370 likes | 566 Views
Electronic Exchange of Information. Network. Participant. Participant. What could go wrong in this setting ?. Three Scenarios. Alice buys a book from Bob’s book store. Inter-corporate trading for Charlie’s Plastic Company. Daisy electronic market. Alice Buys a Book.
E N D
Electronic Exchange of Information Network Participant Participant What could go wrong in this setting ? Mngt 3862/99 James Clark
Three Scenarios • Alice buys a book from Bob’s book store. • Inter-corporate trading for Charlie’s Plastic Company. • Daisy electronic market. Mngt 3862/99 James Clark
Alice Buys a Book • Alice shops for a book on the internet using WWW. • She finds the desired book from Bob’s book store and makes the order using a web form provided by Bob’s. • Bob confirms that the order really comes from Alice’s. • She sends her credit card number, suitably encrypted. • The book is delivered through UPS. Mngt 3862/99 James Clark
Inter-Corporate Trading • Charlie’s Plastic Makers is a medium-sized company in Canada with long-established requirements for high-quality plastic which it buys from Plasticorp. • Plasticorp aims to reduce costs of customer transactions by using secure messaging with its regular customers. • Origin and confidentiality of all correspondence must be ensured. Mngt 3862/99 James Clark
Daisy's Electronic Market • Daisy is an entrepreneurial small businessperson who works from her home basement. • She buys items from suppliers willing to do business wholly electronically, repackages them, and sells them through a WWW storefront. • Effective marketing of the web page and very low overhead provide Daisy’s competitive edge. Mngt 3862/99 James Clark
What are the issues? • Accountability -- Security relevant activities on a system can be traced to individuals who may be held responsible for their actions • Availability -- System resources are safeguarded from tampering and are available for authorized users at the time and in the format needed • AccessControl -- Access to the system resources is limited to authorized individuals, entities, or processes • Confidentiality -- Information is not accessed by or disclosed to unauthorized individuals, entities, or processes • Identification and Authentication -- Verification that the originator of a transaction is the originator • Integrity -- Information is not undetectably altered or destroyed by an unauthorized person or process • Non-repudiation -- Undeniable proof of participation by the sender and/or receiver in a transaction • Privacy – individual rights to nondisclosure Mngt 3862/99 James Clark
Security Overview (Figure 5-1) • Countermeasures are procedures, either physical or logical, that recognize, reduce, or eliminate a threat Mngt 3862/99 James Clark
What is Security? • Dictionary Definition: protection or defense against attack, interference, espionage, etc. Mngt 3862/99 James Clark
Confidentiality private exchange of information only from originator to intended recipient Integrity no modification to the information exchanged without consent Authentication/Identification ensuring that an individual is who she claims to be. E-comm Requirements Network Participant Participant Mngt 3862/99 James Clark
Security – The Business Challenge Who’s the bad guy? Competitors, foreign governments, network hackers, disgruntled ex-employees, news and media, unauthorized customers, employees, etc? How do I protect my information from the bad guys, without making employees and authorized users less productive? Outsiders 20% Insiders 80% How can I administer security consistently, reliably, and cost effectively across all of my distributed information resources ? Studies show 80% of real security problems are caused by authorized users Mngt 3862/99 James Clark
Unauthorized or Unintended use of information Technology assets for… Personal gain Theft, fraud Prestige Revenge Terrorism What Is Hacking? Mngt 3862/99 James Clark
Hacks mean business…and they hurt Corporate image Customer & Employee Privacy Real $$$$ often in millions Why is hacking a problem? Mngt 3862/99 James Clark
Hacked Web Site Before…. Mngt 3862/99 James Clark
…And After Mngt 3862/99 James Clark
Interruption Interception Modification Masquerade Intranet has 3 separate components Secrecy Integrity Availability Security Threats Network Participant Participant Mngt 3862/99 James Clark
Protecting ElectronicCommerce Assets • You cannot hope to produce secure commerce systems unless there is a written security policy • What assets are to be protected • What is needed to protect those assets • Analysis of the likelihood of threats • Rules to be enforced to protect those assets Mngt 3862/99 James Clark
Affordability – how much does it cost? Functionality – Are the computers still easy to use Cultural Compatibility – Does it conflict with normally accepted practices at the site Legality – does it meet the company’s legal requirements Security Policy Mngt 3862/99 James Clark
Isolated Intranet – simple & secure but no access to to internet. firewall Proxy Servers-only IP address of proxy Access Control Access control files Restrictions by IP Address Data Security Mechanisms Basic security in HTTP Encryption Security Mechanisms Mngt 3862/99 James Clark
Firewall Capability Firewall can • Focus for security decisions • Enforce security policy • Log internet activity • Limit exposure • keeps one section of intranet separate from another Firewall can not • Protect against malicious insiders • Protect against connections that do not go through it • Protect against new threats • Protect against viruses Mngt 3862/99 James Clark
On 8 February, 1587 Elizabeth I of England signed Mary's death warrant, and she was executed at Fotheringay Castle. The execution did not go well for Mary as the executioner was unable to sever her neck with one blow, and was forced to use a grinding motion on her to complete the task. All because of weak encryption. Mngt 3862/99 James Clark
Encryption • Helps guarantee privacy & authentication • Two types of encryption • public-key encryption • Private key - symmetric-key cryptography Mngt 3862/99 James Clark
Private Key Encryption 2. Doug locks box with key to the lock 4. Nola uses duplicate key and unlocks box. 3. Box is transported to Nola 1. Doug places document in strongbox 5. Nola retrieves document Also referred to as symmetric key or secret key cryptography Mngt 3862/99 James Clark
Symmetric Key Encryption( Private Key ) Plain-text input Plain-text output Cipher-text “The quick brown fox jumps over the lazy dog” “The quick brown fox jumps over the lazy dog” “AxCv;5bmEseTfid3)fGsmWe#4^,sdgfMwir3:dkJeTsY8R\s@!q3%” Encryption Decryption Same key (shared secret) Mngt 3862/99 James Clark
If N people need to communicate pairwise, then N(N-1)/2 keys need to distributed. How should the secret key be exchanged? Any symmetric key method that uses more than 40 bit keys are viewed as strong encryption. Export is limited by regulation. Examples of Algorithms DES SkipJack IDEA RC2 & RC4 Examples & Problems Mngt 3862/99 James Clark
Public Key Encryption 2. Doug locks box with righty key to the lock 4. Nola gets copy of Bob’s lefty key and unlocks box. 3. Box is transported to Nola 1. Doug places document in strongbox 5. Nola retrieves document Mngt 3862/99 James Clark
Public Key Encryption public private Clear-text input Clear-text output Cipher-text “The quick brown fox jumps over the lazy dog” “The quick brown fox jumps over the lazy dog” “Py75c%bn&*)9|fDe^bDFaq#xzjFr@g5=&nmdFg$5knvMd’rkvegMs” Encryption Decryption Different keys Recipient’spublic key Recipient’s private key Mngt 3862/99 James Clark
Public Key Pairs public private SMART CARD private 123 89 3486 M Public and private keys are always generated as amatchedpair Keys are mathematically related but it is computationally infeasible to deduce a private key from its public key Private keys are kept secret - preferably by being stored in a tamper-resistant chip Public keys are just that - public! Mngt 3862/99 James Clark
Key Management • Ideally, every person has twokey pairs: • Key-exchange key pair • Signature key pair • Key pairs are distinct • Public and private keys are always generated as a pair at the user’s machine • Public key can be openly shared • Private key is always kept private(it never leaves the machine where it was generated) Mngt 3862/99 James Clark
Key Pair Use • Key-exchange key pair • Recipient’s public key is used to send a randomly chosen communication key • Signature key pair • Sender’s private signing key is used in digital signature operations • Recipient verifies signature using sender’s public signing key Mngt 3862/99 James Clark
In private key systems, the same key is used to encrypt and decrypt. So a single key has to be shared between devices/individuals who need to communicate. In public key systems, two keys are generated. A message encrypted with one, can be decrypted with the other. Concept of a private (secret) key and a public key. Main Differences Mngt 3862/99 James Clark
Computationally very complex 1000 times slower on average than private key systems. Key management how can an individual trust the public key? How do they know that it really belongs to an individual? the need for certification authorities Verisign USPS Problems With Public Key Encryption Mngt 3862/99 James Clark
Ensure Your BrowserIs SecureThe information-like credit card numbers- you share with Web sites is only as safe as your Web browser. Use the free Browser Check to ensure you've got the latest, most secure Web browser. • With one click, Browser Check instantly tells you: • What browser and version you're using • Your browser's encryption strength-standard 40-bit SSL, or 128-bit SSL: the strongest encryption available • Upgrade recommendations Browser check Mngt 3862/99 James Clark
Encryption Options • Secure HTTP (S-HTTP) • Secure Sockets Layer (SSL) most popular • Private Communication Technology (PCT) • Secure Electronic Transfer (SET) Mngt 3862/99 James Clark
Secure Socket Layer (SSL) • Netscape has designed a security protocol called Secure Sockets Layer (SSL) • which provides data encryption • server authentication • message integrity • optional client authentication for a TCP/IP connection • Web pages that have a SSL connection start with https: instead of http: Mngt 3862/99 James Clark
Normally the padlock or key icon will change and become closed or unbroken when entering a secure site Secure Site Mngt 3862/99 James Clark
Table Summary of Security Issues Mngt 3862/99 James Clark
access access codeaccess controlauthenticationauthorizationCertificate Authoritycrackdata integritydigital certificatedigital envelopedigital signaturefirewallhackhackerIP spoofing passwordPKIPretty Good PrivacyS-HTTPS/MIMEsecure serversecuritySETsmart cardSOCKSSSLtokenTrojan horseusernamevirus Definitions Mngt 3862/99 James Clark