290 likes | 415 Views
ITCS 937. Security management tools and practices in E-Business Prepared By: Shahriar Hassan 2167323. Introduction. Recent study by CSI/FBI, Ø 85% experienced security breaches in the past 12 months. Ø 64% suffered financial losses that averaged more than $US 2 million,
E N D
ITCS 937 Security management tools and practices in E-Business Prepared By: Shahriar Hassan 2167323
Introduction • Recent study by CSI/FBI, Ø85% experienced security breaches in the past 12 months. Ø64% suffered financial losses that averaged more than $US 2 million, Source: http://www.entrust.com/corporate/enhanced.htm accessed 06/08/01
Introduction contd. • A three-level-approach for managing security in e-commerce: §Level 1: Basic practices. §Level 2: Building a shield. §Level 3: Transmission Protection.
Introduction contd. Level 1(Basic practices) - Password Management. - Access Control. - Physical security. Level 2 (Building a shield) - Policy and procedures. - Training and awareness. - Intrusion protection.
Introduction contd.. • Level 3(Transmission protection) - Digital signature. - Digital certificate - Encryption. - SET. - SSL. - Biometrics
Level 1: Basic practices • Password Management • Standard methods: frequent forced change of password, access rights etc. • Standard IT controls: minimum length of passwords, timeout and use of alphanumerical characters • Access Control • Access to server should be restricted. • Combination password (for authentication).
Level 1 contd. • Physical security • Equipments should be in secured premises. • Limited access to these premises. • Adequate protection from fire, flood, power failure etc. • Audit/paper trail • Critical documents should be in hard copy. • Electronic audit trail. • Prompt identification of errors/irregulations.
Level 2: Building a Shield • Policies and procedures • Need to consider: • Security policy. • Security organization. • Personnel security. • Physical and environmental security. • Communications and operations management. • System development and maintenance. • Business continuity management. • Compliance.
Level 2 contd. • Training and awareness • Relevant personnel should be aware of risks. • Prepare to deal with intrusions. • Intrusion Protection: • Intrusion management: Should include: • Use of alerting and monitoring software. • Benchmarking. • Regular independent audits.
Level 2 contd.Intrusion protection contd. • Content security: - About what is “in” and “out” of the network. - Policy is required to cover integrity issues, such as: • Loss of information. • Confidentiality breaches. • Exposure to legal liability. • Damage of reputation thru misuse of e-mail, etc.
Level 2 contd.Intrusion Protection contd. • Firewall: • Controls access between: - a private network and Internet, - among different parts of a given network.
Intrusion Protection contd.Firewall contd. • Limitations: - insider’s intrusion. - not useful where there is direct connection (e.g. dial up connection). - outsiders masquerade as authorized user. • Component of Enterprise security, not whole solution.
Intrusion protection contd. • Personnel security: - Single most expensive type of computer crime (FBI/CSI study) - Issues should include: • Security screening of new employees and contractors. • Strong password allocation and controls for access to network and applications; • Use of authentication techniques;
Level 3: Transmission Protection • Encryption: • Enables data to be coded. • Each party in transaction holds a pair of matched keys: - Public key: widely distributed. - Private key: secret key. • An encrypted session sent using a public key might only be read by the recipient using their private key.
Level 3 contd.Encryption contd. Encryption and keys
Encryption contd. • Limitations: - Only protects data while in transit. - Encryption stream can be disrupted, corrupting traffic and causing expensive data integrity repairs.
Level 3 contd. • Digital signature: • A data item, which accompanies a digitally encoded message .
Level 3 contd. • Digital certificates: - The person sending a message owns a digital certificate - Ensures that the recipient knows that the sender is who they say they are.
Level 3 contd. • Secure Socket Layer (SSL) • Developed by Netscape in mid 1990’s. • Secure communications between client and server by allowing - mutual authentication, - Use of digital signatures for integrity, and - Encryption for privacy.
SSL contd. • Advantages: - Does not require trusted third party. - Can establish a secure connection even when one end does not have a secure "key“. • Disadvantages: - users have to pay. - Not open standard.
Level 3 contd. • Secure Electronic Transaction (SET) • Developed by VISA and MasterCard. • utilizes - Digital certificates, - e-wallets, - Certificate authorities and - Acquirers to provide security and privacy for the cardholder’s information.
SET contd. Purchase sequence using SET
SET contd. • Advantages: - Trusted purchasing environment. - Ability to handle multi party transactions. - New extensions: Debit card functionality, transactions stored on smart cards, processing of transactions that use SSL protocol for transport. • Disadvantages: - Quite complex to start with. - cost prohibitive for most merchants. - Few merchants and cardholders.
Level 3 • Biometrics: - Verifying a person by a physical characteristic or personal trait. - Access is provided to the person, not a piece of plastic - Retinal scan, Iris recognition, Finger imaging, hand geometry, voice recognition, facial imaging etc. - Advantages and disadvantages.
Conclusion: • Users do not understand security technology • Media perpetuates the uncertainty regarding security threats • Organizations continue to minimize the issue of Internet security. • Negligent??? • Civil suits for negligence??? • Internet simply isn’t secure enough???
Questions??? Thanks……….