Top Banner
Security Threats and Protection Mechanisms
44

Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Mar 28, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Security

Threats and Protection Mechanisms

Page 2: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Learning Objectives

Internet security issues (intellectual property rights, client, communication channels, servers)

Specific security objectives for protecting Web business assets and customer privacy

How to protect: clients, data in transit, server computers.

Organizations that promote computer, network, and Internet security

Page 3: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Security Overview

Computer security is the protection of assets from unauthorized access, use, alteration, or destruction

Two types of security:• Physical security• Logical security

Vocabulary: Any act or object that poses a danger to computer

assets is known as a threat Countermeasure is a procedure that recognizes,

reduces, or eliminates a threat An eavesdropper is a person or device that can listen

in on and copy Internet transmissions

Page 4: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Aspects of Security

Three computer security categories: • Secrecy• Integrity• Availability

Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source

Integrity refers to preventing unauthorized data modification

Necessity refers to preventing data delays or denials

Page 5: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Risk Management

The risk management model shows four general actions to take according to the severity of a threat

Page 6: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Security Policy

A security policy is a written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not

The first step an organization must take in creating a security policy is to determine what assets to protect and from whom

Specific elements of a security policy address the following points:

• Authentication and access control• Secrecy and data integrity• Audit• Procedures

Page 7: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Security elements in e-commerce

There are three elements in e-commerce transactions• Client• Communication channel• Server

• Each element must be protected• Each element has its own

requirements and special characteristics

Page 8: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Threats to the Client

Active web content, i.e. non-static pages which contain instructions which execute in the client (for example: ActiveX, Java Applets, JavaScript, other plug-ins)

Systems software bugs (e.g. Microsoft RPC bugs have allowed the proliferation of the Blaster worm)

Software application bugs (e.g. Microsoft Outlook bugs can be exploited by viruses)

Result: Unauthorized access or control of the client

Page 9: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

ActiveX Controls

ActiveX is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks

ActiveX controls run only on computers running Windows and only on browsers that support them

Because ActiveX controls have full access to client computers they can cause secrecy, integrity, or necessity violations

Page 10: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,
Page 11: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Java Applets

Java adds functionality to business applications and can handle transactions and a wide variety of actions on the client computer

The Java sandbox confines Java applet actions to a set of rules defined by the security model

These rules apply to all untrusted Java applets Bugs in the Java VM can cause security

compromises

Page 12: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

JavaScript

JavaScript is a scripting language that enables Web page designers to build active content

Errors in JavaScript implementations can invoke privacy and integrity attacks

JavaScript programs do not operate under the restrictions of the Java sandbox security model

Page 13: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Other Active Content

Plug-ins are programs that interpret or execute instructions embedded in downloaded graphics, sounds, and other objects

Popular plug-ins include Macromedia Flash, Microsoft Media Player and Apple Quicktime.

Active content, including all forms, enables Web pages to take action

Plug-ins perform their duties by executing commands buried within the media they are manipulating

Although active content gives life to static Web pages it also introduces unique challenges for protecting the client

Page 14: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Viruses

A virus is software that attaches itself to another file and can executes when host program is activated thus bypassing normal authorization controls

E.g. a MS Word macro virus is coded as a small program and is embedded in a Word document

Viruses can take any number of actions e.g. email everyone in the address book or make phone calls

Viruses often use application software bugs

Page 15: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Client compromises

Clients can be compromised by exploiting system software bugs to take over computers

A Trojan horse is a program hidden inside another program or Web page that masks its true purpose

A worm is a program that has the instructions to look for and capture other computers on the net after infecting one

A zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers

Page 16: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Threats to the Communication Channel

The Internet is the medium over which e-commerce data is transferred

Messages on the Internet travel a random path from a source node to a destination node

The content of messages is not protected and anyone on the message path can record its contents

If communication is sensitive additional measures must be taken to protect the data

This is a core requirement for e-commerce

Page 17: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Specific Threats

Secrecy Capture user identity preferences or record

their activities Capture transaction details Capture payment information

Integrity modify transactions modify user credential (e.g. delivery address)

Availability make shop unavailable to customers

Page 18: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Threats to the Server

Servers have software vulnerabilities that can be exploited to cause destruction or to acquire information illegally

E.g. databases connected to the Web contain information that could damage a company if it were disclosed or altered

Physical security and access control is also very important

Page 19: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Threats to Intellectual Property

Intellectual property is the ownership of ideas and control over the tangible or virtual representation of those ideas

IP includes: Names, for example trademarks and

domain names (Cybersquatting, name changing, name stealing)

Digital intellectual property, including art, logos, and music posted on Web sites, is protected by laws

Page 20: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Computer Security Resources

CERT SANS Institute Internet Storm Center Center for Internet Security U.S. Dept. of Justice Cybercrime National Infrastructure Protection

Center

Page 21: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Protecting Electronic Commerce Assets

Page 22: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Monitoring Active Content

Most browsers are equipped to recognize when they are about to download Web page containing active content

Users can configure the user of active content by their browser

For example, configure Java VM using the Java security console

Page 23: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Microsoft Internet Explorer

Page 24: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Microsoft Internet Explorer

Page 25: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Netscape Navigator

Page 26: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Netscape Navigator

Page 27: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Antivirus Software

Antivirus software is a defense strategy Antivirus software matches the contents of a

file under examination against a database of virus “signatures”

Thus, antivirus software cannot protect against viruses that have not been discovered earlier and recorded in the database

One of the most likely places to find a virus is in an electronic mail attachment

Some Web e-mail systems let users scan attachments using antivirus software before downloading e-mail

Page 28: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Protecting e-commerce communications

Providing e-commerce channel security means:• Providing channel secrecy• Guaranteeing message integrity• Ensuring channel availability• A complete security plan includes authentication

Businesses must prevent eavesdroppers from reading the Internet messages that they intercept

Best available way to do this is via encryption

Page 29: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Encryption

Encryption is a mathematical technique which encodes information using a key to transform the original information into a string of characters that is unintelligible

The program that transforms text into cipher text is called an encryption program

At the other end of the communication channel each message is decrypted using the same or a related key by a decryption program

Page 30: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Types of Encryption

Asymmetric encryption or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key

Symmetric encryption or private-key encryption, encodes a message using a single numeric key to encode and decode data

Page 31: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Hash Functions

Hash algorithms are one-way functions.

A hash algorithm has these characteristics:• It uses no secret key• The message digest it produces cannot be

inverted to produce the original information• The algorithm and information about how it

works are publicly available• Hash collisions are nearly impossible.

MD5 is an example of a hash algorithm

Page 32: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Encryption Methods

Page 33: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Encryption Algorithms and Standards

Page 34: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Secure Sockets Layer (SSL)

Page 35: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Digital Certificates

A digital certificate verifies that a user or Web site is who it claims to be

The digital certificate contains a means for sending an encrypted message to the entity

A Web site’s digital certificate is a shopper’s assurance that the Web site is the real store

Proof of validity and management of digital certificates is provided by the certification authority

Page 36: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Digital Certificates in IE

Page 37: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Ensuring Transaction Integrity

Integrity violations can occur whenever a message is altered while in transit between the sender and receiver

Ensuring transaction integrity, two separate algorithms are applied to a message:• Hash function• Digital signature

Page 38: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Digital Signature

An encrypted message digest is called a digital signature

A purchase order accompanied by the digital signature provides the merchant positive identification of the sender and assures the merchant that the message was not altered

Used together, public-key encryption, message digests, and digital signatures provide quality security for Internet transactions

Page 39: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Transaction Delivery

A denial or delay of service attack removes or absorbs resources

One way to deny service is to flood the server with a large number of packets

To prevent such attacks, a robust network architecture should be in place and network countermeasures should be in place

Page 40: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Protecting the Web Server

The e-commerce server which incorporates a Web server, responds to requests from Web browsers through the HTTP protocol and CGI scripts

Security measures for commerce servers:• Access control and authentication• Operating system controls• Firewall

Page 41: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Access Control and Authentication Access control and authentication refers to

controlling who and what has access to the e-commerce server

Operating systems often provide access control list security to restrict file access to selected users

Users identify themselves using either a password or a token

An access control list (ACL) is a list or database of people who can access the files and resources

Page 42: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Firewalls

A firewall is a system that is installed at the entry point of a network

The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat

Acting as a filter, firewalls permit selected messages to flow into and out of the protected network

Page 43: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

Types of Firewalls

Packet-filter firewalls examine all the data flowing back and forth between the trusted network

Application layer firewalls filter traffic based on the application they request

Proxy severs are firewalls that communicate with the Internet on the private network’s behalf

Page 44: Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,

IP Protection

A watermark is data imperceptibly added to the original digital asset in order to convey hidden copyright data

A watermark can be used to verify the lawful use of the asset

It should not reduce the quality of the digital asset Still in its infancy as a market Other techniques (less powerful) are based on

mechanisms built-in the hardware or the software Examples include DVD and MS Media Player but

more often than not can be bypassed