580 likes | 590 Views
This course outlines the importance of security in e-commerce, covering topics such as secure messaging, transactions, hosts and applications, and privacy. Grading is based on knowledge, reasoning, and communication skills.
E N D
ECT 582Secure Electronic Commerce Professor Robin Burke
Outline • Introductions • Course and Syllabus • Security • E-Commerce
Introductions • Student information sheet
Administrativa • Contacting me • CS&T 453 • x 25910 • rburke@cs.depaul.edu • Course web site • http://josquin.cs.depaul.edu/~rburke/courses/w04/ect360/
About Me • 2nd year at CTI • PhD in AI, 1993 • Research • AI applications in E-Commerce • "smart catalogs" • Taught web development since 1996 • Founded an e-commerce company
Course • Public key infrastructure • how to enable large-scale secure messaging? • Secure transactions • Securing hosts and applications • Privacy
Grading • Six assignments – 35% • Midterm – 25% • Final – 30% • Participation – 10%
Grading • Three Components • Knowledge • Does the work display correct technical knowledge? • Reasoning • Does the work indicate good problem-solving skills? • Communication • Is the answer well-written English?
Grading, cont'd • A = Excellent work • Thorough knowledge of the subject matter • Well-considered and creative solutions • Well-written answers • B = Very good work • Complete knowledge of the subject matter • No major errors of reasoning in problem solutions • Competent written answers • C = Average work • Some gaps in knowledge of subject matter • Some errors or omissions in problem solving • Written answers may contain grammatical and other errors • D = Below average work • Substantial gaps in knowledge of subject matter. • Problem solving incomplete or incorrect • Poor English in written answers
Discussion Forum • Important for this course • More DL than local students • Automatically mailed to all students • Uses • Questions about assignments • Announcements • Discussion about security issues • DL students • required to post at least weekly • All students • component of "Participation Grade"
Security • freedom from danger, risk, etc.: safety • freedom from care, apprehension or doubt; well-founded confidence • something that secures or makes safe; protection; defense • precautions taken to guard against theft, sabotage, the stealing of military secrets, etc • Webster’s Encyclopedic Unabridged Dictionary of the English Language
E-Commerce • the process of electronically buying and selling goods, services and information, and the maintenance of all the relationships, both personal and organizational, required for an electronic marketplace to function.
Post-9/11 realities • Aspects of business operations may impact public safety
Inherent Hazard • E-commerce opens a hole for interacting with an organization • Any Internet user can attack that opening • Good design • Minimizes the risk associated with enabling e-commerce • While still preserving its benefits • Bad design • Fails to reduce the risks of e-commerce, or • Eliminates the benefits of e-commerce
Basic concepts • Assets • Attackers • Attacks • Protocol • Risk
Assets • Financial • Customer data • Proprietary info • Reputation • Systems
Is e-commerce different? • Need for physical proximity • Differences in documents
Physical documents • Semi-permanence of ink embedded in paper fibers • Particular printing process • letterhead • watermark • Biometrics of signature • Time stamp • Obviousness of modifications, interlineations, and deletions
Computer documents • Computer-based records can be modified freely and without detection • Supplemental control mechanisms must be applied to achieve a level of trustworthiness comparable to that on paper • Less permanent, too
Legal differences • In some cases, possession matters • negotiable document of title • cash money
Loss of assets • Physical assets • loss = theft or destruction • Information assets • loss = violation of • confidentiality • availability • integrity • authenticity
Attackers • Class 0 • casual passerby • Class 1 • capable outsider • Class 2 • knowledgeable insider • Class 3 • determined organization
E-Commerce • Proximity is not an issue • Scale • Many, many Class 1 attackers • Mutability • Easy for insiders to cover their tracks
Attack • Any action that compromises the security of an e-commerce system • Simplifying assumption • security = protecting messages
Passive vs active • Passive • Attacker monitors communication • disclose contents • but also traffic analysis • Active • Attacker interferes with communication • generates messages • prevents transmission or reception
Basic attack types • Interception • Interruption • Modification • Fabrication
Interception Attack on confidentiality
Example: Password sniffer • Program to capture user id / password info • Case in Tokyo • sniffer installed at Internet cafe • 16 million Yen stolen
Interruption • Attack on availability
Example: SYN flooding • send open request for TCP connection • but don’t respond to handshake • do this over and over again • eventually server can't accept new connections
Modification Attack on integrity
Example: Shareware trojan • Alice posts a shareware application • Eve modifies it to contain her virus • Bob downloads the modified version
Fabrication Attack on authenticity
Example: Session hijacking • Taking over active sessions • after Alice leaves • before application times out • Bypass the authentication process • have Alice's privileges
Protocol • A set of formal rules describing how to transmit data, especially across a network....High level protocols deal with the data formatting, including the syntax of messages, the terminal to computer dialogue, character sets, sequencing of messages etc. • FOLDOC
To describe a protocol • The roles • who participates • The steps • how the interaction unfolds • The messages • syntax and meaning of messages sent and received • The process • processing by each player
Example: Homework protocol • Instructor hands out assignment • includes requirements and due date • Student performs assignment • submits by due date • Instructor grades assignment • grade is incorporated into course database • Graded work is returned to student
Protocol security • Generally we talk about the protecting the protocol messages • Different protocols have different security characteristics • Homework protocol is not secure against fabrication • Test taking protocol is more secure • Attacks can target different protocol steps • "grader" example
Risk • Risk is • value of loss * probability of loss • Both can be hard to quantify • Risk management • process of analyzing and mitigating risk • one technique is historical • what losses have others suffered?
What are the primary risks? • Disclosure of proprietary information • Denial of service • Virus attacks • Insider net abuse • Financial fraud • Sabotage • CSI/FBI 2003 Computer Crime and Security Survey Total value of losses: $200 million
Secondary risks • Damage to relations with customer or business partners • Legal, public relations, or business resumption cost • Public relations damage • Uptake failure due to lack of confidence
Secure E-Commerce • Not E-Commerce Risk Management • Very big topic • strategy • architecture • technology
Security strategy • Threats • what is valuable? • who might want it? • Vulnerabilities • where is the organization exposed? • Defenses • what can be done to manage the risks? • Legal • what liabilities and legal requirements exist?
Security architecture • People • how are they hired, trained, monitored, audited? • Systems • what systems exist? • how are systems connected to each and to the larger Internet? • Procedures • how are systems used? • who gets access to what under what circumstances?
Security technology • Main focus of this course • Specific technologies for achieving security-related goals • But • meaningless in the absence of a strategy and an architecture
Secure E-Commerce • Technologies for securing the protocols of electronic commerce • One component of risk management • not the only component • sometimes not even the most important • but a basic safeguard
What can technology provide? • Confidentiality • Authentication • Integrity • Non-repudiation • Access control • Availability
Confidentiality • Protects against interception • Ensures that a message is only readable by intended recipient • Technology • Encryption