510 likes | 523 Views
Chapter 7. E-Business Network and Web Site Security. Objectives. In this chapter, you will learn to: Describe general e-business and Web site security issues Identify ways to protect the physical security of a network
E N D
Chapter 7 E-Business Network and Web SiteSecurity E-Business Technologies
Objectives In this chapter, you will learn to: • Describe general e-business and Web site security issues • Identify ways to protect the physical security of a network • List internal network security risks and explain how to protect against them • Discuss external network and Web site security risks and explain how to protect against them E-Business Technologies
Objectives In this chapter, you will learn to: • Identify the risks associated with an e-business’s online transactions • Illustrate a virtual private network • Describe wireless security issues • Discuss the importance of security audits E-Business Technologies
General Network and Web Site Security Issues • E-business security: protecting data and physical networks • E-business security risks include: • Physical risks: Damage to network and data • Internal risks: Threats originating within organization • External risks: Threats from outside the organization • Transactional risks: Data loss and interception E-Business Technologies
Valued Gateway Client: Physical Risks • Include accidental or deliberate damage to equipment or data resulting from natural disaster or sabotage • Specific issues include: • Network equipment and physical location • Electrical power backup • Internet connectivity redundancy • Outsourcing physical risks E-Business Technologies
Network Equipment andPhysical Location Equipment and locations security include: • Network facilities location: network equipment and server rooms always locked, locations anonymous • Fire protection: install fire-suppression systems that do not damage servers, routers, electrical equipment - but these systems might be fatal to humans • Network facilities construction: construction and design of facilities more substantial than conventional office space and with particular attention to electrical and communication considerations E-Business Technologies
Electrical Power Backup • E-businesses should consider two levels of backup power: • Batteries that assume power within milliseconds of a failure • Power generators that automatically start when the batteries die • Critical servers should never be out more than five minutes per year to achieve “five nines reliability” (99.999% uptime) E-Business Technologies
Internet Connectivity Redundancy • E-businesses should have more than one connection to the Internet • ISPs and Web hosting companies often have connections to more than one network service provider (NSP) • Complete data-center redundancy allowse-businesses to continue operations from a different location in the event of a major disaster • What is the price of redundancy and when is the price too high? E-Business Technologies
Outsourcing Physical Risks • Using Web hosting services provides physically secure environment for e-business servers • Fee for service arrangement provides power, connectivity, and secure environment • Eliminates internal risks to physical security • What are the benefits for small firms to outsource? E-Business Technologies
Physical Risks to Network andWeb Site Assets • Include accidental or deliberate damage to equipment or data is accidental or deliberate more likely? • Caused by natural disaster or sabotage • Threat to network infrastructure includes: • Damage to network equipment • Damage to power supplies • Damage from fire E-Business Technologies
Network Equipment andPhysical Location • Physical security begins with equipment safety • Threat reduction includes proper management of network facilities location and fire protection • Security countermeasures for network facilities locations include: • Locked network equipment room doors with restricted personnel access • Locations of servers and switching equipment kept anonymous E-Business Technologies
Network Equipment andPhysical Location • Fire protection and countermeasures to prevent fire damage include: • Use fire suppression system approved for electrical fires in server, switch, and power rooms • Use only fire extinguishers approved for electrical fires in server, switch, and power rooms • Pre-select and train employees responsible for fire control E-Business Technologies
Internal Security Risks • Come from inside the company: unhappy employees, poor security awareness, poor planning • Establishing and enforcing security policy is first countermeasure • Additional countermeasures include: • Password protecting the network • Using biometric identification • Using smart card authorization E-Business Technologies
Passwords • Passwords are used to identify a specific computer user and grant user access • Effective when created properly and changed regularly E-Business Technologies
Biometric Identification • Measurement of biological data • Biometric security devices and software measure and record a computer user’s unique human characteristics (such as eye retina or iris) for user identification • Still under development E-Business Technologies
Smart Card • Smart cards contain an embedded memory chip with user identification information • Can be used to authenticate a remote user logging into a network • Disadvantage: Risk of loss or theft E-Business Technologies
Backup and RestorePolicies and Procedures • Describes the plan for securing vital data files and software in case of disaster • Specifies when and how critical files and software are backed up • Backups should be built in to daily, weekly, monthly network maintenance schedule • Test restore procedure, and archive, by performing periodic restores E-Business Technologies
Backup and RestorePolicies and Procedures • Backup media should also be stored offsite or at least a second copy of the backup media) • Some e-businesses assign backup responsibilities to employees outside of IT department • Offsite storage also available via Internet connection from data management companies E-Business Technologies
Disaster Recovery Planning • Disaster Recovery Plan part of e-business’ Business Continuity Plan • DRP for network operations should include procedures for handling electrical outages, data loss, and security breaches • Plan can include the use or redundant servers and equipment to handle system failover • DRP should be tested periodically E-Business Technologies
External Security Risks • Originate outside the company’s network • Must bypass network defenses • Connecting to the Internet exposes private LANs to risk of attack • Stringent security necessary to protect against external risk E-Business Technologies
Hackers • Outside intruders that deliberately gain unauthorized access to individual computers or computer networks • White hat hackers find and make known weaknesses in computer systems without regard for personal gain • Black hat hackers (crackers) gain access to steal valuable information, disrupt service, or cause damage E-Business Technologies
Hacker Attack Tactics • Objective: interrupt operations or use hacked computer as base of attack on other computers • The most common method is to send confusing data to a server or other computer • Crashing a program can allow a hacker to take control of computers • Buffer overflows tie up operating memory, degrading performance, causing crashes E-Business Technologies
Distributed Denial of Service Attacks • Denial of Service (DoS) attacks designed to disable network using flood of useless traffic • Distributed DoS uses multiple computers to attack networks • DDoS attacks include: • Unending string of Pings • Sending hundred of huge e-mail messages E-Business Technologies
Web Site Defacement • Hacker deliberately changes the content of Web pages • Caused by breaking into network, accessing Web site files and modifying files • Better known victims include FBI, Goodyear, NY Times, and NASA E-Business Technologies
Hacker Countermeasures • Firewalls designed to resist buffer overflows and other common types of hacker attacks • Firewall types include: • Packet-filtering firewalls • Circuit-level firewalls - verified by TCP, the weakness is that once it is verified subsequent packets are not verified • Application-level firewalls (e-mail, FTP, or some other application) E-Business Technologies
hacking back is illegal Hacker Countermeasures • Network Address Translation uses external IP addresses to hide internal IP addresses • Proxy server uses external IP address to send HTTP request over Internet and forwards responses from HTTP servers to requesting client using internal IP address E-Business Technologies
How Filters Work • A filter is a process or device that screens incoming information • Allows only information that meets specified criteria through • Disabling service ports denies access to HTTP, e-mail from Internet • Restricting access to internal IP addresses hides computers E-Business Technologies
Viruses Standard computer viruses: • Are small, usually destructive, programs that are inserted into other files that then become “infected” • Infect executable programs or operating system files, spreading when infected program executes • Can also spread via e-mail headers or attachments • Can prevent a computer system from booting, erase files or entire hard drives, prevent the saving or printing of files, and send repetitive e-mail messages E-Business Technologies
Worms • Viruses that reside in a computer’s memory replicating itself • Uncontrolled replications consume a computer’s resources, slowing or crashing the system E-Business Technologies
Macro Viruses • A macro virus is a virus that infects macros • Distributed in files such as Word documents or Excel workbooks e-mailed or transferred via floppy disk E-Business Technologies
Trojan Horses • Pretends to be something useful or fun, does something malicious instead • Used to steal passwords, record a user’s keystrokes, locate IP addresses, and plant other destructive programs E-Business Technologies
Wireless Viruses • “Liberty Crack” Palm Trojan, identified in August 2000 • Could delete all applications on a Palm device • “Phage” discovered in September 2000 • Infected Palm operating system applications and documents • Proliferated when users beamed or shared an infected document E-Business Technologies
Virus Hoaxes • Some so-called viruses trumpeted in the media or announced via warning e-mails are just hoaxes • False warnings about viruses proliferate as quickly as real viruses • Creates an atmosphere in which a real virus warning might not be taken seriously • Several antivirus software vendors maintain up-to-date information on viruses, worms, Trojan horses, and hoaxes. This information is available online. E-Business Technologies
Virus Countermeasures • Countermeasures to block infections include: • Antivirus software • Employee education • Installing software updates and patches • User awareness • Use of application software tools • It's not just the job of IT, but of all users E-Business Technologies
Transactional Security • Transactional security includes: • Authentication • Integrity • Nonrepudiation • Confidentiality • Protective measures include: sending and receiving encrypted messages or data, using digital certificates to authenticate the parties involved in the transaction, and storing retained customer information properly E-Business Technologies
Encryption • Cryptography is the art of protecting information by encrypting it • Encryption is the translation of data into a secret code called ciphertext • Ciphertext that is transmitted to its destination and then decrypted (or returned to its unencrypted format) is called plaintext • Both parties in a transaction need access to encryption key • Network encryption uses two keys: a public key to encrypt information and a private key to decrypt it E-Business Technologies
Public Key Infrastructure • An e-business obtains public and private keys from a certificate authority (CA) • Public keys are posted to a public directory • Private keys are given only to the e-business requesting the keys • A digital certificate is the electronic security credential that certifies an entity’s identity E-Business Technologies
How Public Key Encryption Works • Public-key encryption is asymmetric • Uses very large prime numbers to create public keys • Public and private keys are used for the initial session greeting; session keys encrypt and decrypt data • Session keys are shorter keys created and used only during the current session and discarded afterward • In the U.S., session keys usually consist of 16 digits equaling 128 bits, also called 128-bit keys E-Business Technologies
Security Protocols • Secure Sockets Layer (SSL) uses public key encryption and digital certificates; and is included in Web browsers/Web servers • Transport Layer Security (TLS) used to assure no third-party access to Internet communications Uses two protocols: • TLS Record Protocol • TLS Handshake Protocol • Secure Electronic Transactions (SET) protocol used for presenting credit card transaction on the Internet E-Business Technologies
Virtual Private Networks • Virtual Private Networks (VPNs) are private networks that use the Internet to transmit data VPNs use: • Firewalls • Public key encryption • Digital certificates E-Business Technologies
Tunneling • Tunneling encapsulates one protocol within another protocol requires telecomm equipment that supports VPN • VPNs using the Internet encapsulate encrypted data, sending and receiving IP addresses, and a special tunneling protocol within a regular IP packet • Tunneling protocols include: Point-to-Point, GRE, L2TP, and IPSec • Method of data encryption and encapsulation depends on the protocol used E-Business Technologies
Wireless Security • Eavesdropping on early wireless transmissions was fairly simple: • FDMA technologies stayed on one frequency for call duration, required “listening device” that operated on same frequency • TDMA technologies switch can be intercepted using device that listens for one-third of a second and then decompresses signal into full second of speech • CDMA (other current standards) poses more of a challenge, but … not invincible E-Business Technologies
WAP and WTLS • Wireless Transport Layer Security (WTLS) uses encryption and digital certificates • Upon accessing WAP server, WAP client requests secure connection • WAP server responds by sending digital certificate, with public key • WAP client generates encrypted session key to WAP server, which decrypts the key • WAP client/server can send/receive encrypted data for balance of session E-Business Technologies
WLANs and Security • WLANs are most vulnerable at wireless access points • Hackers need only an 802.11b-enabled laptop, an inexpensive antennae, and WLAN access point detection software, such as NetStumbler • Using “meaningful” access point names and “default” settings on wireless access points simplifies hacker’s job • Using Wireless Equivalent Privacy (WEP) security protocol (IEEE 802.11b Wi-Fi) provides encryption and authentication of wireless transmissions E-Business Technologies
IrDA and Bluetooth Security • Short distances and line-of-sight requirements for IrDA devices make “sniffers” impractical • Using laptops with default IrDA port settings in public places (such as airports) automatically allows networking with other IrDA devices without authentication or passwords • Bluetooth uses 128-bit link key, private encryption keys, user PIN and device addresses for transmission security • Bluetooth vulnerability: device address sent with each transmission and user PINs can be compromised easily by theft or loss of device E-Business Technologies
Security Audits • Security audit is a comprehensive review and assessment of an e-business’s security vulnerabilities • A complete security audit should include: reviewing security policies, employee security training, and the physical security of thee-business’s offices and network facilities • Audits can include examining the technical security of a network via penetration testing or actual attempted hacking attacks by security audit personnel E-Business Technologies