides unique advantages and disadvantages
E-Business, Europe, Middle East, Africa First Edition
Advantages and Disadvantages of
Electronic Cash (cont’d.)
• Advantages of electronic cash transactions
– More efficient (less costly)
• Efficiency fosters more business (lower prices)
– Occurs on existing infrastructure (Internet)
– Does not require one party to obtain authorization:
• As required with credit card transactions
• Disadvantages of electronic cash transactions
– No audit trail
– Money laundering
• Technique criminals use to convert money illegally obtained into
spendable cash
• Purchase goods, services with ill-gotten electronic cash
• Goods sold for physical cash on open market
E-Business, Europe, Middle East, Africa First Edition
Advantages and Disadvantages of
Electronic Cash (cont’d.)
• Electronic cash
– More successful in Europe and Asia
• Consumers prefer to use cash (does not work well for
online transactions)
• Electronic cash fills important need
– Not successful in United States
• Consumers have credit cards, debit cards, charge cards,
checking accounts
• KDD Communications (KCOM)
– Internet subsidiary: Japan’s largest phone company
– Offers electronic cash through NetCoin Center
E-Business, Europe, Middle East, Africa First Edition
Advantages and Disadvantages of
Electronic Cash (cont’d.)
• Reasons for failure of United States electronic cash
systems
– Electronic cash systems implementation
• Requires software installed into consumers’ Web browsers
– Number of competing technologies
• No standards developed
• Array of proprietary electronic cash alternatives that are not
interoperable
• Interoperable software:
– Runs transparently on variety of hardware configurations and
different software systems
E-Business, Europe, Middle East, Africa First Edition
Digital Wallets
Consumer concerns when shopping online
– Entering detailed shipping and payment information for each
online purchase & filling out forms
– Solution: allows customer to store name, address, credit card
information on the site
– Problem: Consumers must enter information at each site
Digital wallet (electronic wallet or e-wallet)
– Holds credit card numbers, electronic cash, owner identification,
owner contact information
– Provides information at electronic commerce site checkout
counter
– Benefit: consumer enters information once
• More efficient shopping
E-Business, Europe, Middle East, Africa First Edition
Digital Wallets (cont’d.)
– Digital wallet technology elements
• System: infrastructure for identification
• Application: software for user interaction
• Device: applicable if a specific device is used
• Server-side digital wallet
– Stores customer’s information on remote server of merchant or
wallet publisher & no download time or installation on user’s
computer
– Main weakness: Security breach can reveal thousands of users’
personal information to unauthorized parties
• Client-side digital wallet
– Stores information on consumer’s computer
– Disadvantages: not portable, must download wallet software onto every
computer
– Advantage: sensitive information stored on user’s computer
E-Business, Europe, Middle East, Africa First Edition
Software-Only Digital Wallets (cont’d.)
• Server-side digital wallet examples:
– Microsoft Windows Live ID
• Single sign-in (SSI) service
• Completes order forms automatically
• Personal data encrypted and password protected
• Integrated services: SSI, Wallet service, Kids service,
public profiles
– Yahoo! Wallet
• Software-based digital wallet
• Automatically fills online forms
• Accepted by large number of merchants
E-Business, Europe, Middle East, Africa First Edition
Hardware-Based Digital Wallets
• Implemented using smart phones
– Store owner’s identity credentials (driver’s license, medical
insurance card, store loyalty cards, etc.)
– Transmit portions of identify information using:
• Bluetooth or wireless transmission to nearby terminal
• Near field communication (NFC) technology: contactless
wireless transmission of data over short distances
• Status:
– Popular in Japan: mobile phones with NFC chips
• Oisaifu-Keitai (“mobile wallet”)
– U.S. examples:
• Google Wallet (uses PayPass technology)
• V.me (Visa digital wallet)
• PayPal digital wallet (release anticipated)
E-Business, Europe, Middle East, Africa First Edition
Stored-Value Cards
• Microchip smart card or magnetic strip plastic card
• Examples: credit cards, debit cards, charge cards,
driver’s license, health insurance card, and employee or
student identification card
Magnetic Strip Cards
• Holds rechargeable value
• Passive magnetic strip cards cannot:
– Send or receive information
– Increment or decrement cash value stored
• Processing done on device into which card inserted
E-Business, Europe, Middle East, Africa First Edition
Smart Cards
• Smart card (stored-value card):
– Plastic card with embedded microchip
• Credit, debit, charge cards store limited information
on magnetic strip
• Information storage
– About 100 times more than magnetic strip plastic
card
• Holds private user data
– Financial facts, encryption keys, account
information, credit card numbers, health insurance
information, medical records
E-Business, Europe, Middle East, Africa First Edition
Smart Cards (cont’d.)
• Safer than conventional credit cards
– Information encrypted on smart card
• Popular in Europe, parts of Asia
– Public telephone calls, cable television programs
– Hong Kong
• Retail counters, restaurant cash registers have smart
card readers
• Octopus: public transportation smart card can be
reloaded at transportation locations, 7-Eleven stores
E-Business, Europe, Middle East, Africa First Edition
Smart Cards (cont’d.)
• Beginning to appear in United States
– San Francisco TransLink integrated ticketing system
for public transportation
• Smart Card Alliance
– Advances smart card benefits
– Promotes widespread acceptance of
multiple-application smart card technology
– Promotes compatibility among smart cards, card
reader devices, applications
E-Business, Europe, Middle East, Africa First Edition
Internet Technologies and the Banking
Industry
• Paper cheques
– Largest dollar volume of payments
– Processed through world’s banking system
• Other major payment forms
– Involve banks one way or another
• Banking industry Internet technologies
– Providing new tools
– Creating new threats
E-Business, Europe, Middle East, Africa First Edition
Cheque Processing
• Old method of physical cheque processing
– Person wrote check; retailer deposited cheque in bank
account
– Retailer’s bank sent paper cheque to clearinghouse
• Clearinghouse managed fund transfer (consumer’s bank
to retailer’s account)
– Paper cheque transported to consumer’s bank
– Cancelled cheque sent to consumer
• Banks now provide PDF images of processed cheque
E-Business, Europe, Middle East, Africa First Edition
Cheque Processing (cont’d.)
• Disadvantage of paper cheques
– Cost of transporting tons of paper
– Float
• Delay between the time person writes cheque and the time
cheque clears person’s bank
• Bank’s customer obtains free use of funds for few days
• Bank loses use of funds for same time period
• Can become significantly longer than a few days
E-Business, Europe, Middle East, Africa First Edition
Cheque Processing (cont’d.)
• Technologies helping banks reduce float
• Banks to eliminate movement of physical cheques
entirely
• Check 21-compliant world
– Retailer scans customer's cheque
– Scanned image transmitted instantly
• Through clearing system
– Posts almost immediately to both accounts
• Eliminates transaction float
E-Business, Europe, Middle East, Africa First Edition
Mobile Banking
• Banks exploring mobile commerce potential
• 2009: banks launched sites allowing customers
using smart phones to:
– Obtain bank balance, view account statement, and
find a nearby ATM
• Future plans
– Offering smart phone apps
• Use to transact all types of banking business
• Credit card reader attachment available for some
smart phones yielding a portable payment
processing terminal
E-Business, Europe, Middle East, Africa First Edition
138
Criminal Activity and Payment
Systems: Phishing and Identity Theft
• Online payment systems
– Offer criminals and criminal enterprises an attractive
arena in which to operate
• Average consumers: easy prey
• Large amounts of money provide tempting targets
– Phishing expedition
• Technique for committing fraud against online
businesses customers
• Particular concern to financial institutions
E-Business, Europe, Middle East, Africa First Edition
139
Phishing Attacks
• Basic structure
– Attacker sends e-mail message:
• To accounts with potential for an account at targeted Web site
– E-mail message tells recipient: account compromised
• Recipient must log on to account to correct problem
– E-mail message includes link
• Appears to be Web site login page
• Actually leads to perpetrator’s Web site disguised to look like the
targeted Web site
– Recipient enters login name, password
• Perpetrator captures
• Uses to access recipient’s account
• Perpetrator accesses personal information, makes purchases,
withdraws funds
E-Business, Europe, Middle East, Africa First Edition
Phishing e-mail message
E-Business, Europe, Middle East, Africa First Edition
Phishing e-mail message (cont’d.)
E-Business, Europe, Middle East, Africa First Edition
Phishing Attacks (cont’d.)
• Spear phishing
– Carefully designed phishing expedition targeting a
particular person or organization
– Requires considerable research
– Increases chance of e-mail being opened
– Example: 2008 government stimulus checks
• Phishing e-mails appeared within one week of
passage
E-Business, Europe, Middle East, Africa First Edition
Phishing Attacks (cont’d.)
• E-mail link disguises and tricks
– Example: Web server ignores all characters preceding “@”:
– https://www.paypal.com@218.36.41.188/fl/login.html
• Link appears different in e-mail
• Phony site invisible due to JavaScript code
– Pop-up windows
• Look exactly like browser address bar
– Including Web site graphics of financial institutions
• Looks more convincing
• Web sites to learn more about phishing techniques:
– Conferences on Email and Anti-Spam
– Anti-Phishing Working Group (APWG)
E-Business, Europe, Middle East, Africa First Edition
Phishing e-mail with graphics
E-Business, Europe, Middle East, Africa First Edition
Phishing e-mail with graphics (cont’d.)
E-Business, Europe, Middle East, Africa First Edition
Using Phishing Attacks for Identity
Theft
• Organized crime (racketeering)
– Unlawful activities conducted by highly organized,
disciplined association for profit
– Differentiated from less-organized groups
– Internet providing new criminal activity opportunities
• Generates spam, phishing, identity theft
• Identity theft
– Criminal act: perpetrator gathers victim’s personal
information
– Uses information to obtain credit
– Perpetrator runs up account charges and disappears
E-Business, Europe, Middle East, Africa First Edition
Types of personal information most useful to identity thieves
E-Business, Europe, Middle East, Africa First Edition
Using Phishing Attacks for Identity
Theft (cont’d.)
• Large criminal organizations
– Efficient perpetrators of identity theft
• Exploit large amounts of personal information quickly
and efficiently
– Sell or trade information that is not of immediate use
• Other worldwide organized crime entities
– Zombie farm
• Large number of computers implanted with zombie
programs
– Pharming attack
• Use of a zombie farm, often by an organized crime
association, to launch a massive phishing attack
E-Business, Europe, Middle East, Africa First Edition
Using Phishing Attacks for Identity
Theft (cont’d.)
• Two elements in phishing
– Collectors: collect information
– Cashers: use information
– Require different skills
• Crime organizations facilitate transactions between
collectors and cashers
– Increases phishing activity efficiency and volume
• Each year:
– More than a million people fall victim
– Financial losses exceed €500 million
E-Business, Europe, Middle East, Africa First Edition
Phishing Attack Countermeasures
• Change protocol
– Improve e-mail recipients’ ability to identify message
source
• Reduce phishing attack threat
• Educate Web site users
• Contract with consulting firms specializing in
anti-phishing work
• Monitor online chat rooms used by criminals
E-Business, Europe, Middle East, Africa First Edition
Summary of Online Payment Basics
• Online stores: payment forms
– Credit, debit, charge cards (payment cards)
• Ubiquitous, convenient, and easy to use
– Electronic cash: portable and anonymous online payment form
• Useful for micropayments
– Digital wallets provide convenience
– Stored-value cards
• Smart cards, magnetic strip cards
• Banks process most monetary transactions
– Use Internet technologies to process checks
• Concerns: phishing expeditions, identity theft
E-Business, Europe, Middle East, Africa First Edition
Download