Webp - Case Study - 601
Webp - Case Study - 601
Juthamas Pongnukit
Witit Tingthanathikul
commerce business with 128 bit encryption has become the standard in network
This paper will discuss the various methods that are used in the e-
encryption. Also, this paper will survey about threats, and vulnerabilities in E –
commerce in recently.
Introduction
internet users and the fact that most of them do not share a common security
depends on gaining and maintaining the trust and confidence of visitors. Thus, it
and improve security for the solution, at the same time, also win trust confidence
from customers.
explain the e-business network because the security for e-commerce is to make
customers and business partners feel safe and comfortable when performing
Layer (SSL), Secure Electronic Transactions (SET) and different kinds of data
However, there are many threats and risk that happen in e-commerce. It is very
in recently are also the main interesting for case study to explain how much e-
reliable e-Business network can be guarantee for trust and confidence, not only
for customers, but also for service providers themselves. There should be three
DB/Application Zone.
Internet Zone locates in the outside of the first firewall; the purpose of this
zone is to provide the entry point into the e-Business network cell. Normally, this
zone doesn’t have any protection from outside attacks, but using certain switches
can provide protection from SYN attacks and limit the number of SYN packets
that can enter from a single host without the corresponding SYN-ACK. The
definition of SYN Attack is that when an attacker sends a series of SYN requests
to a target (victim). The target sends a SYN ACK in response and waits for an
ACK to come back to complete the session set up. Since the source address was
fake, the response never comes, filling the victim's memory buffers so that it can
Web zone is built for the systems that need direct communication to users
between insecure external hosts on the Internet and the data the application
zone, it allows the very close scrutiny of communications between the Internet
zone and the sensitive data and business logic contained in the DB/Application
Zone. The front-end firewall should provide the only HTTP and HTTPS
connections. IDS (Intrusion Detection System) provides the second level security
by providing sniffer that “watches” for any other traffic that wasn’t allowed by the
frond-end firewall.
secured place for applications/DB that may contain the sensitive information. The
main purpose for this network is to have a point that isn’t directly accessed by the
insecure Internet, and thereby allowing specific systems to gather the data they
design.
company or IT staff, but it helps to understand the basic principles. Any system
other.
message is encrypted by a public key, and decrypted by a private key. The public
key is widely distributed, but only the recipient has the private key. For
authentication (proving the identity of the sender, since only the sender has the
particular key) the encrypted message is encrypted again, but this time with a
private key. Such procedures form the basis of RSA (used by banks and
information, and is often used only as a first step — to allow two parties to agree
upon a key for symmetric secret key encryption. Here sender and recipient use
keys that are generated for the particular message by a third body: a key
distribution center. The keys are not identical, but each is shared with the key
distribution center, which allows the message to be read. Then the symmetric
keys are encrypted in the RSA manner, and rules set under various protocols.
Naturally, the private keys have to be kept secret, and most security lapses
Security protocol
In the today most e-business, many protocols are widely used such as
would like to explore about these protocols. We will discuss the various methods
that are used in the e-commerce such as Digital certificates, Digital signatures,
Digital signatures meet the need for authentication and integrity. To vastly
simplify matters (as throughout this page), a plain text message is run through a
hash function and so given a value: the message digest. This digest, the hash
function and the plain text encrypted with the recipient's public key is sent to the
recipient. The recipient decodes the message with their private key, and runs the
message through the supplied hash function to that the message digest value
remains unchanged (message has not been tampered with). Very often, the
message is also time stamped by a third party agency, which provides non-
repudiation.
In addition, digital certificate are also used for security purposes. The most
who he or she claims to be, and to provide the receiver with the means to encode
a reply.
An individual wishing to send an encrypted message applies for a digital
certificate containing the applicant's public key and a variety of other identification
information. The CA makes its own public key readily available through print
decode the digital certificate attached to the message, verifies it as issued by the
CA and then obtains the sender's public key and identification information held
within the certificate. With this information, the recipient can send an encrypted
reply.
secure communication between Web servers and clients. Information sent over
the Internet commonly uses the set of rules called TCP/IP (Transmission Control
different routes. TCP/IP reassembles them in order and resubmits any packet
showing errors. SSL uses PKI and digital certificates to ensure privacy and
authentication. The procedure is something like this: the client sends a message
to the server, which replies with a digital certificate. Using PKI, server and client
negotiate to create session keys, which are symmetrical secret keys specially
created for that particular transmission. Once the session keys are agreed,
communication continues with these session keys and the digital certificates.
standard developed for the secure transmission of payment information over the
SET uses a system of locks and keys along with certified account IDs for
or scrambling the information exchanged between the shopper and the online
store, SET ensures a payment process that is convenient, private and most of all
secure.
information confidential.
institution.
• Allows the use of the best security practices and system design
transaction.
integrity of the business network and its internal systems; and with accomplishing
transaction security between the customer and the business. The main tool
hardware and software system that allows only those external users with specific
to allow only specific services (e.g., email, web access) between the Internet and
the internal network. The firewall has now become the main point of defense in
the business security architecture. However, firewalls should a small part of the
business security infrastructure. There are hacker tools such as SMTP Tunnel
and ICMPTunnel that allow hackers to pass information through the allowed
ports.
are most likely found at the endpoints of the network connection. There are a
number of defenses against this threat such as encryption and switched network
actual transaction data from intermediate sites. Records of its passage are a
different thing and are required to verify the transaction actually took place.
Intermediate nodes that handle the transaction data must not retain it except
during the actual relaying of the data. Encryption is the most common method of
transactions from being modified in any way while it is in transit to or from the
they depend on the security of the endpoint systems to protect the keys from
modification or misuse.
Threats to e-commerce servers fall into two general categories:
information from people for the sheer purposes of exploitation (such obtaining
problems. This can be anything from a network not configured properly to data
written programming code upon which your e-commerce site was developed can
(such as Windows 2000 and 2003 Server), a Web Server Software to host the e-
(such as Access 2000 or SQL Server 2000) which contains your customer
information and transaction history. These platforms have had various security
flaws associated with them, which has made them wide open to threats and
attacks. As a result, there has been a move in the business community to adopt
more robust and secure platforms. A prime example of this is the use of Linux as
the operating system, Apache as the Web Server Software, and either
from the Structured Query Language, or SQL). These latter platforms will be
commerce servers. Also, we will look at some threats posed to your customers
- Transmission Threats.
the server in order to gain access to the system resources. Very often, the intent
server. With the latter, the threats and risks can be classified as either as active
or passive. With passive threats, the main goal is to listen (or eavesdrop) to
transmissions to the server. With active threats, the intent is to alter the flow of
commerce server
Conclusion
consumer trust and in providing e-security for network. Not only is this important
for the future success of your e-commerce, but customers will demand a safe
used to gain the security and trust on business. Secure Socket Layers (SSL)
and Secure Electronic Transactions (SET) are protocols that are using on e-
commerce business now. Also, Digital certificates and Digital signatures are the
principle that is used to authenticate the parties that are using shared network.
However, there are many threats that happen on network. It is possible for
[1] http://www.secure-sale.net/
[2] http://e-comm.webopedia.com
[3] http://www.webopedia.com
[4] http://www.moneymuseum.com/standard_english/raeume/geld_machen/bank/
praxis /ecommerce/einfuehrung/set/set.html
[5] http://www.veteransearch.com/ssl_set_info.htm#digicert
[6] http://www.ecommerce-digest.com/ecommerce-security-issues.html
docs/ecom-handouts.pdf, 1999.
itresponse/whitepapers/Ecommerce%20Security%20Issues.pdf
executivesclub.com/Articles/artThreatstoEcommerceServers.htm