Schneider PPT ch10 PDF
Schneider PPT ch10 PDF
Schneider PPT ch10 PDF
Electronic
Commerce
Security
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a. publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Learning Objectives
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 3
Online Security Issues Overview
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 4
Origins of Security on Interconnected
Computer Systems
• Modern computer security techniques developed by
US Department of Defense
• “Orange Book”: rules for mandatory access control
• Business computers initially adopted military’s
security methods
– Networks and other factors have increased number of
users accessing computers
– Computers now transmit valuable information
• Changes have made the need for comprehensive
security risk controls more important than ever
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 5
Computer Security and Risk Management
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 6
Computer Security and Risk Management
(cont’d.)
• Risk management model: four general actions based
on impact (cost) & probability of physical threat
– Also applicable for protecting Internet and electronic
commerce assets from physical and electronic threats
– Eavesdropper (person or device) that listens in on and
copies Internet transmissions
– Crackers or hackers obtain unauthorized access to
computers and networks
• White hat (good) and black hat (bad) hackers
• Companies must identify risks, determine how to
protect assets, and calculate how much to spend
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 7
© Cengage Learning 2017
FIGURE 10-1 Risk management model
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 8
Elements of Computer Security
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 9
Establishing a Security Policy
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 10
Establishing a Security Policy (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 11
© Cengage Learning 2017
FIGURE 10-2 Requirements for secure electronic commerce
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 12
Establishing a Security Policy (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 13
Security for Client Devices
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 14
Cookies and Web Bugs
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 16
Cookies and Web Bugs (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 18
Active Content
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 19
Active Content (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 20
Active Content (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 21
Graphics and Plug-Ins
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 22
Viruses, Worms, and Antivirus Software
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 31
Steganography
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 32
Physical Security for Client Devices and
Client Security for Mobile Devices
• Client computers require physical security
– Fingerprint readers: more protection than passwords
– Biometric security devices use an element of a
person’s biological makeup to provide identification
• Signature recognition, eye or palm scanners, veins
• Access passwords help secure mobile devices
– Remote wipe clears all personal data and can be
added as a app or done through e-mail
• Many users install antivirus software
– Rogue apps contain malware or collect information
and forward to perpetrators
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 33
Communication Channel Security and
Secrecy Threats
• Internet was designed to provide redundancy, not to
be secure
– Remains unchanged from original insecure state
• Secrecy is the prevention of unauthorized
information disclosure
– Technical issue requiring sophisticated physical and
logical mechanisms such as encryption of emails
• Privacy is the protection of individual rights to
nondisclosure which is a legal matter
– Should supervisors be allowed to randomly read
employee emails?
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 34
Secrecy Threats (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 35
Integrity Threats
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 38
Threats to Wireless Networks
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 40
Encryption Algorithms and Hash Coding
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 42
Symmetric Encryption
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 44
FIGURE 10-7
Comparison of
(a) hash coding, (b)
private-key, and (c)
public-key encryption
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 48
Encryption in Web Browsers: Secure HTTP
(S-HTTP)
• Extension to HTTP providing security features
– Symmetric encryption for secret communications and
public-key encryption to establish client-server
authentication
• Session negotiation setting transmission conditions
occurs between client and server
• Establishes secure session with a client-server
handshake exchange that includes security details
– Secure envelope encapsulates message, provides
secrecy, integrity, and client-server authentication
• SSL has largely replaced S-HTTP
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 49
Hash Functions, Message Digests, and
Digital Signatures
• To detect message alteration hash algorithm applied
to message content to create message digest
– Receiving computer can calculate value to determine
if numbers match (no alteration) or not (alteration)
– Not ideal because hash algorithm is public
• Digital signature is an encrypted message digest
created using a private key
– Provides nonrepudiation and positive identification of
the sender
– Secrecy when used with an encrypted message
– Same legal status as traditional written signature
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 50
© Cengage Learning 2017
FIGURE 10-9 Sending and receiving a digitally signed message
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 51
Security for Server Computers and
Password Attack Threats
• Server is the third link in client-Internet-server
electronic commerce path
– Web server administrator ensures security policies
documented and implemented
• One of the most sensitive file on Web server holds
Web server username-password pairs
– Most encrypt authentication information
• Passwords threats include using easy passwords
– Dictionary attack programs cycle through electronic
dictionary, trying every word as password
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 52
Password Attack Threats (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 53
© Cengage Learning 2017
FIGURE 10-10 Examples of passwords, from very weak to very strong
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 54
Database Threats and Other Software-
Based Threats
• Most database systems rely on usernames and
passwords that may be stored in unencrypted tables
– Database fails to enforce security
– Unauthorized users can masquerade as legitimate
users and reveal or download information
• Trojan horse programs hide within database system
– Reveal information by changing access rights
• Java or C++ programs executed by server often use
a buffer memory area to hold data
– Buffer overrun (buffer overflow) error occurs when
program malfunctions and spills data outside buffer
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 55
Other Software-Based Threats (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 57
Access Control and Authentication (cont’d)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 58
Firewalls
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 59
Firewalls (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 60
Firewalls (cont’d.)
© 2017 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part, except for use as permitted in a
license distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use. 64