Secure Electronic Transaction
Secure Electronic Transaction
Protocol
Secure Electronic Transaction or SET is a system that ensures the security and
integrity of electronic transactions done using credit cards in a scenario. SET is not
some system that enables payment but it is a security protocol applied to those
payments. It uses different encryption and hashing techniques to secure payments over
the internet done through credit cards. The SET protocol was supported in
development by major organizations like Visa, Mastercard, and Microsoft which
provided its Secure Transaction Technology (STT), and Netscape which provided the
technology of Secure Socket Layer (SSL).
SET protocol restricts the revealing of credit card details to merchants thus keeping
hackers and thieves at bay. The SET protocol includes Certification Authorities for
making use of standard Digital Certificates like X.509 Certificate.
Before discussing SET further, let’s see a general scenario of electronic transactions,
which includes client, payment gateway, client financial institution, merchant, and
merchant financial institution.
Requirements in SET: The SET protocol has some requirements to meet, some of
the important requirements are:
It has to provide mutual authentication i.e., customer (or cardholder) authentication
by confirming if the customer is an intended user or not, and merchant
authentication.
It has to keep the PI (Payment Information) and OI (Order Information)
confidential by appropriate encryptions.
It has to be resistive against message modifications i.e., no changes should be
allowed in the content being transmitted.
SET also needs to provide interoperability and make use of the best security
mechanisms.
Participants in SET: In the general scenario of online transactions, SET includes
similar participants:
1. Cardholder – customer
2. Issuer – customer financial institution
3. Merchant
4. Acquirer – Merchant financial
5. Certificate authority – Authority that follows certain standards and issues
certificates(like X.509V3) to all other participants.
SET functionalities:
Provide Authentication
Merchant Authentication – To prevent theft, SET allows customers to
check previous relationships between merchants and financial
institutions. Standard X.509V3 certificates are used for this verification.
Customer / Cardholder Authentication – SET checks if the use of a
credit card is done by an authorized user or not using X.509V3
certificates.
Provide Message Confidentiality: Confidentiality refers to preventing unintended
people from reading the message being transferred. SET implements
confidentiality by using encryption techniques. Traditionally DES is used for
encryption purposes.
Provide Message Integrity: SET doesn’t allow message modification with the
help of signatures. Messages are protected against unauthorized modification using
RSA digital signatures with SHA-1 and some using HMAC with SHA-1,
Dual Signature: The dual signature is a concept introduced with SET, which aims at
connecting two information pieces meant for two different receivers :
Order Information (OI) for merchant
Payment Information (PI) for bank
You might think sending them separately is an easy and more secure way, but sending
them in a connected form resolves any future dispute possible. Here is the generation
of dual signature:
Where,
Characteristics of Firewall
1. Physical Barrier: A firewall does not allow any external traffic to enter a system
or a network without its allowance. A firewall creates a choke point for all the
external data trying to enter the system or network and hence can easily block
access if needed.
2. Multi-Purpose: A firewall has many functions other than security purposes. It
configures domain names and Internet Protocol (IP) addresses. It also acts as a
network address translator. It can act as a meter for internet usage.
3. Flexible Security Policies: Different local systems or networks need different
security policies. A firewall can be modified according to the requirement of the
user by changing its security policies.
4. Security Platform: It provides a platform from which any alert to the issue related
to security or fixing issues can be accessed. All the queries related to security can
be kept under check from one place in a system or network.
5. Access Handler: Determines which traffic needs to flow first according to priority
or can change for a particular network or system. specific action requests may be
initiated and allowed to flow through the firewall.
1. Different Requirements: Every local network or system has its threats and
requirements which needs different structure and devices. All this can only be
identified while designing a firewall. Accessing the current security outline of a
company can help to create a better firewall design.
2. Outlining Policies: Once a firewall is being designed, a system or network doesn’t
need to be secure. Some new threats can arise and if we have proper paperwork of
policies then the security system can be modified again and the network will
become more secure.
3. Identifying Requirements: While designing a firewall data related to threats,
devices needed to be integrated, Missing resources, and updating security devices.
All the information collected is combined to get the best results. Even if one of
these things is misidentified leads to security issues.
4. Setting Restrictions: Every user has limitations to access different level of data or
modify it and it needed to be identified and taken action accordingly. After
retrieving and processing data, priority is set to people, devices, and applications.
5. Identify Deployment Location: Every firewall has its strengths and to get the
most use out of it, we need to deploy each of them at the right place in a system or
network. In the case of a packet filter firewall, it needs to be deployed at the edge
of your network in between the internal network and web server to get the most
out of it.
1. Blocks infected files: While surfing the internet we encounter many unknown
threats. Any friendly-looking file might have malware in it.
The firewall neutralizes this kind of threat by blocking file access to the system.
2. Stop unwanted visitors: A firewall does not allow a cracker to break into the
system through a network. A strong firewall detects the threat and then stops the
possible loophole that can be used to penetrate through security into the system.
3. Safeguard the IP address: A network-based firewall like an internet connection
firewall(ICF). Keeps track of the internet activities done on a network or a system
and keeps the IP address hidden so that it can not be used to access sensitive
information against the user.
4. Prevents Email spamming: In this too many emails are sent to the same address
leading to the server crashing. A good firewall blocks the spammer source and
prevents the server from crashing.
5. Stops Spyware: If a bug is implanted in a network or system it tracks all the data
flowing and later uses it for the wrong purpose. A firewall keeps track of all the
users accessing the system or network and if spyware is detected it disables it.
Limitations:
1. Internal loose ends: A firewall can not be deployed everywhere when it comes to
internal attacks. Sometimes an attacker bypasses the firewall through a telephone
lane that crosses paths with a data lane that carries the data packets or an employee
who unwittingly cooperates with an external attacker.
2. Infected Files: In the modern world, we come across various kinds of files
through emails or the internet. Most of the files are executable under the parameter
of an operating system. It becomes impossible for the firewall to keep a track of all
the files flowing through the system.
3. Effective Cost: As the requirements of a network or a system increase according
to the level of threat increases. The cost of devices used to build the firewall
increases. Even the maintenance cost of the firewall also increases. Making the
overall cost of the firewall quite expensive.
4. User Restriction: Restrictions and rules implemented through a firewall make a
network secure but they can make work less effective when it comes to a large
organization or a company. Even making a slight change in data can require a
permit from a person of higher authority making work slow. The overall
productivity drops because of all of this.
5. System Performance: A software-based firewall consumes a lot of resources of a
system. Using the RAM and consuming the power supply leaves very less
resources for the rest of the functions or programs. The performance of a system
can experience a drop. On the other hand hardware firewall does not affect the
performance of a system much, because its very less dependent on the system
resources.