Security threats to Electronic Commerce

advertisement
Chapter 5
5
Security Threats to
Electronic Commerce
Electronic Commerce
1
Security Overview
 Many
fears to overcome:
Intercepted e-mail messages is a concern
 Unauthorized access to business
information by a competitor
 Credit card information falling into the
wrong hands while typing during payment
processing

5
2
Security Definition
 Computer
5
security is the protection of
unauthorized access, use, alteration, or
destruction hardware, software, and data.
 Two types of computer security:
 Physical - protection of computing devices
using physical objects such as guards,
alarms, security doors, vaults, etc.
 Logical - protection through password,
firewall, and encryption are logical
solutions to security.
3
Security Overview
5

Threat: Any act or object that poses a danger to
computer assets is known as a threat.

Countermeasures are procedures, either physical
or logical, that recognize, reduce, or eliminate a
threat

Threats that are low risk and unlikely to occur can be
ignored if the cost of protection is higher the asset
(hardware, software, data) value.
4
Risk Management Model
5
5
Computer Security Classification
5

Computer security can be classified into three
categories:

Secrecy
 Protecting against unauthorized data disclosure
and ensuring the authenticity of the data’s source
Integrity
 Preventing unauthorized data modification
Necessity
 Preventing data delays or denials (removal)


6
Security Policy


5





A Security policy is a written statement describing what assets are to be
protected and why, who is responsible, which behaviors are acceptable or
not. Any organization involved in e-commerce, should have a security
policy in place.
Specific elements of a security policy addresses:
Authentication
 Who is trying to access the site?
Access Control
 Who is allowed to logon and access the site?
Secrecy
 Who is permitted to view selected information
Data integrity
 Who is allowed to change data?
Audit
 What and who causes selected events to occur, and when?
7
Integrated Security


5
Security policy should address an integrated
security of an organization.
Integrated security policy should address all security
measures in order to prevent unauthorized
disclosure, destruction, or modification of assets. It
includes:
 Physical security
 Network security
 Access authorizations
 Virus protection
 Disaster recovery
8
Electronic Commerce Threats
 Secure
5
electronic commerce include
protection of three assets in the “commerce
chain”.
 These are:
 Client computers
 Messages travelling from the client
computer to the Web server through the
Internet
 Web/Commerce servers
9
Client Threats
 Active
Content

Java applets, Active X controls, JavaScript, and
VBScript, which are programs that interpret or
execute instructions embedded in downloaded
objects from a Web/commerce server

Malicious active content can be embedded into
seemingly innocuous Web pages

Cookies remember user names, passwords, and
other commonly referenced information
5
10
Java and Java Applets
 Java
5
is a high-level programming
language developed by Sun
Microsystems
 Java code embedded into appliances
can make them run more intelligently
 Largest use of Java is in Web pages as
Java Applets
 Java is Platform independent - will run
on any computer
11
Java Applets



5

An applet is a program that executes within another program and
cannot execute directly on a computer
Once downloaded, a Java applet can run on a client computer, so
security violations can occur
Java sandbox security:
 Confines Java applet actions to a security model-defined set of
rules
 Rules apply to all untrusted applets, that have not been proven
secure
 Applets obeying sandbox rules can not perform file input, output,
or delete operations of the operating system.
Signed Java applets:
 Contain embedded digital signatures from a third party, which
serve as a proof of identity of the source of the applet.
 If the applet is signed, then it can be let out of sandbox to use the
full system resources
12
JavaScript
5

JavaScript is a scripting language developed by
Netscape Corporation to enable Web page
designers to build active content.

When downloaded a Web page with embedded
JavaScript, it runs in the client computer and can
destroy hard disk, send back e-mail accounts to the
originating Web server, and so on. Having a secure
communication channel is not useful under this
condition
13
ActiveX Controls
 ActiveX
5
is an object, called a control, that
contains programs and properties that
perform certain tasks
 ActiveX controls only run on computers with
Windows 95, 98, or 2000
 Once downloaded, ActiveX controls execute
like any other program, having full access to
a computer’s resources reformatting a hard
disk, sending e-mail addresses, or shut down
the computer.
14
Communication
Channel Threats

5
Secrecy Threats:
 Secrecy is the prevention of unauthorized
information disclosure. It requires sophisticated
physical and logical mechanism to implement
 Theft of sensitive or personal information (e-mail
address, credit card number)is a significant
danger in e-commerce
 Sniffer programs can tap into a router of the
Internet and record information while it passes
from a client computer to a Web server.
 IP address of a computer is continually revealed
to a Web server while a user is on the web
15
Communication
Channel Threats
 How
5
to Hide an IP address from a Web site:
 A Web site called “Anonymizer” that
provides a measure of secrecy by hiding
the IP address of a client computer from
sites that a user visits.
 It requires that a users starts his/her visit
from the “anonymizer” home page:
http://www.anonymizer.com
 Anonymizer acts as a firewall and shields
private information from leaking out.
16
Communication
Channel Threats
 Integrity
Threats:
Also known as active wiretapping
 Unauthorized party can alter data such as
changing the amount of a deposit or
withdrawal in bank transaction over the
Internet
 A hacker can create a mechanism such
that all transactions from a Web site
redirects to a fake location.

5
17
Communication
Channel Threats
 Necessity
Threats:
Also known as delay or denial threats
 Disrupt normal computer processing

5
 Deny
processing entirely
 Slow processing to intolerably slow speeds
such that customers get bored not to visit the
site anymore.
 Remove file entirely, or delete information from
a transmission or file
 Divert money from one bank account to
another
18
Server Threats
5

The more complex a Web server software becomes,
the higher the probability that errors (bugs) exist in
the code - security holes through which hackers can
access.

Web servers run at various privilege levels:
 Highest levels provide greatest access and
flexibility to a Web user (from a browser)
 Lowest levels provide a logical fence around a
running program
19
Server Threats
 Secrecy
5
violations occur when the contents
of a server’s folder names are revealed to a
Web browser
 Web site administrators can turn off the
“Allow Directory Browsing” feature to avoid
secrecy violations
 Cookies requested by a Web server,
containing a user’s Userid and Password in a
client computer, should never be transmitted
unprotected
20
Server Threats
5
21
Displayed Folder Names
Figure 5-9
5
22
Server Threats
 One
5
of the most sensitive files on a
Web server holds the username and
password pairs
 The
Web server administrator is
responsible for ensuring that this, and
other sensitive files, are secure
23
Database Threats
5

A company database systems store data on user,
products, and orders for e-commerce

In addition, a company’s valuable and private
information could be stored in a company database

Security in a database is often enforced through
defining the user “privileges” which must be enforced

Some databases are inherently insecure and rely on
the Web server to enforce security measures
24
Other Threats
 Common
Gateway Interface (CGI)
Threats
5
CGIs are programs that present a security
threat if misused
 CGI programs can reside almost
anywhere on a Web server and therefore
are often difficult to track down
 CGI scripts do not run inside a sandbox,
unlike JavaScript

25
Download