




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、E-Commerce 2017: Business. Technology. Society.Thirteenth EditionChapter 5E-Commerce Security and Payment SystemsE-Commerce 2017: Business. TecLearning Objectives5.1 Understand the scope of e-commerce crime and security problems, the key dimensions of e-commerce security, and the tension between sec
2、urity and other values.5.2 Identify the key security threats in the e-commerce environment.5.3 Describe how technology helps secure Internet communications channels and protect networks, servers, and clients.5.4 Appreciate the importance of policies, procedures, and laws in creating security.5.5 Ide
3、ntify the major e-commerce payment systems in use today.5.6 Describe the features and functionality of electronic billing presentment and payment systems.Learning Objectives5.1 UnderstCyberwar: M A D 2.0Class DiscussionWhat is the difference between hacking and cyberwar? Why has cyberwar become pote
4、ntially more devastating in the past decade?Is it possible to find a political solution to M A D 2.0?What damage can be done by cyberweapons like Flame and Snake?Cyberwar: M A D 2.0Class DiscuThe E-Commerce Security EnvironmentOverall size and losses of cybercrime unclearReporting issues2016 survey:
5、 Average total cost of data breach to U.S. corporations was $4 millionLow-cost web attack kitsOnline credit card fraudUnderground economy marketplaceThe E-Commerce Security EnviroWhat Is Good E-Commerce Security?To achieve highest degree of securityNew technologiesOrganizational policies and procedu
6、resIndustry standards and government lawsOther factorsTime value of moneyCost of security vs. potential lossSecurity often breaks at weakest linkWhat Is Good E-Commerce SecuriFigure 5.1 The E-Commerce Security EnvironmentFigure 5.1 The E-Commerce SecuTable 5.3 Customer and Merchant Perspectives on t
7、he Different Dimensions of E-Commerce Security (1 of 2)DimensionCustomers PerspectiveMerchants PerspectiveIntegrityHas information I transmitted orreceived been altered?Has data on the site been altered without authorization? Is data being received from customers valid?NonrepudiationCan a party to a
8、n action with me later deny taking the action?Can a customer deny ordering products?AuthenticityWho am I dealing with? How can I be assured that the person or entity is who they claim to be?What is the real identity of the customer?Table 5.3 Customer and MerchanTable 5.3 Customer and Merchant Perspe
9、ctives on the Different Dimensions of E-Commerce Security (2 of 2)DimensionCustomers PerspectiveMerchants PerspectiveConfidentialityCan someone other than the intended recipient read my messages?Are messages or confidential data accessible to anyone other than those authorized to view them?PrivacyCa
10、n I control the use of information about myself transmitted to ane-commerce merchant?What use, if any, can be made of personal data collected as part of an e-commerce transaction? Is the personal information of customers being used in an unauthorized manner?AvailabilityCan I get access to the site?I
11、s the site operational?Table 5.3 Customer and MerchanThe Tension Between Security and Other ValuesEase of useThe more security measures added, the more difficult a site is to use, and the slower it becomesPublic safety and criminal uses of the InternetUse of technology by criminals to plan crimes or
12、 threaten nation-stateThe Tension Between Security aSecurity Threats in the E-Commerce EnvironmentThree key points of vulnerability in e-commerce environment:ClientServerCommunications pipeline (Internet communications channels)Security Threats in the E-CommFigure 5.2 A Typical E-Commerce Transactio
13、nFigure 5.2 A Typical E-CommercFigure 5.3 Vulnerable Points in an E-Commerce TransactionFigure 5.3 Vulnerable Points iMalicious CodeExploits and exploit kitsMaladvertisingDrive-by downloadsVirusesWormsRansomware (scareware)Trojan horsesBackdoorsBots, botnetsMalicious CodeExploits and expPotentially
14、Unwanted ProgramsBrowser parasitesMonitor and change users browserAdwareUsed to call pop-up adsSpywareTracks users keystrokes, e-mails, I M s, etc.Potentially Unwanted ProgramsBPhishingAny deceptive, online attempt by a third party to obtain confidential information for financial gainTacticsSocial e
15、ngineeringE-mail scamsSpear phishingUsed for identity fraud and theftPhishingAny deceptive, online Hacking, Cybervandalism, and HacktivismHackingHackers vs. crackersWhite hats, black hats, grey hatsTiger teamsGoals: cybervandalism, data breachesCybervandalism:Disrupting, defacing, destroying website
16、HacktivismHacking, Cybervandalism, and HData BreachesWhen organizations lose control over corporate information to outsidersNine mega-breaches in 2015Leading causesHackingEmployee error/negligenceAccidental e-mail/Internet exposureInsider theftData BreachesWhen organizationInsight on Society: The As
17、hley Madison Data BreachClass DiscussionWhat organizational and technological failures led to the data breach at Ashley Madison?What technical solutions are available to combat data breaches?Have you or anyone you know experienced a data breach?Insight on Society: The AshleyCredit Card Fraud/TheftSt
18、olen credit card incidences about 0.8% of all online card transactionsHacking and looting of corporate servers is primary causeCentral security issue: establishing customer identityE-signaturesMulti-factor authenticationFingerprint identificationCredit Card Fraud/TheftStolen Identity Fraud/TheftUnau
19、thorized use of another persons personal data for illegal financial benefitSocial security numberDrivers licenseCredit card numbersUsernames/passwords2015: 13 million U.S. consumers suffered identity fraudIdentity Fraud/TheftUnauthorizSpoofing, Pharming, and Spam (Junk) WebsitesSpoofingAttempting to
20、 hide true identity by using someone elses e-mail or I P addressPharmingAutomatically redirecting a web link to a different address, to benefit the hackerSpam (junk) websitesOffer collection of advertisements for other sites, which may contain malicious codeSpoofing, Pharming, and Spam (Sniffing and
21、 Man-In-The-Middle AttacksSnifferEavesdropping program monitoring networksCan identify network trouble spotsCan be used by criminals to steal proprietary informationE-mail wiretapsRecording e-mails at the mail server levelMan-in-the-middle attackAttacker intercepts and changes communication between
22、two parties who believe they are communicating directlySniffing and Man-In-The-MiddleDenial of Service (D o S) and Distributed Denial of Service (D D o S) AttacksDenial of service (D o S) attackFlooding website with pings and page requestsOverwhelm and can shut down sites web serversOften accompanie
23、d by blackmail attemptsBotnetsDistributed Denial of Service (D D o S) attackUses hundreds or thousands of computers to attack target networkCan use devices from Internet of Things, mobile devicesD D o S smokescreeningDenial of Service (D o S) and Insider AttacksLargest threat to business institution
24、s come from insider embezzlementEmployee access to privileged informationPoor security proceduresInsiders more likely to be source of cyberattacks than outsidersInsider AttacksLargest threat Poorly Designed SoftwareIncrease in complexity of and demand for software has led to increase in flaws and vu
25、lnerabilitiesS Q L injection attacksZero-day vulnerabilityHeartbleed bugPoorly Designed SoftwareIncreaSocial Network Security IssuesSocial networks an environment for: Viruses, site takeovers, identity fraud, malware-loaded apps, click hijacking, phishing, spamManual sharing scamsSharing of files th
26、at link to malicious sitesFake offerings, fake Like buttons, and fake appsSocial Network Security IssuesMobile Platform Security IssuesLittle public awareness of mobile device vulnerabilities2015 survey: 3 million apps of 10 million are malwareVishingSmishingS M S spoofingMadwareMobile Platform Secu
27、rity IssueInsight on Technology: Think Your Smartphone Is Secure?Class DiscussionWhich mobile operating system do you think is more secure Apples i O S or Googles Android?What steps, if any, do you take to make your smartphone more secure?What qualities of apps make them a vulnerable security point
28、in smartphone use?Insight on Technology: Think YCloud Security IssuesD D o S attacksInfrastructure scanningLower-tech phishing attacks yield passwords and accessUse of cloud storage to connect linked accountsLack of encryption and strong security proceduresCloud Security IssuesD D o S aInternet of T
29、hings Security IssuesChallenging environment to protectVast quantity of interconnected linksNear identical devices with long service livesMany devices have no upgrade featuresLittle visibility into workings, data, or securityInternet of Things Security IsTechnology SolutionsProtecting Internet commu
30、nicationsEncryptionSecuring channels of communicationS S L, T L S, V P N s, Wi-Fi Protecting networksFirewalls, proxy servers, I D S, I P SProtecting servers and clients O S security, anti-virus softwareTechnology SolutionsProtectingFigure 5.5 Tools Available to Achieve Site SecurityFigure 5.5 Tools
31、 Available to EncryptionTransforms data into cipher text readable only by sender and receiverSecures stored information and information transmissionProvides 4 of 6 key dimensions of e-commerce security: Message integrityNonrepudiationAuthenticationConfidentialityEncryptionTransforms data intoSymmetr
32、ic Key CryptographySender and receiver use same digital key to encrypt and decrypt messageRequires different set of keys for each transactionStrength of encryption: Length of binary key Data Encryption Standard (D E S)Advanced Encryption Standard (A E S)Other standards use keys with up to 2,048 bits
33、Symmetric Key CryptographySendPublic Key CryptographyUses two mathematically related digital keys Public key (widely disseminated) Private key (kept secret by owner)Both keys used to encrypt and decrypt messageOnce key used to encrypt message, same key cannot be used to decrypt messageSender uses re
34、cipients public key to encrypt message; recipient uses private key to decrypt itPublic Key CryptographyUses twFigure 5.6 Public Key Cryptography: A Simple CaseFigure 5.6 Public Key CryptogrPublic Key Cryptography Using Digital Signatures and Hash DigestsSender applies a mathematical algorithm (hash
35、function) to a message and then encrypts the message and hash result with recipients public keySender then encrypts the message and hash result with senders private keycreating digital signaturefor authenticity, nonrepudiation Recipient first uses senders public key to authenticate message and then
36、the recipients private key to decrypt the hash result and messagePublic Key Cryptography Using Figure 5.7 Public Key Cryptography with Digital SignaturesFigure 5.7 Public Key CryptogrDigital EnvelopesAddress weaknesses of:Public key cryptographyComputationally slow, decreased transmission speed, inc
37、reased processing timeSymmetric key cryptographyInsecure transmission linesUses symmetric key cryptography to encrypt document Uses public key cryptography to encrypt and send symmetric keyDigital EnvelopesAddress weaknFigure 5.8 Creating a Digital EnvelopeFigure 5.8 Creating a Digital Digital Certi
38、ficates and Public Key Infrastructure (P K I)Digital certificate includes:Name of subject/companySubjects public keyDigital certificate serial numberExpiration date, issuance dateDigital signature of C APublic Key Infrastructure (P K I): CAs and digital certificate proceduresP G PDigital Certificate
39、s and PubliFigure 5.9 Digital Certificates and Certification AuthoritiesFigure 5.9 Digital CertificateLimitations of P K IDoes not protect storage of private keyP K I not effective against insiders, employeesProtection of private keys by individuals may be haphazardNo guarantee that verifying comput
40、er of merchant is secureC A s are unregulated, self-selecting organizationsLimitations of P K IDoes not pSecuring Channels of CommunicationSecure Sockets Layer (S S L)/Transport Layer Security (T L S) Establishes secure, negotiated clientserver sessionVirtual Private Network (V P N) Allows remote us
41、ers to securely access internal network via the InternetWireless (Wi-Fi) networksW P A2Securing Channels of CommunicaFigure 5.10 Secure Negotiated Sessions Using S S L/T L SFigure 5.10 Secure Negotiated Protecting NetworksFirewallHardware or software that uses security policy to filter packetsPacket
42、 filtersApplication gatewaysNext-generation firewallsProxy servers (proxies)Software servers that handle all communications from or sent to the InternetIntrusion detection systemsIntrusion prevention systemsProtecting NetworksFirewallFigure 5.11 Firewalls and Proxy ServersFigure 5.11 Firewalls and P
43、roxProtecting Servers and ClientsOperating system security enhancementsUpgrades, patchesAnti-virus software Easiest and least expensive way to prevent threats to system integrityRequires daily updatesProtecting Servers and ClientsManagement Policies, Business Procedures, and Public LawsWorldwide, co
44、mpanies spend more than $81 billion on security hardware, software, servicesManaging risk includes:TechnologyEffective management policiesPublic laws and active enforcementManagement Policies, Business A Security Plan: Management PoliciesRisk assessmentSecurity policyImplementation planSecurity orga
45、nizationAccess controlsAuthentication procedures, including biometricsAuthorization policies, authorization management systemsSecurity auditA Security Plan: Management PoFigure 5.12 Developing an E-Commerce Security PlanFigure 5.12 Developing an E-CoThe Role of Laws and Public PolicyLaws that give a
46、uthorities tools for identifying, tracing, prosecuting cybercriminals:U S A Patriot ActHomeland Security ActPrivate and private-public cooperationU S-C E R TC E R T Coordination CenterGovernment policies and controls on encryption softwareO E C D, G7/G8, Council of Europe, Wassener ArrangementThe Ro
47、le of Laws and Public PoE-Commerce Payment SystemsIn U.S., credit and debit cards are primary online payment methodsOther countries have different systems Online credit card purchasing cycleCredit card e-commerce enablersLimitations of online credit card paymentSecurity, merchant riskCostSocial equityE-Commerce Payment SystemsIn UFigure 5.14 How an Online Credit Transaction WorksFigure 5.14 How an Online CredAlternat
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 企业消防培训合同范例
- “家国情怀”培养视域下人教版和统编版高中历史教材变化研究
- 共享公寓转让合同范例
- 加工类技术合同范本
- 个人项目合作合同范例
- 保姆用人合同范例
- 借款消费合同范例
- 东鹏控股合同范例
- 中介拆迁合同范例
- 企业花艺服务合同范例
- 甘肃省平凉市各县区乡镇行政村村庄村名明细及行政区划代码
- 2022年大梦杯福建省初中数学竞赛试题参考答案及评分标准
- 边坡开挖施工要求
- 数字图像处理-6第六章图像去噪课件
- 部编版六年级下册语文教案(全册)
- 2022年湖北成人学士学位英语真题及答案
- DB43∕T 801-2013 二次张拉低回缩钢绞线竖向预应力短索锚固体系设计、施工和验收规范
- 附表1:网络及信息安全自查表
- 公共场所健康证体检表
- 普通高等学校独立学院教育工作合格评估指标体系(第六稿)
- 多维阅读第13级—A Stolen Baby 小猩猩被偷走了
评论
0/150
提交评论