E-Commerce Unit-4 Network Security
E-Commerce Unit-4 Network Security
NOTES ON:
E-COMMERCE
SECURITY
The internet has made our lives easier and has provided us with lots
of advantages.
▪ It has also put our system’s security at risk of being infected by a
virus, of being hacked, information theft, damage to the system,
and much more.
TYPES OF SECURITY
Security can be classified into following four types:
1. Computer Security:
Computer security refers to protecting and securing computers
and their related data from unauthorized access, misuse,
theft, information loss, and other security issues.
▪ ensures the Confidentiality, Integrity and Availability (CIA)
of the assets in computer systems.
▪ protects from both software & hardware part of a computer
systems from getting compromised and be exploited.
2. Information Security:
Information security means protecting system’s information
from theft, illegal use and piracy from unauthorized use.
▪ primarily concerned with making sure that data in any form
is kept secure in terms of preserving its confidentiality, 4
integrity and availability.
TYPES OF SECURITY
3. Cyber Security:
Cyber security means securing the computers, electronic
devices, networks, programs, systems from cyber attacks when
system is connected to the internet.
➢ Information security differs from cybersecurity such that
information security aims to keep data in any form secure,
whereas cybersecurity protects only digital data.
➢ Cybersecurity is the subset of information security.
4. Network Security:
Network security means securing a network and protecting
the user’s information about who is connected through that
network.
▪ targets a variety of threats and stop them from entering or
spreading on your network. 5
➢ Network security is the subset of cybersecurity.
NETWORK SECURITY
Network security aims to protect any data that is being sent
through devices in network to ensure that the information is
not changed or intercepted.
▪ protect from unauthorized access, misuse, malfunction,
modification, destruction, or improper disclosure.
▪ includes both hardware and software technologies.
SECURITY THREATS
Security threat is possible danger that might exploit vulnerabilities
in a computer system to breach security and thus cause possible
harm.
A threat is something that may or may not happen, but has the
potential to cause serious damage.
2. Password:
Hackers can easily hack customers passwords through
algorithms and then access the users accounts, which has
sensitive information.
They can even hack the server and database passwords.
3. Phishing:
Common phishing techniques include emailing the customers
with fake messages with the action and provide them access to
10
their login information or other personal data which the
hacker can exploit as per his benefit.
5. Financial Frauds:
Financial fraud has afflicted online businesses since their
inception.
Hackers make unauthorized transactions and wipe out the
trail costing businesses significant amounts of losses.
6. Spam:
Emails are highly used mediums for spamming.
They comments on your blog or contact forms are also an open
invitation for online spammers where they leave infected links
11
in order wait for you to click on such messages.
8. SQL Injections:
SQL injections are cyber-attacks intended to access your database by
targeting your query submission forms.
They inject malicious code in your database, collect the data and
then delete it later on.
9. Trojan Horses:
Admins and customers might have Trojan Horses downloaded on
their systems.
It is one amongst the worst network security threats where attackers
use these programs to swipe sensitive information from their
computers with ease. 12
SECURITY IN E-COMMERCE
Increase in the use of e-commerce has led to higher
security measures also increasing security issues in
online transactions.
1. CONFIDENTIALITY
Confidentiality ensures that data is accessed only by
authorized individuals.
▪ Confidentiality is maintaining the secrecy or privacy of
message.
ii. Privacy:
▪ Assures that individuals control or influence what
information related to them may be collected and stored.
▪ Privacy means both the sender and the receiver expects 22
confidentiality.
2. INTEGRITY
Data integrity means that the data must arrive at the receiver
exactly as it was sent, it must not be changed or altered.
3. AVAILABILITY
Availability means information should be consistently
and readily accessible for authorized parties.
4. AUTHENTICATION
Authentication is a procedure to identify one user to
another.
5. NON-REPUDIATION
Non-Repudiation means that the receiver must be able to
prove that the received message has come from a specific
sender.
▪ Provides protection against denial by one of the entities
involved in a communication of having participated in all or
part of the communication.
DATA SECURITY
The terminology “Data Security” refers to the protective
measures of securing data from unapproved access and
data corruption throughout the data lifecycle.
MESSAGE SECURITY
Secure transmission is concerned with the techniques and
practices that will guarantee protection from eavesdropping
and intentional message modification.
1. Message Confidentiality:
Confidentiality is maintaining the secrecy or privacy of
message.
Cryptography can be the better choice for maintaining the
privacy of information, which traditionally is used to protect
the secret messages.
Similarly, privacy of resources i.e., resource hiding can be
maintained by using proper firewalls.
Confidentiality is important for users involving sensitive data
such as credit card numbers. 30
MESSAGE SECURITY
2. Message Integrity:
Integrity ensures the correctness as well as
trustworthiness of data or resources.
Integrity mechanisms fall into two classes, prevention
mechanisms and detection mechanisms.
3. Message Authentication:
Authentication is a mechanism whereby the receiver of a
transaction or message can be confident of the identity of
the sender and/or integrity of the message.
Authentication in e-ecommerce basically requires the
user to prove his or her identity for each requested
service. 31
FIREWALLS
A firewall is a software utility or hardware device that acts as a filter
for data entering or leaving a network or computer.
Not only does a firewall block unwanted traffic, but it can also help
block malicious software from infecting your computer.
FIREWALLS
A firewall works like a traffic guard at your computer’s entry point,
or port.
Internet
Organization
Network
35
36
FIREWALLS IN E-COMMERCE
The business models which deal with the customers on the
internet and allow them to buy and sell things over the same
require a stringent security service.
TYPES OF FIREWALLS
1. Software Firewall:
Software firewall is a program and set of codes that
install in computer or system.
▪ Software firewall is an intangible product.
TYPES OF FIREWALLS
2. Hardware Firewall:
It is a tangible product or devices that secure system and
PC from outer threads, viruses, malware and many more
harmful viruses.
FUNCTIONS OF A FIREWALLS
1. Packet-Level Filtering (Network Layer Filtering):
The network layer uses the source IP address and destination IP address to
route and deliver the data packet across the network.
▪ Forwards or Discards the packet based on set of rules.
▪ Configured to filter packets going in both directions .
▪ These IP addresses are present in every data packet.
▪ So, these addresses can be used to configure a firewall to filter the traffic.
For Example:
The IP addresses of the two computers are 10.10.10.10 and 20.20.20.20.
On a path that connects both the computers a firewall is placed.
When the first computer sends a data packet to the second computer, the way
the firewall is configured determines whether the packet will reach the second
computer or not.
The firewall may be configured to disallow the computer of IP address
20.20.20.20 to host the data packets of the computer having the IP address
10.10.10.10. 40
FUNCTIONS OF A FIREWALLS
2. Circuit-Level Filtering (Transport Layer Filtering):
This is more complex than packet-level filtering.
FUNCTIONS OF A FIREWALLS
3. Application-Level Filtering (Application Layer
Filtering):
This is the advanced level of filtering.
CRYPTOGRAPHY
Cryptography is technique of securing information and
communications through use of codes so that only those
person for whom the information is intended can
understand it and process it.
▪ Thus, preventing unauthorized access to information.
43
CRYPTOGRAPHY
In cryptography, the techniques which are used to protect
information are obtained from mathematical concepts and
algorithms to convert messages in ways that make it hard to
decode it.
Plain Text:
▪ Plaintext or cleartext is unencrypted information.
Cipher Text:
▪ Ciphertext is encrypted text.
▪ Plaintext is what you have before encryption, and ciphertext
44
CRYPTOGRAPHY
Encryption:
Encryption means that the sender converts the original
information into another form and sends the
unintelligible message over the network.
Decryption:
Decryption reverses the Encryption process in order to
transform the message back to the original form.
FEATURES OF CRYPTOGRAPHY
1. Confidentiality:
Information can only be accessed by the person for whom it is
intended and no other person except him can access it.
2. Integrity:
Information cannot be modified in storage or transition
between sender and intended receiver without any addition to
information being detected.
3. Non-repudiation:
The creator/sender of information cannot deny his or her
intention to send information at later stage.
4. Authentication:
The identities of sender and receiver are confirmed.
As well as destination/origin of information is confirmed. 46
TYPES OF ENCRYPTION/DECRYPTION
There are two types of Encryption/Decryption techniques:
▪ Privacy with secret key Encryption/Decryption
48
Algorithms The Secret key algorithms are DES, The Public key algorithms are
3DES, AES & RCA. Diffie-Hellman, RSA.
Purpose The main purpose of the secret key The main purpose of the public key
53
algorithm is to transmit the bulk algorithm is to share the keys
data. securely.
MALICIOUS SOFTWARE
Malicious software, commonly known as malware, is any
software designed to cause harm to a computer system.
Malware can be in the form of worms, viruses, Trojans,
spyware, adware and rootkits, etc.
▪ which steal protected data, delete documents or add
software not approved by a user.
1. Viruses:
A computer virus is a piece of software that inserts itself
into one or more files and then performs some harmful
action.
Whenever the infected computer comes into contact with
an uninfected piece of software, a fresh copy of the virus54
passes into the new program.
MALICIOUS SOFTWARE
2. Worms:
A worm is a program that can replicate itself and send copies
from computer to computer.
▪ Network worm programs use network connections to spread
from system to system.
Upon arrival, the worm may be activated to replicate and
propagate again.
3. Trojan Horse:
A Trojan horse is a program or command procedure containing
hidden code that, when invoked, performs some unwanted or
harmful function.
A Trojan horse is any malware which misleads users of its
true intent to fool a user into thinking it's a harmless file.
▪ Looks like genuine, designed to trick the users. 55
ANTIVIRUS
Antivirus software also known as anti-malware is a computer
program used to prevent, detect, and remove malware.
ANTIVIRUS IN E-COMMERCE
Hackers can use stolen credit card information to place
orders from anywhere in the world.
Disadvantages:
Since antivirus software comes in large sizes, device can experience
lag.
Few antivirus software can come without inbuilt firewall provision.
This can increase the chances of device being attacked.
59
Thus, to ensure safety, make sure that antivirus software comes
with firewall protection.
DIGITAL SIGNATURE
A digital signature is an authentication mechanism that
enables the creator of a message to attach a code that acts as a
signature.
▪ A technique which is used to validate the authenticity and
integrity of the message.
▪ Authentication, integrity, and non-repudiation can be
achieved by using a digital signature.
2. Costs:
Using postal or courier services for paper documents is much more
expensive compared to using digital signatures on electronic documents.
3. Security:
The use of digital signatures and electronic documents reduces risks of
documents being intercepted, read, destroyed, or altered while in
transit.
4. Authenticity:
An electronic document signed with a digital signature can stand up in
67
court just as well as any other signed paper document.
6. Non-Repudiation:
Signing an electronic document digitally identifies you as the
signatory and that cannot be later denied.
7. Imposter prevention:
No one else can forge your digital signature or submit an
electronic document falsely claiming it was signed by you.
8. Time-Stamp:
By time-stamping your digital signatures, you will clearly
68
know when the document was signed.
2. Certificates:
In order to effectively use digital signatures, both senders
and recipients may have to buy digital certificates at a
cost from trusted certification authorities.
3. Software:
To work with digital certificates, senders and recipients
have to buy verification software at a cost. 69
5. Compatibility:
There are many different digital signature standards and
most of them are incompatible with each other, and this
complicates the sharing of digitally signed documents.
70
DIGITAL CERTIFICATE
A Digital Certificate is an electronic "password" that allows a person,
computer or organization to exchange data securely over the internet using the
public key infrastructure (PKI).
▪ Digital Certificate is also known as a public key certificate or identity
certificate.
A digital certificate authenticates the web credentials of the sender and lets the
recipient of an encrypted message know that the data is from a trusted source (or
a sender who claims to be one).
THIRD-PARTY AUTHENTICATION
Authentication means verifying the identity of someone who wants to
access data, resources, or applications.
THIRD-PARTY AUTHENTICATION
Third-party authentication has three main advantages:
When using SSL for secure Internet transactions, a Web server needs an SSL
certificate to establish a secure SSL connection.
When you see a padlock icon next to the URL in the address bar, that means SSL
protects the website you are visiting.
78
SSL certificates help keep online interactions private and assure users that the
website is authentic and safe to share private information with.
HTTPS is the secure form of HTTP, which means that HTTPS websites have
their traffic encrypted by SSL.
▪ Most browsers tag HTTP sites – those without SSL certificates – as "not
secure.” 79
SSL ARCHITECTURE
SSL ARCHITECTURE
2. SSL Record Protocol:
The SSL Record Protocol provides basic security services
to higher layer protocols.
SSL IN E-COMMERCE
For all the e-commerce websites, it is mandatory to have SSL
certificates to facilitate secure connections as these certifications are
very useful in authenticating identity of online retail business and
securing data at the checkout.
These certificates also safeguards the customers from financial
online frauds.
Have you ever visited an online store, only to exit because its data
wasn’t secure?
Unfortunately, many website owners are unaware of the steps to
take to gain customers’ trust.
If they see that your site isn’t encrypted, for example, they’ll stay far
away.
An SSL certificate ensures that confidential user information is
stored safely and securely.
It encrypts your information to prevent it from getting into the
hands of hackers and malware.
Information such as names, passwords and email addresses stays 82
safe when a business has an SSL certificate.
84
Think about all the times you’ve been on the go, reading emails
while in line at the coffee shop, or checking your bank account while
waiting at the doctor’s office.
Unless you were logged into a private Wi-Fi network that requires a
password, any data transmitted during your online session could be
vulnerable to eavesdropping by strangers using the same network.
4. Your Devices:
Your devices can be prime targets for cyber-criminals when you access
the internet, especially if you’re on a public Wi-Fi network.
A VPN helps protect the data you send and receive on your devices so
hackers won’t be able to watch your every move.
EXAMPLE OF VPN
Think of a situation where corporate office of a bank is situated in Washington,
USA. This office has a local network consisting of say 100 computers.
Suppose other branches of the bank are in Mumbai, India, and Tokyo, Japan.
89
TYPES OF VPNS
1. Remote Access:
A remote access VPN securely connects a device outside the
corporate office.
These devices are known as endpoints and may be laptops, tablets,
or smartphones.
Advances in VPN technology have allowed security checks to be
conducted on endpoints to make sure they meet a certain posture
before connecting.
Think of remote access as computer to network.
2. Site-to-Site:
A site-to-site VPN connects the corporate office to branch offices over
the Internet.
Site-to-site VPNs are used when distance makes it impractical to
have direct network connections between these offices.
Dedicated equipment is used to establish and maintain a connection. 90
Think of site-to-site access as network to network.
COMPONENTS OF SET
93
COMPONENTS OF SET
It has the following components:
1. Card Holder's Digital Wallet Software:
Digital Wallet allows the card holder to make secure purchases
online via point and click interface.
2. Merchant Software:
This software helps merchants to communicate with potential
customers and financial institutions in a secure manner.
WORKING OF SET
➢ The customer opens an account.
➢ The customer receives a certificate.
➢ Merchants have their own certificates.
➢ The customer places an order.
➢ The merchant is verified.
➢ The order and payment information are sent by
customer.
➢ The merchant requests payment authorization.
➢ The merchant confirms the order.
➢ The merchant ships the ordered item.
➢ The merchant requests payment through payment
gateway. 95
SET FUNCTIONALITIES
1. Provide Authentication:
▪ Merchant Authentication: To prevent theft, SET allows customers to
check previous relationships between merchants and financial
institutions. Standard X.509V3 certificates are used for this verification.
Disadvantages of SET
Some of the disadvantages of SET include:
▪ it's complexity, and
97
▪ high cost for implementation.
Any Questions?
98