140 likes | 148 Views
Learn about the security concerns in e-commerce, including threats to confidentiality, authentication, and access control. Understand client and server security threats, such as file corruption, information deletion, and denial of service attacks. Discover the dangers of viruses and Trojan horses, and how to prevent and repair them. Get essential internet security tips and explore the use of firewalls for enhanced protection.
E N D
OBJECTIVES • What are security concerns (examples)? • What are two types of threats (client/server) • Virus – Computer Enemy #1 threat • How to prevent and protect?
SECURITY CONCERNS: examples • Uncover confidentiality (bank account) • Leak Authentication and Access Control (user name, password of your Web, email) • Conduct ID theft (over 50% is credit card fraud) • Hack or Intrude Web sites
CLIENT SECURITY THREATS Happens to client computers examples • Deliberate Corruption of Files (e.g., rename files) • Delete Stored Information • Use Virus (bring down system)
SERVER SECURIY THREATS • Web server with active ports (e.g., 80, 8080) can be misused (scalability or deny of service attack) • Web server directories (folders) can be accessed and corrupted
Server Threats: DENIAL OF SERVICE Hackers … • Break into less-secured computers • Installs stealth program which duplicates itself (congest network traffic) • Target network from a remote location (RPC) and activates the planted program • Victim’s network is overwhelmed and other users are denied access to Web and Email
VIRUS – eCommerce Threat #1 • A malicious code replicating itself to cause disruption of the information infrastructure • Attacks system integrity (cause inconsistent data) • Target at computer networks, files and other executable objects
EXAMPLES OF VIRUSES • Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware) • Boot Virus • Attacks boot sectors of the hard drive • “Trojan horses” –a bot planted in the systems being attacked, can be operated locally or remotely for malicious purposes
VIRUS CHARACTERISTICS • Fast to attack • Easily invade and infect computer hard disk • Slow to defend • Less likely to detect and destroy • Hard to find (Stealth) • Memory resident (registry) • Able to manipulate its execution to disguise its presence
BASIC INTERNET SECURITY TIPS • Use Password • Alphanumeric • Mix with upper and lower cases • Change frequently • No dictionary names • Use Encryption • Coding of messages in traffic between the customer placing an order and the merchant’s network processing the order
FIREWALL & SECURITY • Firewall: frequently used for Internet security - prevent • Enforces an access control policy between two networks • Detects intruders, blocks them from entry, keeps track what they did and notifies the system administrator
Other security approach- repair, e.g. AntiSpyware to clean virus
Summary and Exercises • Name a few security concerns • What are the two types of threats? (client/server) • Explain Trojan Horse Virus • How to prevent and repair?