ECOM6013 E-Commerce Technologies
Topic 6 E-Commerce Security
Good E-Commerce Security
- Highest degree of security
- New technologies
- Organizational policies and procedures
- Industry standards and government law
- Other factors
- Cost of security vs. potential loss
- Security often breaks at weakest link
The Tense Between Security and Other Values
- Security vs. Easy of use
- More Secure -> More difficult to use + slower
- Security vs. Desire of individuals to act anonmously
Basic E-Commerce Security Issues and Landscape
- E-Commerce security requirements
- Authentication (verify the real identity)
- Authorization (determine the entity’s access)
- Auditing
- Availability
- Nonrepudiation (assurance that trading partners can’t falsely deny their purchase or transaction)
- Risk (a vulnerability will be known and used)
- Social engineering (non-technical attack, trick users to do some certain actions)
- Spam
E-Commerce of Today
- Threats
- Money thefts
- Identity thefts
- Malware
- Solutions
- Authentication
- Intrusion checking
- Firewalls
- Education
Security Threats in the E-Commerce Environment
- Three key points of vulnerability
- Client
- Server
- Communication pipeline (network channels)
Most Common Security Threats
- Malicious code
- Viruses
- Worms
- Ransomeware
- Trojan horses
- Backdoors
- Bots, botnets
- Unwanted programs
- Browser parasites
- Adware
- Spyware
- Phishing
- Deceptive online attack to obtain confidential information
- Social engineering, e-mail scams, spoofing legitimate websites
- Used for identity fraud and theft
- Hacking and cybervandalism
- Hackers vs. Crackers
- Cybervandalism (intentionally disrupting, defacing, destroying websites)
- Hacktivism
- Data breach
- Credit card fraud/theft
- Spoofing
- Pharming
- Spam / junk websites
- Denial of sevices (DoS) attack (useless traffic to overwhelm network)
- Distributed denial of service (DDoS) attack (multiple computers to attack target network)
- Sniffing (eavesdropping program that monitors information traveling over a network)
- Insider jobs
- Single financial threats
- Poorly designed security policy and server / client software
- Social network issues
- Mobile platform issues
- Cloud security issues
- IoT security issues
The Information Assurance Model and Defense Objectives
- CIA security triad
- Confidentiality
- Integrity
- Availability
Three Dimensions in Internet Security
- Integrity
- Nonrepudiation
- Authenticity
- Confidentiality
- Privacy
- Availability
Technology Solutions
- Protecting internet communications
- Cryptography
- Securing channels of communication
- SSL, TLS
- Establishes a secure, negotiated client-server session in which URL of requested document, along with contents, is encrypted
- S-HTTP
- Provides a secure message-oriented communications protocol designed for use in conjunction with HTTP
- VPNs
- Allows remote users to securely access internal network via the Internet, using Point-to-Point Tunneling Protocol (PPTP)
- Wi-Fi
- SSL, TLS
- Protecting networks
- Firewalls
- Proxy servers
- Intrusion Detection System (IDS)
- Protecting servers and clients
- OS security
- Upgrades
- Patches
- Anti-virus software
- Easiest and least expensive way to prevent threats to system integrity
- Requires daily updates
- OS security
Managing Risks
- Technology
- Effective management policies
- Public laws and active enforcement
A Security Plan: Management Policies
- Risk assessment
- Security policy
- Implementation plan
- Security organization
- Access controls
- Authentication procedures, including biometrics
- Authorization policies, authorization management systems
- Security audit
Basic Concepts of User Authentication
- Something you know
- Password
- PIN
- OTP
- …
- Something you have
- Physical key
- Token
- Magnetic card
- Smartcard
- …
- Something you are
- Fingerprint
- Voice
- …
Best use 2 Factors Authentication (2FA)
Encryption
- Transfer data into cipher text readable only by sender and receiver
- Secures stored information and information transmission
- Provide 4/6 key dimensions of E-Commerce security
- authentication
- Confidentiality
- Message Integrity
- Nonrepudiation
Symmetric Key Cryptography
- Sender and receiver use same digital key to encrypt and decrypt message
- Requires different set of keys for each transaction
- Strength of encryption
- Length of binary key used to encrypt data
- Standards
- Data Encryption Standard (DES, 1977)
- Advanced Encryption Standard (AES, 2000)
- Other standards use keys with up to 2,048 bits
Public Key Cryptography
- Uses two mathematically related digital keys
- Public key (widely disseminated)
- Private key (kept secret by owner)
- Both keys used to encrypt and decrypt message
- Once key used to encrypt message, same key cannot be used to decrypt message
- Sender uses recipient’s public key to encrypt message
- Recipient uses his/her private key to decrypt it
Public Key Encryption Using Digital Signatures and Hash Digests
- Hash function
- Mathematical algorithm (e.g. MD5 and SHA-1) that produces fixed-length number called message or hash digest
- Sender applies hash function to the message and then encrypts the message AND the hash digest with recipient’s public key
- Sender then encrypts the whole package with sender’s private key, creating digital signature for authenticity, nonrepudiation
- Recipient first uses sender’s public key to authenticate the message and then the recipient’s private key to decrypt the hash digest and the message
Digital Envelop
- Addresses weaknesses of
- Public key encryption (computationally slow)
- Symmetric key encryption (insecure transmission lines)
- Uses symmetric key encryption to encrypt document
- Uses public key encryption to encrypt and send symmetric key
Digital Certificates and Public Key Infrastructure (PKI)
- Digital certificate
- Name of subjects/company
- Subject’s public key
- Digital certificate serial number
- Expiration date, issuance date
- Digital signature of certification authority (trusted third party institution) that issues certificate
- Public Key Infrastructure (PKI)
- CAs and digital certificate procedures that are accepted by all parties
Limits to Encryption Solutions
- Doesn’t protect storage of private key
- No guarantee that verifying computer of merchant is secure
- CAs are unregulated, self-selecting organizations