250 likes | 382 Views
NBA 600: Session 20 Privacy and Security 3 April 2003. Daniel Huttenlocher. Today’s Class. Privacy and security in a networked world Terminology and definitions Importance for customers and for risk management Some technology for information security Encryption, public key cryptosystems
E N D
NBA 600: Session 20Privacy and Security3 April 2003 Daniel Huttenlocher
Today’s Class • Privacy and security in a networked world • Terminology and definitions • Importance for customers and for risk management • Some technology for information security • Encryption, public key cryptosystems • Digital signatures • Digital certificates • How E Commerce security works on the Web • SSL
Information Security • Widespread transmission and storage of information increases problems of • Privacy • Freedom from unwanted intrusion, observation or disclosure • Confidentiality • Discretion in keeping information private • Security: means of protecting privacy and confidentiality • Policies, set by management • Procedures, to be followed by employees • Safeguards, physical or electronic
Privacy and Confidentiality • Rights and expectations • Disclosure of certain information is protected by law or contract • Personal: e.g., medical records, educational records • Institutional: e.g., government secrets, corporate secrets • People in many societies expect information about them should • not be collected or used without their knowledge or approval • not be used to harm them or their reputation • be accurate, verifiable and correctable
How Concerned Are You? • Privacy and confidentiality of your • Shopping transactions • Behavior/likes • Spending • Credit/payment information • Medical records • Educational records • Employment or military service records • Asset and tax information • How publicly available • Someone you didn’t authorize (who pays $300) • On the Internet for all to see
Impact on Behavior • Fear of stolen credit card information still a major reason for not shopping online • One of most cited in surveys of shoppers • Widespread suspicion of “cookies” in Web browsers • Although often not understood • Europeans much more sensitive than Americans to privacy of transaction history • E.g., shoppers clubs, credit card profiling • Their laws reflect this • E.g., changes to Microsoft Passport
Scope of Security Problems • Generally believed to be under-reported • Breaches and financial impact both increasing • Highlights of annual CSI/FBI 2002 survey • Polled 503 US security experts/officers • 90% detected breaches in past 12 mos. • 80% acknowledge financial loss as result • 44% were willing to quantify loss • Totaling $456 million • 74% cited Internet as frequent point of attack (and 33% internal systems) • 34% reported intrusions to law enforcement
Information Security Terms • Availability • What information is collected • How long it is kept • Authentication • Validation of who is accessing or creating info • Verify not identify (easier problem to solve) • Authorization • Controlling access, creation or modification • Accountability • Tracking access, creation or modification • Non-deniability
Information Security Controls • Management • Information security risk assessment • E.g., think of in terms of insurance coverage • Establishment of policies • Operational • Adherence to policies by those with (potential) access to information • Technical • Computer or physical security systems • E.g., locks, passwords, encryption
Kinds of Security Policies • What information is gathered • How long to store information • Anonymity of stored information • Who has access (authorization) • How access is authenticated • Where can access from • How or when information can be copied • Integrity or validity of information • Tracking creation, access and modification • Training and awareness • Choice of technologies
Technical Controls • Authentication (none foolproof) • Token based • What you have; e.g., key, secureID card • Can be copied or stolen • Knowledge based • What you know; e.g., password • Can be gleaned • Identity based • Who you are; e.g., signature, fingerprint • Can be wrong (statistical methods, experts) • Multi-factor • Combination of two or more types
Technical Controls • Authorization • Generally based on preventing access to the content without authentication and permission • Protecting content usually involves encryption • Convert content to a form where it cannot easily be decoded • Cryptography • Techniques for encryption and decryption • Traditionally used primarily by governments • For communication over insecure channels • Now a cornerstone of electronic commerce
Corporate Network Security • Most companies rely primarily on “perimeter protection” • Password authentication for internal security • Firewalls to isolate corporate network from public Internet • Stronger authentication such as secureID for external access (token based) • Rapidly becoming more porous as access to networked resources more central • Employees need access from home or road • VPN (virtual private network) • Web-based access
Electronic Commerce Security • Transaction security • Ensuring transaction cannot be monitored by third party • Knowing who you are transacting with • Ensuring transaction cannot be modified by third party • Information security • Protecting privacy of information during and after transaction • Credit card or payment data • Purchase history • Browsing history
Transaction Security • Cryptography can be used to ensure transaction • Not monitored • Not tampered with • Involves those who claim to be involved • Not foolproof • As with all security systems can be broken but make it difficult • Should be at least as secure as good offline transaction • Physical rather than electronic security
Traditional Cryptography • Cryptographic algorithm or cipher • Mathematical function that converts plaintext to ciphertext and vice versa • Ciphertext cannot be read by outside observers • Encryption: key+plaintext -> ciphertext • Decryption: key+ciphertext -> plaintext • Sender encrypts, receiver decrypts • Shared key(s) known to sender and receiver • Sometimes called symmetric encryption • Used to protect information sent over un-trusted channels • E.g., Enigma used by Germans in WWII
Not Useful for E-Commerce • In principle could be used to ensure security of data sent over the Internet • Not monitored • Not tampered with • Sender and recipient authorized • However requires secret key(s) known to both parties • Not practical to exchange keys safely • Via physical mail, telephone? • How installed on computer? • Using multiple or shared computers?
Public Key Cryptography • Invented by Diffie and Hellman, early ’70’s • Encryption key is public • Known to anyone, but specific to recipient • Decryption key is private • Known only to recipient • Encryption and decryption keys come in pairs • Only private key can decrypt messages that were encrypted with corresponding public key • Knowing public key does not make it easy to determine private key • RSA, most widely used schemes depends on difficulty of factoring large numbers
Illustration of Public Key • An integer and its factor can be used as pair of public and private keys • Say my public key is 224286607 • My private key is a factor of this • Public key divided by private key is an integer • Still hard to determine my private key as long as I keep it secret • This public key is actually small • Only 28 bits (smaller than 228) • 9 decimal digits • Keys used in Web transactions are 128 bits • 39 decimal digits 11243
Public Key Encryption on Web • Secure Web sites • Data encrypted using SSL (Secure Socket Layer) • Same data transfer but encrypted • URL’s start with https:// rather than http:// • Shows up with “padlock” in browser status bar • Hybrid scheme where public key encryption used to exchange shared keys • Traditional (symmetric) encryption considerably faster than public key • Use public key as way of safely sending keys for symmetric encryption
Still a Problem Though • Use of public key means recipient could be anyone – no way to validate just get key • Unlike traditional cryptography where shared secret “identifies” parties as trusted • Some public key schemes, such as RSA, can be used to solve this • Generate what is called a digital signature • These are beginning to be recognized in laws and contracts as binding • Use digital signature to create authenticated certificate with recipient’s public key • Signed by a recognized certificate authority
Digital Signatures • Sender uses their private key to encrypt the message • Usually encrypt something short computed from the message because its cheaper • Called a “hash” • Sends to recipient • Recipient uses senders public key to decrypt in order to validate from sender • Get this key from someplace trusted • If they get the correct message or “hash” then must have been sent with sender’s private key
Digital Certificates • Set of trusted authorities • Known to client software such as IE • Stores public key of each authority • An authority issues a certificate to the operator of a Web site • Digitally signed (with authority’s private key) • Contains public key of Web site operator • For a fee: e.g., currently VeriSign charges $900/yr for 128-bit certificate • When Web browser connects to a secure site it receives the certificate • Uses authority’s public key to validate
SSL Encryption Setup • Before “padlock” appears on browser: • Client contacts server gets certificate, validates it (1-3) • Client sends encrypted secret data, server decrypts, both create shared keys (4-6) • Encrypted data transfer begins (7) • Generally takes under a second Source: CacheFlow
Some Main Players in Security • VeriSign (VRSN) • Digital trust services • $1.2B/yr revenue, up 24% y-o-y (acquisition) • $2.3B market cap • CheckPoint Software (CHKP) • Firewalls • $427M/yr revenue, down 19% y-o-y • $3.9B market cap • RSA Security (RSAS) • E-Security solutions (e.g., secureID) • $230M/yr revenue, down 18% y-o-y • $420M market cap