• 430 likes • 447 Views
This resource explores the importance of security in electronic commerce and provides strategies for managing risks and improving safety. Topics covered include risk management, disclosure of proprietary information, fraud prevention, and the differences between physical and computer-based documents. The resource also discusses various types of attacks and the properties of a secure e-commerce system.
E N D
ECT 582Secure Electronic Commerce Professor Robin Burke
Introductions • About me • http://josquin.cs.depaul.edu/~rburke/ • About you • Student information sheet
Resources • Course on-line • discussion forum • grades • Course home page
Security • freedom from danger, risk, etc.: safety • freedom from care, apprehension or doubt; well-founded confidence • something that secures or makes safe; protection; defense • precautions taken to guard against theft, sabotage, the stealing of military secrets, etc • Webster’s Encyclopedic Unabridged Dictionary of the English Language
E-Commerce • the process of electronically buying and selling goods, services and information, and the maintenance of all the relationships, both personal and organizational, required for an electronic marketplace to function.
Post-9/11 realities • Aspects of business operations may impact public safety • E-commerce opens a hole for interacting with an organization
Key concepts • Risk • Trust
Risk • What are the possible losses we are guarding against?
Trust • Must choose where trust is to be placed
Risk management • Risk analysis • Risk mitigation • Risk transfer
What are the primary risks? • Disclosure of proprietary information • Denial of service • Virus attacks • Insider net abuse • Financial fraud • Sabotage - CSI/FBI 2003 Computer Crime and Security Survey
Disclosure of Proprietary Info • Customer data exposure • Data theft • Sensitive information
Fraud • Payment account abuse • Transfer funds without authorization • Destroy or hide financial records • Customer impersonation
Secondary risks • Damage to relations with customer or business partners • Legal, public relations, or business resumption cost • Public relations damage • Uptake failure due to lack of confidence
How is e-commerce different? • Need for physical proximity • Differences in document
Physical documents • Semi-permanence of ink embedded in paper fibers • Particular printing process • letterhead • watermark • Biometrics of signature • Time stamp • Obviousness of modifications, interlineations, and deletions
Computer documents • Computer-based records can be modified freely and without detection • Supplemental control mechanisms must be applied to achieve a level of trustworthiness comparable to that on paper • Less permanent, too
Legal differences • In some cases, possession matters • negotiable document of title • cash money
Info source Info destination Attack • Any action that compromises the security of information systems • Normal flow
Interruption • Attack on availability Info source Info destination
Interception Attack on confidentiality Info source Info destination
Modification Attack on integrity Info source Info destination
Fabrication Attack on authenticity Info source Info destination
Passive vs active • Passive • Monitor communication • Disclose contents • but also traffic analysis • Active • Interfere with communication
Active attacks: masquerade • Masquerade: one entity pretends to be a different entity • Example: Session Hijacking • Taking over an existing active session. • It can bypass the authentication process and gain access to a machine
Active attacks: replay • Passive capture of data • Later retransmission to produce an unauthorized effect • Example: Password sniffing • Program capture user id / password info • Case in Tokyo – sniffer installed at Internet cafe. 16 million Yen stolen.
Active attacks: modification • Some portion of a legitimate message is altered, or that message are delayed or reordered, to produce an unauthorized effect • Example: Spam • Return-To header on spam email is always forged to prevent tracking the sender
Active attacks: DoS • Denial of service • prevents or inhibits the normal use or management of communication facilities • Example: SYN flooding • send open request for TCP connection but don’t respond to handshake • do this over and over again
Security properties • What do we want out of a secure e-commerce system? • Confidentiality • Authentication • Integrity • Non-repudiation • Access control • Availability
Confidentiality • Protects against interception • Ensures that a message is only readable by intended recipient • Technology • Encryption
Authentication • Protects against fabrication • Ensures that the origin of a message or electronic document is correctly identified, with assurance that the identity is not false • Technology • User Id/Password • Digital certificates
Integrity • Protects against modification • Ensures that only authorized parties are able to modify an electronic document or • Allow modification to be detected • Technology • Digital signatures
Non-repudiation • Protects against an e-commerce participant acting in bad faith • Require that neither the sender nor the receiver of a message be able to deny the transmission • Technology • (Complicated)
Access control • Protects against unauthorized access • Allows the establishment of fine-grained control over access to files and applications for different users and groups • Technology • (Various, usually tied to authentication)
Availability • Protects against interruption • Requires that computer system asset be available to authorized parties when needed • Technology • (Many)
The big picture • Security is a multi-faceted feature of information systems • An organization needs • A security strategy tailored for its particular needs • A security architecture that addresses that strategy • Security technology to realize the architecture
Security strategy • Threats • what is valuable? • who might want it? • Vulnerabilities • where is the organization exposed? • Defenses • what can be done to manage the risks? • Legal • what liabilities and legal requirements exist?
Security architecture • People • how are they hired, trained, monitored, audited? • Systems • what systems exist? • how are systems connected to each and to the larger Internet? • Procedures • how are systems used? • who gets access to what under what circumstances?
Security technology • Main focus of this course • Specific technologies for achieving security-related goals • But • meaningless in the absence of a strategy and an architecture
Assignment #1 • Create a web page for your assignments • I will link these to the course page • Subscribe to CERT Advisory mailing list • Post on the "Test" forum • Due before class starts • No late assignments!
Next week • Cryptography • Reading • Ford & Baum, Ch. 4 • Risks Digest • Should be prepared for discussion