e-business tenth edition chapter 10 online security

Download E-Business Tenth Edition Chapter 10 Online Security

If you can't read please download the document

Upload: russell-hill

Post on 16-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • E-Business Tenth Edition Chapter 10 Online Security
  • Slide 2
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 22 Learning Objectives In this chapter, you will learn: What security risks arise in online business and how to manage them How to create a security policy How to implement security on Web client computers How to implement security in the communication channels between computers
  • Slide 3
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Learning Objectives (contd.) How to implement security on Web server computers What organizations promote computer, network, and Internet security 3
  • Slide 4
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 4 Online Security Issues Overview Early Internet days Most popular use: electronic mail Todays higher stakes Electronic mail, shopping, all types of financial transactions Common worry of Web shoppers Stolen credit card as it transmits over the Internet More likely to be stolen from computer where stored Chapter topic: security in the context of electronic commerce
  • Slide 5
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 5 Origins of Security on Interconnected Computer Systems Data security measures taken by Roman Empire Coded information to prevent enemies from reading secret war and defense plans Modern electronic security techniques Defense Department wartime use Orange Book: rules for mandatory access control Business computers Initially adopted militarys security methods Todays computing Requires comprehensive computer security plans 5
  • Slide 6
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 6 Computer Security and Risk Management Computer security Asset protection from unauthorized access, use, alteration, and destruction Physical security Includes tangible protection devices Alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings Logical security Asset protection using nonphysical means
  • Slide 7
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 7 Computer Security and Risk Management (contd.) Threat Any act or object posing danger to computer assets Countermeasure Procedure (physical or logical) Recognizes, reduces, and eliminates threat Extent and expense of countermeasures Vary depending on asset importance 7
  • Slide 8
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 8 Computer Security and Risk Management (contd.) Risk management model Four general organizational actions Impact (cost) and probability of physical threat Also applicable for protecting Internet and electronic commerce assets from physical and electronic threats Electronic threat examples: Impostors, eavesdroppers, thieves Eavesdropper (person or device) Listen in on and copy Internet transmissions 8
  • Slide 9
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 9 FIGURE 10-1 Risk management model Cengage Learning 2013
  • Slide 10
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 10 Computer Security and Risk Management (contd.) Crackers or hackers (people) Write programs; manipulate technologies Obtain unauthorized access to computers and networks White hat hacker and black hat hacker Distinction between good hackers and bad hackers Good security scheme implementation Identify risks Determine how to protect threatened assets Calculate costs to protect assets
  • Slide 11
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 11 Elements of Computer Security Secrecy Protecting against unauthorized data disclosure Ensuring data source authenticity Integrity Preventing unauthorized data modification Man-in-the-middle exploit E-mail message intercepted; contents changed before forwarded to original destination Necessity Preventing data delays or denials (removal) Delaying message or completely destroying it
  • Slide 12
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Establishing a Security Policy Security policy Assets to protect and why, protection responsibility, acceptable and unacceptable behaviors Physical security, network security, access authorizations, virus protection, disaster recovery Military policy: stresses separation of multiple levels of security Corporate information classifications Public Company confidential 12
  • Slide 13
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 13 Establishing a Security Policy (contd.) Steps to create security policy Determine assets to protect from threats Determine access to various system parts Identify resources to protect assets Develop written security policy Commit resources Comprehensive security plan goals Protect privacy, integrity, availability; authentication Selected to satisfy Figure 10-2 requirements
  • Slide 14
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 14 FIGURE 10-2 Requirements for secure electronic commerce Cengage Learning 2013
  • Slide 15
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 15 Establishing a Security Policy (contd.) Security policies information sources WindowSecurity.com site Information Security Policy World site Absolute security: difficult to achieve Create barriers deterring intentional violators Reduce impact of natural disasters and terrorist acts Integrated security Having all security measures work together Prevents unauthorized disclosure, destruction, modification of assets
  • Slide 16
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 16 Establishing a Security Policy (contd.) Security policy points Authentication: Who is trying to access site? Access control: Who is allowed to log on to and access site? Secrecy: Who is permitted to view selected information? Data integrity: Who is allowed to change data? Audit: Who or what causes specific events to occur, and when?
  • Slide 17
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 17 Security for Client Computers Client computers Must be protected from threats Threats Originate in software and downloaded data Malevolent server site masquerades as legitimate Web site Chapter topics organized to follow the transaction-processing flow Beginning with consumer Ending with Web server at electronic commerce site
  • Slide 18
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 18 Cookies and Web Bugs Internet connection between Web clients and servers Stateless connection Each information transmission is independent No continuous connection (open session) maintained between any client and server Cookies Small text files Web servers place on Web client Identify returning visitors Allow continuing open session
  • Slide 19
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 19 Cookies and Web Bugs (contd.) Time duration cookie categories Session cookies: exist until client connection ends Persistent cookies: remain indefinitely Electronic commerce sites use both Cookie sources First-party cookies Web server site places them on client computer Third-party cookies Different Web site places them on client computer
  • Slide 20
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 20 Cookies and Web Bugs (contd.) Disable cookies entirely Complete cookie protection Problem Useful cookies blocked (along with others) Full site resources not available Web browser cookie management functions Refuse only third-party cookies Review each cookie before accepted Provided by most Web browsers
  • Slide 21
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 21 FIGURE 10-3 Mozilla Firefox dialog box for managing stored cookies
  • Slide 22
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 22 Cookies and Web Bugs (contd.) Web bug Tiny graphic that third-party Web site places on another sites Web page Purpose Provide a way for a third-party site to place cookie on visitors computer Internet advertising community: Calls Web bugs clear GIFs or 1-by-1 GIFs Graphics created in GIF format Color value of transparent, small as 1 pixel by 1 pixel
  • Slide 23
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 23 Active Content Active content Programs embedded transparently in Web pages Cause action to occur E-commerce example Place items into shopping cart; compute tax and costs Advantages Extends HTML functionality Moves data processing chores to client computer Disadvantages Can damage client computer
  • Slide 24
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 24 Active Content (contd.) Cookies, Java applets, JavaScript, VBScript, ActiveX controls, graphics, Web browser plug-ins, e-mail attachments Scripting languages: provide executable script Examples: JavaScript and VBScript Applet: small application program Typically runs within Web browser Some browsers include tools limiting applets actions Active content modules Embedded in Web pages (invisible)
  • Slide 25
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 25 FIGURE 10-4 Advanced JavaScript settings in Mozilla Firefox
  • Slide 26
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 26 Active Content (contd.) Crackers: embed malicious active content Trojan horse Program hidden inside another program or Web page Masking true purpose May result in secrecy and integrity violations Zombie (Trojan horse) Secretly takes over another computer Launches attacks on other computers Botnet (robotic network, zombie farm) All controlled computers act as an attacking unit
  • Slide 27
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 27 Java Applets Java programming language Developed by Sun Microsystems Widespread use in Web pages: active content Java: platform-independent programming language Provides Web page active content Server sends applets with client-requested pages Most cases: operation visible to visitor Possibility: functions not noticed by visitor
  • Slide 28
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 28 Java Applets (contd.) Advantages Adds functionality to business applications functionality; relieves server-side programs Disadvantage Possible security violations (Trojan horse, zombie)
  • Slide 29
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Java Applets (contd.) Java sandbox Confines Java applet actions to set of rules defined by security model Rules apply to all untrusted Java applets Not established as secure Java applets running within sandbox constraint Does not allow full client system access Prevents secrecy (disclosure) and integrity (deletion or modification) violations 29
  • Slide 30
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 30 JavaScript Scripting language developed by Netscape Enables Web page designers to build active content Based loosely on Suns Java programming language Can be used for attacks Cannot commence execution on its own User must start ill-intentioned JavaScript program
  • Slide 31
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 31 ActiveX Controls ActiveX control Objects containing programs and properties Web designers place on Web pages Component construction Many different programming languages Common: C++ and Visual Basic Run on Windows operating systems computers Executed on client computer like any other program
  • Slide 32
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 32 ActiveX Controls (contd.) Comprehensive ActiveX controls list ActiveX page at Download.com Security danger Execute like other client computer programs Have access to full system resources Cause secrecy, integrity, and necessity violations Actions cannot be halted once started Web browsers Provide notice of Active-X download or install
  • Slide 33
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 33 FIGURE 10-5 ActiveX control download warning dialog box in Internet Explorer
  • Slide 34
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 34 Graphics and Plug-Ins Graphics, browser plug-ins, and e-mail attachments can harbor executable content Graphic: embedded code can harm client computer Browser plug-ins (programs) Enhance browser capabilities Popular plug-ins: Adobe Flash Player, Apples QuickTime Player, Microsoft Silverlight, RealNetworks RealPlayer Can pose security threats 1999 RealPlayer plug-in Plug-ins executing commands buried within media
  • Slide 35
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 35 Viruses, Worms, and Antivirus Software Programs display e-mail attachments by automatically executing associated programs Macro viruses within attached files can cause damage Virus: software Attaches itself to another program Causes damage when host program activated Worm: virus Replicates itself on computers it infects Spreads quickly through the Internet Macro virus Small program (macro) embedded in file
  • Slide 36
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 36 Viruses, Worms, and Antivirus Software (contd.) ILOVEYOU virus (love bug) Spread with amazing speed Infected computers and clogged e-mail systems Replicated itself explosively through Outlook e-mail Caused other harm 2001 Code Red and Nimda: virus-worm combinations Multivector virus: entered computer system in several different ways (vectors) 2002 and 2003: new virus-worm combinations Example: Bugbear
  • Slide 37
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 37 Viruses, Worms, and Antivirus Software (contd.) Antivirus software Detects viruses and worms Either deletes or isolates them on client computer 2005 and 2006 Zotob New breed of Trojan horse-worm combination 2007: Storm virus 2008 and continuing into 2009: Conflicker 2009 and 2010: URLzone and Clampi New viruses designed specifically to hijack users online banking sessions
  • Slide 38
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Viruses, Worms, and Antivirus Software (contd.) 2010: new Trojan horse-worm combination attack Spread through a computer operating system Designed to target industrial equipment German industrial giant Siemens control systems 2011: Zeus and SpyEye combined Targeted bank account information Not visible in Microsoft Windows Task Manager Intercept credit card or online banking data entered in Web browser 38
  • Slide 39
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 39 FIGURE 10-6 Major viruses, worms, and Trojan horses
  • Slide 40
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 40 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)
  • Slide 41
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 41 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)
  • Slide 42
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 42 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)
  • Slide 43
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 43 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)
  • Slide 44
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 44 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued)
  • Slide 45
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Viruses, Worms, and Antivirus Software (contd.) Companies that track viruses, sell antivirus software, provide virus descriptions on Web sites Symantec (Symantec Security Response) McAfee (McAfee Virus Information) Data files must be updated regularly Recognize and eliminate newest viruses Some Web e-mail systems: Provide and update antivirus software Used to scan attachments before downloading Example: Yahoo! Mail 45
  • Slide 46
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 46 Digital Certificates Digital certificate (digital ID) E-mail message attachment or program embedded in Web page Verifies sender or Web site Contains a means to send encrypted message Signed message or code Provides proof of holder identified by the certificate Used for online transactions Electronic commerce, electronic mail, and electronic funds transfers
  • Slide 47
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 47 FIGURE 10-7 Delmar Cengage Learnings digital certificate information displayed in Firefox browser Cengage Learning 2013
  • Slide 48
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 48 Digital Certificates (contd.) Digital certificate for software: Assurance software was created by specific company Does not attest to quality of software Certification authority (CA) Issues digital certificates to organizations, individuals Digital certificates cannot be forged easily Six main elements: owners identifying information, owners public key, dates certificate is valid, serial number, issuer name, issuer digital signature
  • Slide 49
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 49 Digital Certificates (contd.) Key Number: usually long binary number Used with encryption algorithm Lock message characters being protected Longer keys provide better protection Identification requirements vary Drivers license, notarized form, fingerprints Companies offering CA services Thawte, VeriSign, Comodo, DigiCert, Entrust, GeoTrust, RapidSSL.com
  • Slide 50
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 50 Digital Certificates (contd.) Secure Sockets Layer-Extended Validation (SSL-EV) digital certificate Issued after more extensive verification confirmed Annual fees $200 to more than $1500 Digital certificates expire after period of time Provides protection (users and businesses) Must submit credentials for reevaluation periodically
  • Slide 51
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 51 FIGURE 10-8 Internet Explorer address window display for an SSL-EV Web site 51
  • Slide 52
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 52 Steganography Hiding information within another piece of information Can be used for malicious purposes Hiding encrypted file within another file Casual observer cannot detect anything of importance in container file Two-step process Encrypting file protects it from being read Steganography makes it invisible Al Qaeda used steganography to hide attack orders
  • Slide 53
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 53 Physical Security for Clients Client computers Control important business functions Same physical security as early systems New physical security technologies Fingerprint readers (less than $100) Stronger protection than password approaches Biometric security device Identification using element of persons biological makeup Writing pads, eye scanners, palm reading scanners, reading back of hand vein pattern
  • Slide 54
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Client Security for Mobile Devices Security measures Access password Remote wipe: clears all personal data Can be added as an app Capability through corporate e-mail synchronization Antivirus software Rogue apps: contain malware or collect information and forward to perpetrators Apple App Store tests apps before authorizing sales Android Market does less extensive testing Users should not rush to install latest app 54
  • Slide 55
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 55 Communication Channel Security Internet Not designed to be secure Designed to provide redundancy Remains unchanged from original insecure state Message traveling on the Internet Subject to secrecy, integrity, and necessity threats
  • Slide 56
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 56 Secrecy Threats Secrecy Prevention of unauthorized information disclosure Technical issue Requiring sophisticated physical and logical mechanisms Privacy Protection of individual rights to nondisclosure Legal matter
  • Slide 57
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Secrecy Threats (contd.) E-mail message Secrecy violations protected using encryption Protects outgoing messages Privacy issues address whether supervisors are permitted to read employees messages randomly Electronic commerce threat Sensitive or personal information theft Sniffer programs Record information passing through computer or router 57
  • Slide 58
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 58 Secrecy Threats (contd.) Electronic commerce threat (contd.) Backdoor: electronic holes Left open accidentally or intentionally Content exposed to secrecy threats Example: Cart32 shopping cart program backdoor Stolen corporate information Eavesdropper example Web users continually reveal information Secrecy breach Possible solution: anonymous Web surfing
  • Slide 59
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 59 Integrity Threats Also known as active wiretapping Unauthorized party alters message information stream Integrity violation example Cybervandalism Electronic defacing of Web site Masquerading (spoofing) Pretending to be someone else Fake Web site representing itself as original
  • Slide 60
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 60 Integrity Threats (contd.) Domain name servers (DNSs) Internet computers maintaining directories Linking domain names to IP addresses Perpetrators use software security hole Substitute their Web site address in place of real one Spoofs Web site visitors Phishing expeditions Capture confidential customer information Common victims Online banking, payment system users
  • Slide 61
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 61 Necessity Threats Also known as delay, denial, denial-of-service (DoS) attack Disrupt or deny normal computer processing Intolerably slow-speed computer processing Renders service unusable or unattractive Distributed denial-of-service (DDoS) attack Launch simultaneous attack on a Web site via botnets DoS attacks Remove information altogether Delete transmission or file information
  • Slide 62
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 62 Necessity Threats (contd.) Denial attack examples: Quicken accounting program diverted money to perpetrators bank account High-profile electronic commerce company received flood of data packets Overwhelmed sites servers Choked off legitimate customers access
  • Slide 63
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 63 Threats to the Physical Security of Internet Communications Channels Internets packet-based network design: Precludes it from being shut down By attack on single communications link Individual users Internet service can be interrupted Destruction of users Internet link Larger companies, organizations Use more than one link to main Internet backbone
  • Slide 64
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 64 Threats to Wireless Networks Wireless Encryption Protocol (WEP) Rule set for encrypting transmissions from the wireless devices to the wireless access points (WAPs) Wardrivers Attackers drive around in cars Search for accessible networks Warchalking Place chalk mark on building Identifies easily entered wireless network nearby Web sites include wireless access locations maps
  • Slide 65
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 65 Threats to Wireless Networks (contd.) Preventing attacks by wardrivers Turn on WEP Change default login and password settings Example Best Buy wireless point-of-sale (POS) Failed to enable WEP Customer launched sniffer program Intercepted data from POS terminals
  • Slide 66
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 66 Encryption Solutions Encryption: coding information using mathematically based program, secret key Cryptography: science studying encryption Science of creating messages only sender and receiver can read Steganography Makes text undetectable to naked eye Cryptography converts text to other visible text With no apparent meaning
  • Slide 67
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Encryption Solutions (contd.) Encryption algorithms Encryption program Transforms normal text (plain text) into cipher text (unintelligible characters string) Encryption algorithm Logic behind encryption program Includes mathematics to do transformation Decryption program Encryption-reversing procedure: message is decoded or decrypted 67
  • Slide 68
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 68 Encryption Solutions (contd.) Encryption algorithms (contd.) National Security Agency controls dissemination U.S. government banned publication of details Illegal for U.S. companies to export Encryption algorithm property May know algorithm details Unable to decipher encrypted message without knowing key encrypting the message Key type subdivides encryption into three functions Hash coding, asymmetric encryption, symmetric encryption
  • Slide 69
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 69 Encryption Solutions (contd.) Hash coding Process uses Hash algorithm Calculates number (hash value) from any length message Unique message fingerprint Good hash algorithm design Probability of collision is extremely small (two different messages resulting in same hash value) Determining message alteration during transit Mismatch between original hash value and receiver computed value
  • Slide 70
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 70 Encryption Solutions (contd.) Asymmetric encryption (public-key encryption) Encodes messages using two mathematically related numeric keys Public key: one key freely distributed to public Encrypt messages using encryption algorithm Private key: second key belongs to key owner Kept secret Decrypt all messages received
  • Slide 71
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 71 Encryption Solutions (contd.) Pretty Good Privacy (PGP) Software tools using different encryption algorithms Perform public key encryption Individuals download free versions PGP Corporation site, PGP International site Encrypt e-mail messages Sells business site licenses
  • Slide 72
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 72 Encryption Solutions (contd.) Symmetric encryption (private-key encryption) Encodes message with one of several available algorithms Single numeric key to encode and decode data Message receiver must know the key Very fast and efficient encoding and decoding Key must be guarded
  • Slide 73
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 73 Encryption Solutions (contd.) Problems Difficult to distribute new keys to authorized parties while maintaining security, control over keys Private keys do not work well in large environments Data Encryption Standard (DES) Encryption algorithms adopted by U.S. government Most widely used private-key encryption system Fast computers break messages encoded with smaller keys
  • Slide 74
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 74 Encryption Solutions (contd.) Triple Data Encryption Standard (Triple DES, 3DES) Stronger version of Data Encryption Standard Advanced Encryption Standard (AES) Alternative encryption standard Most government agencies use today Longer bit lengths increase difficulty of cracking keys
  • Slide 75
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 75 Encryption Solutions (contd.) Comparing asymmetric and symmetric encryption systems Advantages of public-key (asymmetric) systems Small combination of keys required No problem in key distribution Implementation of digital signatures possible Disadvantages of public-key systems Significantly slower than private-key systems Public-key systems: complement rather than replace private-key systems
  • Slide 76
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 76 FIGURE 10-9 Comparison of (a) hash coding, (b) private-key, and (c) public-key encryption Cengage Learning 2013
  • Slide 77
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 77 Encryption Solutions (contd.) Web servers accommodate encryption algorithms Must communicate with variety of Web browsers Secure Sockets Layer (SSL) Goal: secures connections between two computers Secure Hypertext Transfer Protocol (S-HTTP) Goal: send individual messages securely
  • Slide 78
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 78 Encryption Solutions (contd.) Secure sockets layer (SSL) protocol Provides security handshake Client and server exchange brief burst of messages All communication encoded Eavesdropper receives unintelligible information Secures many different communication types HTTP, FTP, Telnet HTTPS: protocol implementing SSL Precede URL with protocol name HTTPS
  • Slide 79
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Encryption Solutions (contd.) Encrypted transaction generates private session key Bit lengths vary (40-bit, 56-bit, 128-bit, 168-bit) Session key Used by encryption algorithm Creates cipher text from plain text during single secure session Secrecy implemented using public-key and private- key encryption Private-key encryption for nearly all communications 79
  • Slide 80
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 80 FIGURE 10-10 Establishing an SSL session Cengage Learning 2013
  • Slide 81
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Encryption Solutions (contd.) After secure session established: Public-key encryption no longer used Message transmission protected by private-key encryption Session key (private key) discarded when session ends Each new connection between client and secure server requires entire process: Beginning with handshake 81
  • Slide 82
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 82 Encryption Solutions (contd.) Secure HTTP (S-HTTP) Extension to HTTP providing security features Client and server authentication, spontaneous encryption, request/response nonrepudiation Symmetric encryption for secret communications Public-key encryption to establish client/server authentication Session negotiation: process between client and server of proposing and accepting (or rejecting) various transmission conditions
  • Slide 83
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 83 Encryption Solutions (contd.) Establishing secure session SSL carries out client-server handshake exchange to set up secure communication S-HTTP sets up security details with special packet headers exchanged in S-HTTP Headers define security technique type Header exchanges state: Which specific algorithms that each side supports Whether client or server (or both) supports algorithm Whether security technique required, optional, refused
  • Slide 84
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 84 Encryption Solutions (contd.) Secure envelope (complete package) Encapsulates message Provides secrecy, integrity, and client/server authentication SSL has become: More generally accepted standard over S-HTTP
  • Slide 85
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 85 Using a Hash Function to Create a Message Digest Integrity violation Message altered while in transit Difficult and expensive to prevent Security techniques to detect Harm: unauthorized message changes undetected Apply two algorithms to eliminate fraud and abuse Hash algorithm Message digest Number summarizing encrypted information
  • Slide 86
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 86 Converting a Message Digest into a Digital Signature Hash functions: potential for fraud Solution: sender encrypts message digest using private key Digital signature Encrypted message digest (message hash value) Digital signature provides: Integrity, nonrepudiation, and authentication Provide transaction secrecy Encrypt entire string (digital signature, message) Digital signatures: same legal status as traditional signatures
  • Slide 87
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 87 FIGURE 10-11 Sending and receiving a digitally signed message Cengage Learning 2013
  • Slide 88
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 88 Security for Server Computers Server vulnerabilities Exploited by anyone determined to cause destruction or acquire information illegally Entry points Web server and its software Any back-end programs containing data No system is completely safe Web server administrator Ensures security policies documented; considered in every electronic commerce operation
  • Slide 89
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 89 Web Server Threats Compromise of secrecy By allowing automatic directory listings Solution: turn off folder name display feature Sensitive file on Web server Holds Web server username-password pairs Solution: store authentication information in encrypted form
  • Slide 90
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 90 Web Server Threats (contd.) Passwords that users select Easily guessable Dictionary attack programs cycle through electronic dictionary, trying every word as password Solutions User password requirements Use password assignment software to check user password against dictionary Help creating very strong passwords: Gibson Research Corporations Ultra High Security Password Generator
  • Slide 91
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 91 Cengage Learning 2013 FIGURE 10-12 Examples of passwords, from very weak to very strong
  • Slide 92
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 92 Database Threats Usernames and passwords Stored in unencrypted table Database fails to enforce security altogether Relies on Web server to enforce security Unauthorized users Masquerade as legitimate database users Trojan horse programs hide within database system Reveal information Remove all access controls within database
  • Slide 93
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 93 Other Programming Threats Java or C++ programs executed by server Passed to Web servers by client Reside on server Use a buffer Memory area set aside holding data read from file or database Buffer overrun (buffer overflow) error Programs filling buffers malfunction and overfill buffer Excess data spilled outside designated buffer memory Cause: error in program or intentional 1998 Internet worm
  • Slide 94
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 94 Other Programming Threats (contd.) Insidious version of buffer overflow attack Writes instructions into critical memory locations Web server resumes execution by loading internal registers with address of attacking programs code Reducing potential buffer overflow damage Good programming practices Some hardware functionality Mail bomb attack Hundreds (thousands) send message to particular address
  • Slide 95
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 95 Threats to the Physical Security of Web Servers Protecting Web servers Put computers in commerce service provider (CSP) facility Very high-level physical security on CSP Maintain server contents backup copies at remote location Rely on service providers Offer managed services including Web server security Hire smaller, specialized security service providers
  • Slide 96
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Access Control and Authentication Controlling who and what has access to Web server Authentication Identity verification of entity requesting computer access Server user authentication Server must successfully decrypt users digital signature-contained certificate Server checks certificate timestamp Server uses callback system Certificates authenticate client computers and their users 96
  • Slide 97
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Access Control and Authentication (contd.) Usernames and passwords Provide some protection element Maintain usernames in plain text Encrypt passwords with one-way encryption algorithm Problem Site visitor may save username and password as a cookie Might be stored in plain text Access control list (ACL) Restrict file access to selected users 97
  • Slide 98
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 98 Firewalls Firewall Software, hardware-software combination Installed in a network to control packet traffic Placed at Internet entry point of network Defense between network and the Internet Between network and any other network Principles All traffic must pass through it Only authorized traffic allowed to pass Immune to penetration
  • Slide 99
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 99 Firewalls (contd.) Trusted: networks inside firewall Untrusted: networks outside firewall Filter permits selected messages though network Separate corporate networks from one another Coarse need-to-know filter Firewalls segment corporate network into secure zones Large organizations with multiple sites Install firewall at each location All locations follow same security policy
  • Slide 100
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 100 Firewalls (contd.) Should be stripped of unnecessary software Packet-filter firewalls Examine all data flowing back and forth between trusted network (within firewall) and the Internet Gateway servers Filter traffic based on requested application Limit access to specific applications Telnet, FTP, HTTP Proxy server firewalls Communicate with the Internet on private networks behalf
  • Slide 101
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 101 Firewalls (contd.) Perimeter expansion problem Computers outside traditional physical site boundary Servers under almost constant attack Install intrusion detection systems Monitor server login attempts Analyze for patterns indicating cracker attack Block further attempts originating from same IP address Cloud computing: firewall products lagging behind Personal firewalls Software-only firewalls on individual client computers Gibson Research Shields Up! Web site
  • Slide 102
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Organizations that Promote Computer Security Following the Internet Worm of 1988 Organizations formed to share information About threats to computer systems Principle followed Sharing information about attacks and defenses for attacks Helps everyone create better computer security 102
  • Slide 103
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 103 CERT Computer Emergency Response Team Housed at Carnegie Mellon University Software Engineering Institute Maintains effective, quick communications infrastructure among security experts Security incidents avoided, handled quickly Provides security risk information Posts security event alerts Primary authoritative source for viruses, worms, and other types of attack information
  • Slide 104
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Other Organizations 1989: System Administrator, Audit, Network and Security (SANS) Institute Education and research efforts Research reports, security alerts, and white papers SANS Internet Storm Center Web site Current information on location, intensity of computer attacks worldwide CERIAS (Center for Education and Research in Information Assurance and Security) Multidisciplinary information security research and education 104
  • Slide 105
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 105 Other Organizations (contd.) Center for Internet Security Not-for-profit cooperative organization Helps electronic commerce companies CSO Online Articles from CSO Magazine Computer security-related news items Infosecurity.com Articles about all types of online security issues
  • Slide 106
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition 106 Computer Forensics and Ethical Hacking Computer forensics experts (ethical hackers) Computer sleuths hired to probe PCs Locate information usable in legal proceedings Job of breaking into client computers Computer forensics field Responsible for collection, preservation, and computer-related evidence analysis Companies hire ethical hackers to test computer security safeguards
  • Slide 107
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Summary Physical and logical computer security important in electronic commerce Security policy can identify risks and countermeasures to reduce risks Key security provisions Secrecy, integrity, available service Client threats and solutions Virus threats, active content threats, cookies Communication channels threats and solutions Encryption provides secrecy 107
  • Slide 108
  • 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the U.S. Edition. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part. E-Business, Tenth Edition Summary (contd.) Web Server threats and solutions Threats from programs, backdoors Security organizations Share information about threats, defenses Computer forensics Break into computers searching for legal use data Assist in identifying security weaknesses 108