E-Commerce: Security Challenges and Solutions
E-Commerce: Security Challenges and Solutions
E-Commerce: Security Challenges and Solutions
and Solutions
Outline of the Presentation
• Internet Security
• Cryptography
» Public key
» Private key
• Firewalls
• Security threats
Introduction
Two Major Developments During the Past Decade:
1. Widespread Computerization
2. Growing Networking and Internetworking
The Internet
• Need for Automated Tools for Protecting Files and
Other Information.
• Network and Internetwork Security refer to
measures needed to protect data during its
transmission from one computer to another in a
network or from one network to another in an
internetwork.
…Continue
Network security is complex. Some reasons are:
• Requirements for security services are:
– Confidentiality
– Authentication
– Integrity
• Key Management is difficult.
Creation, Distribution, and Protection of Key
information calls for the need for secure services, the
same services that they are trying to provide.
Security Threats
• Unauthorized access
• Loss of message confidentiality or integrity
• User Identification
• Access Control
• Players:
– User community
– Network Administration
– Introducers/Haclers
• The bigger the system, the safer it is
– MVS mainframe users (5%)
– UNIX users (25%)
– Desktop users (50%)
• Transactional risk
» Default on order
» Default on delivery
» Default on payment
– Freeware
– Distributed software
Possible Security “Holes”
• Passwords
– Transmitted in plain text
– Could be temporarily stored in unsafe files
– Could be easy to guess
• Directory structure
– Access to system directories could be a threat
• In the operating system software
– Some operating system software is not designed for secure
operation
– Security system manager should subscribe to
• comp.security.unix
• comp.security.misc
• alt.security
Security Strategies
• Use a separate host
– Permanently connected to the Internet, not to your
network.
– Users dial in to a separate host and get onto the Internet
through it.
• Passwords
– Most important protection
– Should be at least eight characters long
– Use a mixture of alpha and numeric
– Should not be able to be found in dictionary
• should not be associated with you!
– Change regularly
…Continue
• Every transaction generates record in a security log
file
– Might slow traffic and host computer
– Keeps a permanent record on how your machine is
accessed
• Tracks
– Generates alarms when someone attempts to access
secure area
– Separate the directories that anonymous users can access
– Enforce user account logon for internal users
– Read web server logs regularly
Cryptography
A Public key of B
B
M Private
encryption Key of B
Ciphertext C
C
Insecure
C communications or decryption
storage.
Territory of the M
Intruder
Proxies and
Host running only proxy
Host-Based versions of FTP,Telnet and
Firewalls so on.
Internal
Network
Filtering
Router
Internet (Optimal)
Electronic Mail Security
• E-mail is the most widely used application in the
Internet.
• Who wants to read your mail ?
– Business competitors
– Reporters,Criminals
– Friends and Family
• Two approaches are used:
– PGP: Pretty Good Privacy
– PEM: Privacy-Enhanced Mail
Summary of PGP Services
Function Algorithms used Description
Message IDEA, RSA A message is encrypted
encryption using IDEA . The session key
is encrypted using RSA
recipient’s public key.
– Others …
Secure Sockets Layer (SSL)
• Platform and Application Independent
– Operates between application and transport
layers
Web Applications
Future
HTTP NNTP FTP Telnet Etc.
Apps
SSL
TCP/IP
Secure Sockets Layer (SSL)
secure transactions
– Mutual Authentication
– Data Encryption
– Data Integrity
electronic authentication
certificates
application