Top Banner
E-Commerce Security and Fraud Protection
27

E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Oct 26, 2014

Download

Documents

Trisha86

Turban Text Chapter 9 Powerpoint
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

E-Commerce Security and Fraud Protection

Page 2: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Learning Objectives1. Understand the importance and scope of security of

information systems for EC.2. Describe the major concepts and terminology of EC

security.3. Learn about the major EC security threats,

vulnerabilities, and technical attacks.4. Understand Internet fraud, phishing, and spam.5. Describe the information assurance security

principles.6. Identify and assess major technologies and methods

for securing EC access and communications.

9-2Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 3: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Learning Objectives7. Describe the major technologies for protection of EC

networks.8. Describe various types of controls and special

defense mechanisms.9. Describe consumer and seller protection from fraud.10.Describe the role of business continuity and disaster

recovery planning.11.Discuss EC security’s enterprisewide

implementation issues.12.Understand why it is not possible to stop computer

crimes.

9-3Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 4: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Information Security Probleminformation security

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction

9-4Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 5: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Information Security ProblemTHE DRIVERS OF EC SECURITY

PROBLEMSThe Internet’s Vulnerable Design

Domain Name System (DNS)Translates (converts) domain names to their numeric IP addresses

IP addressAn address that uniquely identifies each computer connected to a network or the Internet

The Shift to Profit-Induced Crimes

9-5Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 6: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Internet Architecture

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-6

Page 7: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The DNS System

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-7

Page 8: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Information Security ProblemInternet underground economy

E-markets for stolen information made up of thousands of websites that sell credit card numbers, social security numbers, other data such as numbers of bank accounts, social network IDs, passwords, and much more keystroke logging (keylogging)

A method of capturing and recording user keystrokesThe Dynamic Nature of EC Systems and the Role of

InsidersWHY IS AN E-COMMERCE SECURITY STRATEGY

NEEDED?The Computer Security Strategy Dilemma

9-8Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 9: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Basic E-Commerce Security Issues and Landscape

riskThe probability that a vulnerability will be known and used

social engineeringA type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network

spamThe electronic equivalent of junk mail

9-9Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 10: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Basic E-Commerce Security Issues and Landscape

EC Security Requirements authentication

Process to verify (assure) the real identity of an individual, computer, computer program, or EC website

authorizationProcess of determining what the authenticated entity is allowed to access and what operations it is allowed to perform

Auditing Availability nonrepudiation

Assurance that online customers or trading partners cannot falsely deny (repudiate) their purchase or transaction

9-10Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 11: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

9-11Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 12: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

9-12Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 13: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Information Assurance Model and Defense Strategy

CIA security triad (CIA triad)Three security concepts important to information on the Internet: confidentiality, integrity, and availabilityconfidentiality

Assurance of data privacy and accuracy; keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes

9-13Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 14: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Information Assurance Model and Defense Strategy

integrityAssurance that stored data has not been modified without authorization; a message that was sent is the same message as that which was received

availabilityAssurance that access to data, the website, or other EC data service is timely, available, reliable, and restricted to authorized users

9-14Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 15: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Information Assurance Model and Defense Strategy

AUTHENTICATION, AUTHORIZATION, AND NONREPUDIATION

9-15Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 16: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Defense I: Access Control, Encryption, and PKI

symmetric (private) key encryptionAn encryption system that uses the same key to encrypt and decrypt the message

Data Encryption Standard (DES)The standard symmetric encryption algorithm supported by the NIST and used by U.S. government agencies until October 2000

9-16Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 17: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Defense I: Access Control, Encryption, and PKI

public key infrastructure (PKI)A scheme for securing e-payments using public key encryption and various technical componentspublic (asymmetric) key encryption

Method of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa

public keyEncryption code that is publicly available to anyone

private keyEncryption code that is known only to its owner

9-17Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 18: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Defense II: Securing E-Commerce Networkshoneynet

A network of honeypotshoneypot

Production system (e.g., firewalls, routers, Web servers, database servers) that looks like it does real work, but that acts as a decoy and is watched to study how network intrusions occur

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-18

Page 19: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms

general controlsControls established to protect the system regardless of the specific application; for example, protecting hardware and controlling access to the data center are independent of the specific application

application controlsControls that are intended to protect specific applications

9-19Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 20: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

9-20Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 21: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

The Defense III: General Controls, Internal Controls, Compliance, and Other Defense Mechanisms

GENERAL, ADMINISTRATIVE, AND OTHER CONTROLSPhysical ControlsAdministrative Controls

APPLICATION CONTROLS AND INTELLIGENT AGENTSintelligent agents

Software applications that have some degree of reactivity, autonomy, and adaptability—as is needed in unpredictable attack situations; an agent is able to adapt itself based on changes occurring in its environment

9-21Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 22: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Business Continuity, Disaster Recovery,Security Auditing, and Risk Management

BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNINGdisaster avoidance

An approach oriented toward prevention, the idea is to minimize the chance of avoidable disasters (such as fire or other human-caused threats)

9-22Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 23: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

9-23Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 24: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Managerial Issues1. What is the best EC security strategy for my

company?2. Is the budget for EC security adequate?3. What steps should businesses follow in

establishing a security plan?4. Should organizations be concerned with

internal security threats?5. What is the key to establishing strong e-

commerce security?

9-24Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 25: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Summary1. The key to establishing strong e-commerce

security2. Basic EC security issues and terminology3. Threats, vulnerabilities, and technical

attacks4. Internet fraud, phishing, and spam5. Information assurance6. Securing EC access control and

communications

9-25Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 26: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Summary7. Technologies for protecting networks.8. The different controls and special defense

mechanisms.9. Protecting from fraud.10.Role of business continuity and disaster

recovery planning.11.Enterprisewide EC security.12.Why is it impossible to stop computer

crimes?

9-26Copyright © 2012 Pearson Education, Inc.

Publishing as Prentice Hall

Page 27: E-Commerce Security and Fraud Protection E-Commerce Security and Fraud Protection

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9-27

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,

mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.

Copyright © 2012 Pearson Education, Inc.  Copyright © 2012 Pearson Education, Inc.  Publishing as Prentice HallPublishing as Prentice Hall