SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
Copyright © 2007 Pearson Education, Inc. Slide 5-1
E-commerce
Kenneth C. Laudon
Carol Guercio Traver
business. technology. society.
Second Edition
Copyright © 2007 Pearson Education, Inc. Slide 5-2
Chapter 5
Security and Encryption
Copyright © 2007 Pearson Education, Inc. Slide 5-3
The Merchant Pays
Class Discussion
„ Why are offline credit card security procedures
not applicable in online environment?
„ What new techniques are available to
merchants that would reduce credit card fraud?
„ Why should the merchant bear the risk of online
credit purchases? Why not the issuing banks?
„ What other steps can merchants take to reduce
credit card fraud at their sites?
„ Why are merchants reluctant to add additional
security measures?
Copyright © 2007 Pearson Education, Inc. Slide 5-4
The E-commerce Security Environment: The
Scope of the Problem
„ Overall size of cybercrime unclear; amount of losses
significant but stable; individuals face new risks of
fraud that may involve substantial uninsured losses
„ Symantec: Over 50 overall attacks a day against
business firms between July 2004–June 2005
„ 2005 Computer Security Institute survey
„ 56% of respondents had detected breaches of
computer security within last 12 months and
91% of these suffered financial loss as a result
„ Over 35% experienced denial of service attacks
„ Over 75% detected virus attacks
Copyright © 2007 Pearson Education, Inc. Slide 5-5
The E-commerce Security Environment
Figure 5.4, Page 253
Copyright © 2007 Pearson Education, Inc. Slide 5-6
Dimensions of E-commerce Security
„ Integrity: ability to ensure that information being
displayed on a Web site or transmitted/received over the
Internet has not been altered in any way by an
unauthorized party
„ Nonrepudiation: ability to ensure that e-commerce
participants do not deny (repudiate) online actions
„ Authenticity: ability to identify the identity of a person or
entity with whom you are dealing on the Internet
„ Confidentiality: ability to ensure that messages and data
are available only to those authorized to view them
„ Privacy: ability to control use of information a customer
provides about himself or herself to merchant
„ Availability: ability to ensure that an e-commerce site
continues to function as intended
Copyright © 2007 Pearson Education, Inc. Slide 5-7
Customer and Merchant Perspectives on the
Different Dimensions of E-commerce Security
Table 5.1, Page 254
Copyright © 2007 Pearson Education, Inc. Slide 5-8
The Tension Between Security and
Other Values
„ Security vs. ease of use: the more security
measures that are added, the more difficult a
site is to use, and the slower it becomes
„ Security vs. desire of individuals to act
anonymously
Copyright © 2007 Pearson Education, Inc. Slide 5-9
Security Threats in the E-commerce
Environment
„ Three key points of vulnerability:
ƒ Client
ƒ Server
ƒ Communications channel
Copyright © 2007 Pearson Education, Inc. Slide 5-10
Security Threats in the E-commerce
Environment (cont’d)
„ Most common threats:
ƒ Malicious code
ƒ Phishing
ƒ Hacking and cybervandalism
ƒ Credit card fraud/theft
ƒ Spoofing (pharming)
ƒ Denial of service attacks
ƒ Sniffing
ƒ Insider jobs
ƒ Poorly designed server and client software
Copyright © 2007 Pearson Education, Inc. Slide 5-11
A Typical E-commerce Transaction
Figure 5.5, Page 257
SOURCE: Boncella, 2000.
Copyright © 2007 Pearson Education, Inc. Slide 5-12
Vulnerable Points in an E-commerce
Environment
Figure 5.6, Page 258
SOURCE: Boncella, 2000.
Copyright © 2007 Pearson Education, Inc. Slide 5-13
Malicious Code
„ Viruses: computer program that has ability to
replicate and spread to other files; most also deliver a
“payload” of some sort (may be destructive or
benign); include macro viruses, file-infecting viruses,
and script viruses
„ Worms: designed to spread from computer to
computer
„ Trojan horse: appears to be benign, but then does
something other than expected
„ Bots: can be covertly installed on computer; responds
to external commands sent by the attacker
Copyright © 2007 Pearson Education, Inc. Slide 5-14
Phishing
„ Any deceptive, online attempt by a third party
to obtain confidential information for financial
gain
„ Most popular type: e-mail scam letter
„ One of fastest growing forms of e-
commerce crime
Copyright © 2007 Pearson Education, Inc. Slide 5-15
Hacking and Cybervandalism
„ Hacker: Individual who intends to gain
unauthorized access to computer systems
„ Cracker: Used to denote hacker with criminal
intent (two terms often used interchangeably)
„ Cybervandalism: Intentionally disrupting,
defacing or destroying a Web site
„ Types of hackers include:
ƒ White hats
ƒ Black hats
ƒ Grey hats
Copyright © 2007 Pearson Education, Inc. Slide 5-16
Credit Card Fraud
„ Fear that credit card information will be stolen
deters online purchases
„ Hackers target credit card files and other
customer information files on merchant
servers; use stolen data to establish credit
under false identity
„ One solution: New identity verification
mechanisms
Copyright © 2007 Pearson Education, Inc. Slide 5-17
Insight on Society: “Evil Twins” and
“Pharming”: Keeping Up with the
Hackers?
Class Discussion
„ What are “evil twins” and “pharming”
„ What is meant by “social engineering techniques?”
„ What is the security weakness in the domain name
system that permits pharming?
„ What steps can users take to verify they are
communicating with authentic sites and networks?
Copyright © 2007 Pearson Education, Inc. Slide 5-18
Spoofing (Pharming)
„ Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else
„ Threatens integrity of site; authenticity
Copyright © 2007 Pearson Education, Inc. Slide 5-19
DoS and dDoS Attacks
„ Denial of service (DoS) attack: Hackers flood
Web site with useless traffic to inundate and
overwhelm network
„ Distributed denial of service (dDoS) attack:
hackers use numerous computers to attack
target network from numerous launch points
Copyright © 2007 Pearson Education, Inc. Slide 5-20
Other Security Threats
„ Sniffing: Type of eavesdropping program that
monitors information traveling over a network;
enables hackers to steal proprietary
information from anywhere on a network
„ Insider jobs: Single largest financial threat
„ Poorly designed server and client software:
Increase in complexity of software programs
has contributed to an increase is
vulnerabilities that hackers can exploit
Copyright © 2007 Pearson Education, Inc. Slide 5-21
Technology Solutions
„ Protecting Internet communications
(encryption)
„ Securing channels of communication (SSL,
S-HTTP, VPNs)
„ Protecting networks (firewalls)
„ Protecting servers and clients
Copyright © 2007 Pearson Education, Inc. Slide 5-22
Tools Available to Achieve Site Security
Figure 5.7, Page 269
Copyright © 2007 Pearson Education, Inc. Slide 5-23
Protecting Internet Communications:
Encryption
„ Encryption: The process of transforming plain text or
data into cipher text that cannot be read by anyone
other than the sender and receiver
„ Purpose: Secure stored information and information
transmission
„ Provides:
ƒ Message integrity
ƒ Nonrepudiation
ƒ Authentication
ƒ Confidentiality
Copyright © 2007 Pearson Education, Inc. Slide 5-24
Symmetric Key Encryption
„ Also known as secret key encryption
„ Both the sender and receiver use the same
digital key to encrypt and decrypt message
„ Requires a different set of keys for each
transaction
„ Data Encryption Standard (DES): Most widely
used symmetric key encryption today; uses
56-bit encryption key; other types use 128-bit
keys up through 2048 bits
Copyright © 2007 Pearson Education, Inc. Slide 5-25
Public Key Encryption
„ Public key cryptography solves symmetric key
encryption problem of having to exchange secret key
„ Uses two mathematically related digital keys – public
key (widely disseminated) and private key (kept
secret by owner)
„ Both keys are used to encrypt and decrypt message
„ Once key is used to encrypt message, same key
cannot be used to decrypt message
„ For example, sender uses recipient’s public key to
encrypt message; recipient uses his/her private key
to decrypt it
Copyright © 2007 Pearson Education, Inc. Slide 5-26
Public Key Cryptography – A Simple Case
Figure 5.8, Page 272
Copyright © 2007 Pearson Education, Inc. Slide 5-27
Public Key Encryption using Digital
Signatures and Hash Digests
„ Application of hash function (mathematical
algorithm) by sender prior to encryption
produces hash digest that recipient can use
to verify integrity of data
„ Double encryption with sender’s private key
(digital signature) helps ensure authenticity
and nonrepudiation
Copyright © 2007 Pearson Education, Inc. Slide 5-28
Public Key Cryptography with Digital
Signatures
Figure 5.9, Page 274
Copyright © 2007 Pearson Education, Inc. Slide 5-29
Digital Envelopes
„ Addresses weaknesses of public key
encryption (computationally slow, decreases
transmission speed, increases processing
time) and symmetric key encryption (faster,
but more secure)
„ Uses symmetric key encryption to encrypt
document but public key encryption to
encrypt and send symmetric key
Copyright © 2007 Pearson Education, Inc. Slide 5-30
Public Key Cryptography: Creating a
Digital Envelope
Figure 5.10, Page 275
Copyright © 2007 Pearson Education, Inc. Slide 5-31
Digital Certificates and Public Key
Infrastructure (PKI)
„ Digital certificate: Digital document that includes:
ƒ Name of subject or company
ƒ Subject’s public key
ƒ Digital certificate serial number
ƒ Expiration date
ƒ Issuance date
ƒ Digital signature of certification authority (trusted
third party institution) that issues certificate
ƒ Other identifying information
„ Public Key Infrastructure (PKI): refers to the CAs and
digital certificate procedures that are accepted by all
parties
Copyright © 2007 Pearson Education, Inc. Slide 5-32
Digital Certificates and Certification
Authorities
Figure 5.11, Page 277
Copyright © 2007 Pearson Education, Inc. Slide 5-33
Limits to Encryption Solutions
„ PKI applies mainly to protecting messages in
transit
„ PKI is not effective against insiders
„ Protection of private keys by individuals may be
haphazard
„ No guarantee that verifying computer of merchant
is secure
„ CAs are unregulated, self-selecting organizations
Copyright © 2007 Pearson Education, Inc. Slide 5-34
Insight on Technology: Advances in
Quantum Cryptography May Lead to the
Unbreakable Key
Class Discussion
„ Why are existing encryption systems over
time more vulnerable?
„ What is quantum encryption?
„ What is the weakness of a symmetric key
system (even one based on quantum
techniques)?
„ Would quantum-encrypted messages be
immune to the growth in computing power?
Copyright © 2007 Pearson Education, Inc. Slide 5-35
Securing Channels of Communication
„ Secure Sockets Layer (SSL): Most common form of
securing channels of communication; used to
establish a secure negotiated session (client-server
session in which URL of requested document, along
with contents, is encrypted)
„ S-HTTP: Alternative method; provides a secure
message-oriented communications protocol designed
for use in conjunction with HTTP
„ Virtual Private Networks (VPNs): Allow remote users
to securely access internal networks via the Internet,
using Point-to-Point Tunneling Protocol (PPTP)
Copyright © 2007 Pearson Education, Inc. Slide 5-36
Secure Negotiated Sessions Using SSL
Figure 5.12, Page 281
Copyright © 2007 Pearson Education, Inc. Slide 5-37
Protecting Networks: Firewalls and
Proxy Servers
„ Firewall: Hardware or software filters communications
packets and prevents some packets from entering
the network based on a security policy
„ Firewall methods include:
ƒ Packet filters
ƒ Application gateways
„ Proxy servers: Software servers that handle all
communications originating from or being sent to the
Internet
Copyright © 2007 Pearson Education, Inc. Slide 5-38
Firewalls and Proxy Servers
Figure 5.13, Page 283
Copyright © 2007 Pearson Education, Inc. Slide 5-39
Protecting Servers and Clients
„ Operating system controls: Authentication
and access control mechanisms
„ Anti-virus software: Easiest and least
expensive way to prevent threats to system
integrity
Copyright © 2007 Pearson Education, Inc. Slide 5-40
A Security Plan: Management Policies
„ Steps in developing a security plan
ƒ Perform risk assessment: assessment of risks and
points of vulnerability
ƒ Develop security policy: set of statements prioritizing
information risks, identifying acceptable risk targets, and
identifying mechanisms for achieving targets
ƒ Develop implementation plan: action steps needed to
achieve security plan goals
ƒ Create security organization: in charge of security;
educates and trains users, keeps management aware of
security issues; administers access controls,
authentication procedures and authorization policies
ƒ Perform security audit: review of security practices and
procedures
Copyright © 2007 Pearson Education, Inc. Slide 5-41
Developing an E-commerce Security
Plan
Figure 5.14, Page 286
Copyright © 2007 Pearson Education, Inc. Slide 5-42
Insight on Business: Hiring Hackers to
Locate Threats: Penetration Testing
Class Discussion
„ Why would firms hire outsiders to crash its
systems?
„ What are “grey” and “black” hats and why do
firms avoid them as security testers?
„ Are penetration specialists like Johnny Long
performing a public service or just making the
situation worse?
Copyright © 2007 Pearson Education, Inc. Slide 5-43
The Role of Laws and Public Policy
„ New laws have granted local and national authorities
new tools and mechanisms for identifying, tracing
and prosecuting cybercriminals
„ National Infrastructure Protection Center – unit
within National Cyber Security Division of
Department of Homeland Security whose mission
is to identify and combat threats against U.S.
technology and telecommunications infrastructure
„ USA Patriot Act
„ Homeland Security Act
„ Government policies and controls on encryption
software
Copyright © 2007 Pearson Education, Inc. Slide 5-44
OECD Guidelines
„ 2002 Organization for Economic Cooperation and
Development (OECD) Guidelines for the Security of
Information Systems and Networks has nine
principles:
ƒ Awareness
ƒ Responsibility
ƒ Response
ƒ Ethics
ƒ Democracy
ƒ Risk assessment
ƒ Security design and implementation
ƒ Security management
ƒ Reassessment

Contenu connexe

Similaire à Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio Traverbusiness. technology. society.Second Edition

04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Secure E-Commerce Protocol
Secure E-Commerce ProtocolSecure E-Commerce Protocol
Secure E-Commerce ProtocolCSCJournals
 
Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05BookStoreLib
 
Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05BookStoreLib
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05BookStoreLib
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 

Similaire à Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio Traverbusiness. technology. society.Second Edition (20)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Secure E-Commerce Protocol
Secure E-Commerce ProtocolSecure E-Commerce Protocol
Secure E-Commerce Protocol
 
Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05
 
Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05
 
Security in it
Security in it Security in it
Security in it
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
Security environment
Security environmentSecurity environment
Security environment
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 

Dernier

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Dernier (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio Traverbusiness. technology. society.Second Edition

  • 1. Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition
  • 2. Copyright © 2007 Pearson Education, Inc. Slide 5-2 Chapter 5 Security and Encryption
  • 3. Copyright © 2007 Pearson Education, Inc. Slide 5-3 The Merchant Pays Class Discussion „ Why are offline credit card security procedures not applicable in online environment? „ What new techniques are available to merchants that would reduce credit card fraud? „ Why should the merchant bear the risk of online credit purchases? Why not the issuing banks? „ What other steps can merchants take to reduce credit card fraud at their sites? „ Why are merchants reluctant to add additional security measures?
  • 4. Copyright © 2007 Pearson Education, Inc. Slide 5-4 The E-commerce Security Environment: The Scope of the Problem „ Overall size of cybercrime unclear; amount of losses significant but stable; individuals face new risks of fraud that may involve substantial uninsured losses „ Symantec: Over 50 overall attacks a day against business firms between July 2004–June 2005 „ 2005 Computer Security Institute survey „ 56% of respondents had detected breaches of computer security within last 12 months and 91% of these suffered financial loss as a result „ Over 35% experienced denial of service attacks „ Over 75% detected virus attacks
  • 5. Copyright © 2007 Pearson Education, Inc. Slide 5-5 The E-commerce Security Environment Figure 5.4, Page 253
  • 6. Copyright © 2007 Pearson Education, Inc. Slide 5-6 Dimensions of E-commerce Security „ Integrity: ability to ensure that information being displayed on a Web site or transmitted/received over the Internet has not been altered in any way by an unauthorized party „ Nonrepudiation: ability to ensure that e-commerce participants do not deny (repudiate) online actions „ Authenticity: ability to identify the identity of a person or entity with whom you are dealing on the Internet „ Confidentiality: ability to ensure that messages and data are available only to those authorized to view them „ Privacy: ability to control use of information a customer provides about himself or herself to merchant „ Availability: ability to ensure that an e-commerce site continues to function as intended
  • 7. Copyright © 2007 Pearson Education, Inc. Slide 5-7 Customer and Merchant Perspectives on the Different Dimensions of E-commerce Security Table 5.1, Page 254
  • 8. Copyright © 2007 Pearson Education, Inc. Slide 5-8 The Tension Between Security and Other Values „ Security vs. ease of use: the more security measures that are added, the more difficult a site is to use, and the slower it becomes „ Security vs. desire of individuals to act anonymously
  • 9. Copyright © 2007 Pearson Education, Inc. Slide 5-9 Security Threats in the E-commerce Environment „ Three key points of vulnerability: ƒ Client ƒ Server ƒ Communications channel
  • 10. Copyright © 2007 Pearson Education, Inc. Slide 5-10 Security Threats in the E-commerce Environment (cont’d) „ Most common threats: ƒ Malicious code ƒ Phishing ƒ Hacking and cybervandalism ƒ Credit card fraud/theft ƒ Spoofing (pharming) ƒ Denial of service attacks ƒ Sniffing ƒ Insider jobs ƒ Poorly designed server and client software
  • 11. Copyright © 2007 Pearson Education, Inc. Slide 5-11 A Typical E-commerce Transaction Figure 5.5, Page 257 SOURCE: Boncella, 2000.
  • 12. Copyright © 2007 Pearson Education, Inc. Slide 5-12 Vulnerable Points in an E-commerce Environment Figure 5.6, Page 258 SOURCE: Boncella, 2000.
  • 13. Copyright © 2007 Pearson Education, Inc. Slide 5-13 Malicious Code „ Viruses: computer program that has ability to replicate and spread to other files; most also deliver a “payload” of some sort (may be destructive or benign); include macro viruses, file-infecting viruses, and script viruses „ Worms: designed to spread from computer to computer „ Trojan horse: appears to be benign, but then does something other than expected „ Bots: can be covertly installed on computer; responds to external commands sent by the attacker
  • 14. Copyright © 2007 Pearson Education, Inc. Slide 5-14 Phishing „ Any deceptive, online attempt by a third party to obtain confidential information for financial gain „ Most popular type: e-mail scam letter „ One of fastest growing forms of e- commerce crime
  • 15. Copyright © 2007 Pearson Education, Inc. Slide 5-15 Hacking and Cybervandalism „ Hacker: Individual who intends to gain unauthorized access to computer systems „ Cracker: Used to denote hacker with criminal intent (two terms often used interchangeably) „ Cybervandalism: Intentionally disrupting, defacing or destroying a Web site „ Types of hackers include: ƒ White hats ƒ Black hats ƒ Grey hats
  • 16. Copyright © 2007 Pearson Education, Inc. Slide 5-16 Credit Card Fraud „ Fear that credit card information will be stolen deters online purchases „ Hackers target credit card files and other customer information files on merchant servers; use stolen data to establish credit under false identity „ One solution: New identity verification mechanisms
  • 17. Copyright © 2007 Pearson Education, Inc. Slide 5-17 Insight on Society: “Evil Twins” and “Pharming”: Keeping Up with the Hackers? Class Discussion „ What are “evil twins” and “pharming” „ What is meant by “social engineering techniques?” „ What is the security weakness in the domain name system that permits pharming? „ What steps can users take to verify they are communicating with authentic sites and networks?
  • 18. Copyright © 2007 Pearson Education, Inc. Slide 5-18 Spoofing (Pharming) „ Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else „ Threatens integrity of site; authenticity
  • 19. Copyright © 2007 Pearson Education, Inc. Slide 5-19 DoS and dDoS Attacks „ Denial of service (DoS) attack: Hackers flood Web site with useless traffic to inundate and overwhelm network „ Distributed denial of service (dDoS) attack: hackers use numerous computers to attack target network from numerous launch points
  • 20. Copyright © 2007 Pearson Education, Inc. Slide 5-20 Other Security Threats „ Sniffing: Type of eavesdropping program that monitors information traveling over a network; enables hackers to steal proprietary information from anywhere on a network „ Insider jobs: Single largest financial threat „ Poorly designed server and client software: Increase in complexity of software programs has contributed to an increase is vulnerabilities that hackers can exploit
  • 21. Copyright © 2007 Pearson Education, Inc. Slide 5-21 Technology Solutions „ Protecting Internet communications (encryption) „ Securing channels of communication (SSL, S-HTTP, VPNs) „ Protecting networks (firewalls) „ Protecting servers and clients
  • 22. Copyright © 2007 Pearson Education, Inc. Slide 5-22 Tools Available to Achieve Site Security Figure 5.7, Page 269
  • 23. Copyright © 2007 Pearson Education, Inc. Slide 5-23 Protecting Internet Communications: Encryption „ Encryption: The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and receiver „ Purpose: Secure stored information and information transmission „ Provides: ƒ Message integrity ƒ Nonrepudiation ƒ Authentication ƒ Confidentiality
  • 24. Copyright © 2007 Pearson Education, Inc. Slide 5-24 Symmetric Key Encryption „ Also known as secret key encryption „ Both the sender and receiver use the same digital key to encrypt and decrypt message „ Requires a different set of keys for each transaction „ Data Encryption Standard (DES): Most widely used symmetric key encryption today; uses 56-bit encryption key; other types use 128-bit keys up through 2048 bits
  • 25. Copyright © 2007 Pearson Education, Inc. Slide 5-25 Public Key Encryption „ Public key cryptography solves symmetric key encryption problem of having to exchange secret key „ Uses two mathematically related digital keys – public key (widely disseminated) and private key (kept secret by owner) „ Both keys are used to encrypt and decrypt message „ Once key is used to encrypt message, same key cannot be used to decrypt message „ For example, sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it
  • 26. Copyright © 2007 Pearson Education, Inc. Slide 5-26 Public Key Cryptography – A Simple Case Figure 5.8, Page 272
  • 27. Copyright © 2007 Pearson Education, Inc. Slide 5-27 Public Key Encryption using Digital Signatures and Hash Digests „ Application of hash function (mathematical algorithm) by sender prior to encryption produces hash digest that recipient can use to verify integrity of data „ Double encryption with sender’s private key (digital signature) helps ensure authenticity and nonrepudiation
  • 28. Copyright © 2007 Pearson Education, Inc. Slide 5-28 Public Key Cryptography with Digital Signatures Figure 5.9, Page 274
  • 29. Copyright © 2007 Pearson Education, Inc. Slide 5-29 Digital Envelopes „ Addresses weaknesses of public key encryption (computationally slow, decreases transmission speed, increases processing time) and symmetric key encryption (faster, but more secure) „ Uses symmetric key encryption to encrypt document but public key encryption to encrypt and send symmetric key
  • 30. Copyright © 2007 Pearson Education, Inc. Slide 5-30 Public Key Cryptography: Creating a Digital Envelope Figure 5.10, Page 275
  • 31. Copyright © 2007 Pearson Education, Inc. Slide 5-31 Digital Certificates and Public Key Infrastructure (PKI) „ Digital certificate: Digital document that includes: ƒ Name of subject or company ƒ Subject’s public key ƒ Digital certificate serial number ƒ Expiration date ƒ Issuance date ƒ Digital signature of certification authority (trusted third party institution) that issues certificate ƒ Other identifying information „ Public Key Infrastructure (PKI): refers to the CAs and digital certificate procedures that are accepted by all parties
  • 32. Copyright © 2007 Pearson Education, Inc. Slide 5-32 Digital Certificates and Certification Authorities Figure 5.11, Page 277
  • 33. Copyright © 2007 Pearson Education, Inc. Slide 5-33 Limits to Encryption Solutions „ PKI applies mainly to protecting messages in transit „ PKI is not effective against insiders „ Protection of private keys by individuals may be haphazard „ No guarantee that verifying computer of merchant is secure „ CAs are unregulated, self-selecting organizations
  • 34. Copyright © 2007 Pearson Education, Inc. Slide 5-34 Insight on Technology: Advances in Quantum Cryptography May Lead to the Unbreakable Key Class Discussion „ Why are existing encryption systems over time more vulnerable? „ What is quantum encryption? „ What is the weakness of a symmetric key system (even one based on quantum techniques)? „ Would quantum-encrypted messages be immune to the growth in computing power?
  • 35. Copyright © 2007 Pearson Education, Inc. Slide 5-35 Securing Channels of Communication „ Secure Sockets Layer (SSL): Most common form of securing channels of communication; used to establish a secure negotiated session (client-server session in which URL of requested document, along with contents, is encrypted) „ S-HTTP: Alternative method; provides a secure message-oriented communications protocol designed for use in conjunction with HTTP „ Virtual Private Networks (VPNs): Allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocol (PPTP)
  • 36. Copyright © 2007 Pearson Education, Inc. Slide 5-36 Secure Negotiated Sessions Using SSL Figure 5.12, Page 281
  • 37. Copyright © 2007 Pearson Education, Inc. Slide 5-37 Protecting Networks: Firewalls and Proxy Servers „ Firewall: Hardware or software filters communications packets and prevents some packets from entering the network based on a security policy „ Firewall methods include: ƒ Packet filters ƒ Application gateways „ Proxy servers: Software servers that handle all communications originating from or being sent to the Internet
  • 38. Copyright © 2007 Pearson Education, Inc. Slide 5-38 Firewalls and Proxy Servers Figure 5.13, Page 283
  • 39. Copyright © 2007 Pearson Education, Inc. Slide 5-39 Protecting Servers and Clients „ Operating system controls: Authentication and access control mechanisms „ Anti-virus software: Easiest and least expensive way to prevent threats to system integrity
  • 40. Copyright © 2007 Pearson Education, Inc. Slide 5-40 A Security Plan: Management Policies „ Steps in developing a security plan ƒ Perform risk assessment: assessment of risks and points of vulnerability ƒ Develop security policy: set of statements prioritizing information risks, identifying acceptable risk targets, and identifying mechanisms for achieving targets ƒ Develop implementation plan: action steps needed to achieve security plan goals ƒ Create security organization: in charge of security; educates and trains users, keeps management aware of security issues; administers access controls, authentication procedures and authorization policies ƒ Perform security audit: review of security practices and procedures
  • 41. Copyright © 2007 Pearson Education, Inc. Slide 5-41 Developing an E-commerce Security Plan Figure 5.14, Page 286
  • 42. Copyright © 2007 Pearson Education, Inc. Slide 5-42 Insight on Business: Hiring Hackers to Locate Threats: Penetration Testing Class Discussion „ Why would firms hire outsiders to crash its systems? „ What are “grey” and “black” hats and why do firms avoid them as security testers? „ Are penetration specialists like Johnny Long performing a public service or just making the situation worse?
  • 43. Copyright © 2007 Pearson Education, Inc. Slide 5-43 The Role of Laws and Public Policy „ New laws have granted local and national authorities new tools and mechanisms for identifying, tracing and prosecuting cybercriminals „ National Infrastructure Protection Center – unit within National Cyber Security Division of Department of Homeland Security whose mission is to identify and combat threats against U.S. technology and telecommunications infrastructure „ USA Patriot Act „ Homeland Security Act „ Government policies and controls on encryption software
  • 44. Copyright © 2007 Pearson Education, Inc. Slide 5-44 OECD Guidelines „ 2002 Organization for Economic Cooperation and Development (OECD) Guidelines for the Security of Information Systems and Networks has nine principles: ƒ Awareness ƒ Responsibility ƒ Response ƒ Ethics ƒ Democracy ƒ Risk assessment ƒ Security design and implementation ƒ Security management ƒ Reassessment