0% found this document useful (0 votes)
11 views14 pages

Unit v Security and Encryption

The document discusses the importance of security and encryption in e-commerce, highlighting the need to protect against various cyber threats such as credit card fraud, hacking, and phishing. It outlines key dimensions of e-commerce security, including integrity, authenticity, and confidentiality, as well as the tension between security measures and usability. Additionally, it details technology solutions like encryption, firewalls, and secure communication protocols to safeguard e-commerce transactions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views14 pages

Unit v Security and Encryption

The document discusses the importance of security and encryption in e-commerce, highlighting the need to protect against various cyber threats such as credit card fraud, hacking, and phishing. It outlines key dimensions of e-commerce security, including integrity, authenticity, and confidentiality, as well as the tension between security measures and usability. Additionally, it details technology solutions like encryption, firewalls, and secure communication protocols to safeguard e-commerce transactions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

lOMoARcPSD|28245750

UNIT-V
Security and Encryption

Need and Concepts:


- Understand the scope of e-commerce crime and security problems.
- Describe the key dimensions of e-commerce security and the tension between security and
other values.
- Identify the key security threats in the e-commerce environment.
- Describe how technology helps protect the security of messages sent over the Internet.
- Identify the tools used to establish secure internet communications channels and protect
networks, servers, and clients.
- Appreciate the importance of policies, procedures, and laws in creating security.
E-Commerce Security Environment:
Introduction: -
E-Commerce security refers to the principles which guide safe electronic transactions, allowing
the buying and selling of goods and services through the Internet, but with protocols in place to provide
safety for those involved.

Definition: -
Ecommerce security is a set of protocols that safely guide ecommerce transactions. Stringent
security requirements must be in place to protect companies from threats like credit card fraud, or they
risk jeopardizing revenue and customer trust, due to the inability to guarantee safe credit card processing.

Scope of e-commerce crime and security problems:

While the overall size of cyber-crime is unclear at this time, cyber-crime


against e-commerce sites is growing rapidly, the number of losses is growing, and
the management of e-commerce sites must prepare for a variety of criminal
assaults.

Cybercrime is becoming a more significant problem for both organizations


and consumers. A variety of worldwide cyber-attacks make daily headlines. It is
difficult to accurately estimate the actual amount of cybercrime, but one source of
information is the Ponemon Institute of 58 representative US companies.

Reducing risks in e-commerce is a complex process that involves new


technologies, organizational policies and procedures, and new laws and industry
standards that empower law enforcement officials to investigate and prosecute
offenders. Figure shows multi-layered nature of e-commerce security.
lOMoARcPSD|28245750

Fig. The E-Commerce Security


Environment

The key dimensions of e-commerce security:


There are six key dimensions to e-commerce security:
- Integrity
- Non-repudiation
- Authenticity
- Confidentiality
- Privacy
- Availability
Integrity: Ensures that information displayed on a Web site or sent or received via
the Internet has not been altered in any way by an unauthorized party.
Non-repudiation: Ensure that e-commerce participants do not deny (repudiate)
their online actions.
Authenticity: Verifies an individual’s or business’s identity.
Confidentiality: Determines whether information shared online, such as through
e-mail communication or an order process, can be viewed by anyone other than
the intended recipient.
Privacy: The ability to control the use of information about oneself

Availability: Determines whether a Web site is accessible and operational at any


given moment.
lOMoARcPSD|28245750

The tension between security and other values:


Although computer security is considered necessary to protect e-commerce
activities, it is not without a downside. Two major areas where there are tensions
between security and Web site operations include: Ease of use and Public safety.

Ease of use: The more security measures that are added to an e-commerce site, the
more difficult it is to use and the slower the site becomes, hampering ease of use.
Security is purchased at the price of slowing down processors and adding
significantly to data storage demands. Too much security can harm profitability,
while not enough can potentially put a company out of business.

Public safety: Use of technology by criminals to plan crimes or threaten nation-


state.
lOMoARcPSD|28245750

Security Threats in The E-Commerce Environment:


A threat is anything that can disrupt the operations, functioning, integrity, or
availability of a network system. A threat is an object, person , or other entity that
represents a constant danger to an asset.
From a Technology perspective, Three key points of vulnerability in e-commerce
environment:
1. Client
2. Server
3. Communications pipeline (Internet communications channels)

Fig. A Typical E-Commerce Transaction.

Fig. Vulnerable points in E-Commerce Transaction


The nine most common and most damaging forms of security threats
to e-commerce sites include:
lOMoARcPSD|28245750

- Malicious code
- Unwanted programs (adware, spyware, etc.)
- Phishing
- Hacking and cyber-vandalism
- Spoofing(Pharming) and Spam(Junk) websites
- Denial of Service attacks
- Sniffing
- Insider jobs
- Poorly designed server and client software
1. Malicious code: Includes a variety of threats such as viruses, worms, Trojan
horses, and “bad applets” . virus is a computer program that has the ability to
replicate or make copies of itself, and spread to other files. worm is designed to
spread from computer to computer. Trojan horse appears to be benign, but then
does something other than expected.

2. Unwanted programs (adware, spyware, etc.): A kind of security threat that


arises when programs are surreptitiously installed on your computer or computer
network with.
■ Potentially unwanted programs (PUPs)
❖ Browser parasites: Can monitor and change settings of a
user’s browser
❖ Adware: Calls for unwanted pop-up ads
❖ Spyware: Can be used to obtain information, such as a user’s
keystrokes, e-mail, IMs, etc.
3.Phishing: Any deceptive, online attempt by a third party to obtain confidential
information for financial gain. Most popular type: e-mail scam letter.
4. Hacking and cyber-vandalism: Intentionally disrupting, defacing, or even
destroying a site.
■ Hacking
• Hacker: Individual who intends to gain unauthorized access to
computer systems
• Cracker: Hacker with criminal intent (two terms often used
interchangeably)
lOMoARcPSD|28245750

■ Cyber-vandalism: Intentionally disrupting, defacing or destroying a


Web site.
Example:
Credit card fraud/theft: One of the most feared occurrences and one the
main reasons more consumers do not participate in e-commerce. The most
common cause of credit card fraud is a lost or stolen card that is used by
someone else, followed by employee theft of customer numbers and stolen
identities (criminals applying for credit card using false identities).
■ Security breach:
A security breach is any incident that results in unauthorized access
to computer data, applications, networks or devices. It results in information
being accessed without authorization. Typically, it occurs when an intruder
is able to bypass security mechanisms. Technically, there's a distinction
between a security breach and a data breach. A security breach is effectively
a break-in, whereas a data breach is defined as the cybercriminal getting
away with information.

5.Spoofing (Pharming) and Spam (Junk) websites: Occurs when hackers


attempt to hide their true identities or misrepresent themselves by using fake e-
mail addresses or masquerading as someone else. Spoofing also can involve
redirecting a Web link to an address different from the intended one, with the site
masquerading as the intended destination.
6.Denial of Service attacks: Hackers flood a Web site with useless traffic to
inundate and overwhelm the network, frequently causing it to shut down and
damaging a site’s reputation and customer relationships.
7.Sniffing: A type of eavesdropping program that monitors information traveling
over a network, enabling hackers to steal proprietary information from anywhere
on a network, including e-mail messages, company files, and confidential report.
The threat of sniffing is that confidential or personal information will be made
public.
8. Insider jobs: Although the bulk of Internet security efforts are focused on
keeping outsiders out, the biggest threat is from employees who have access to
sensitive information and procedures.
lOMoARcPSD|28245750

9. Poorly designed server and client software: The increase in complexity and
size of software programs has contributed to an increase in software flaws or
vulnerabilities that hackers can exploit weaknesses.

Technology Solutions
1. Protecting Internet communications (Encryption)
2. Securing channels of communication (SSL, S-HTTP, VPNs)
3. Protecting networks (Firewalls & Proxy Servers)
4. Protecting servers and clients (Operating system & Anti-Virus Software)

Fig. Tools Available to Achieve Site Security

1. Protecting Internet communications (Encryption):


• The process of transforming plain text or data into cipher text that cannot be read
by anyone outside of the sender and the receiver.
• The purpose of encryption is:
(a) to secure stored information and
(b) to secure information transmission.
• Cipher text is text that has been encrypted and thus cannot be read by anyone
besides the sender and the receiver.
• Provides:
– Message integrity
– Non-repudiation
– Authentication
– Confidentiality
lOMoARcPSD|28245750

Encryption is done in two types:

i. Symmetric key encryption


ii. Public key encryption
1. Symmetric key encryption:

Symmetric key encryption (secret key encryption) the sender and the
receiver use the same key to encrypt and decrypt the message. Data Encryption
Standard (DES) is the most widely used symmetric key encryption, developed by
the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key.

2. Public key encryption:


• Solves symmetric key encryption problem of having to
exchange secret key
• Uses two mathematically related digital keys – public key
(widely disseminated) and private key (kept secret by owner)
• Both keys used to encrypt and decrypt message
• Once key used to encrypt message, same key cannot be used
to decrypt message
• For example, sender uses recipient’s public key to encrypt message;
recipient uses his/her private key to decrypt it.

Fig. Sample public key encryption


lOMoARcPSD|28245750

Public Key Encryption using Digital Signatures, Hash Digests and Digital envelops
• Digital signature is a “signed” cipher text that can be sent over the
Internet.
• Hash function uses an algorithm that produces a fixed-length number
called a hash or message digest.
• Digital envelop is a technique that uses symmetric encryption for large
documents, but public key encryption to encrypt and send the symmetric
key.

Fig. Public key cryptography with digital


signatures

Digital Envelops:
• Addresses weaknesses of public key encryption (computationally
slow, decreases transmission speed, increases processing time) and
symmetric key encryption (faster, but more secure).
• Uses symmetric key encryption to encrypt document but public key
encryption to encrypt and send symmetric key
lOMoARcPSD|28245750

Public Key Cryptography: Creating a Digital Envelope


Digital Certificates and Public Key Infrastructure (PKI):
Digital certificate is a digital document issued by a certification authority.
• Digital certificate includes:
– Name of subject/company
– Subject’s public key
– Digital certificate serial number
– Expiration date
– Issuance date
– Digital signature of certification authority (trusted
third party institution) that issues certificate
– Other identifying information
• Public Key Infrastructure (PKI): refers to the CAs and
digital certificate procedures that are accepted by all parties

Fig. Digital Certificates and Certification Authorities


lOMoARcPSD|28245750

Limits to Encryption Solutions:


■ Doesn’t protect storage of private key

❖ PKI not effective against insiders, employees


❖ Protection of private keys by individuals may be haphazard
■ No guarantee that verifying computer of merchant is secure
■ CAs are unregulated, self-selecting organizations
2. Securing channels of communication (SSL, S-HTTP, VPNs):
a. Secure Sockets Layer (SSL):
Most common form of securing channels of communication; used to
establish a secure negotiated session (client-server session in which
URL of requested document, along with contents, is encrypted)
b. S-HTTP:
Alternative method; provides a secure message-oriented
communications protocol designed for use in conjunction with HTTP
c. Virtual Private Networks (VPNs):
Allow remote users to securely access internal networks via the
Internet, using Point-to-Point Tunneling Protocol (PPTP).

Fig. Secure Negotiated Sessions Using SSL


lOMoARcPSD|28245750

3. Protecting networks (firewalls& Proxy Servers):


i. Firewalls are software applications that act as a filter between a company’s
private network and the Internet itself and Uses security policy to filter packets.
Firewall methods include: - Packet filters
- Application gateways
ii. Proxy server is a software server that handles all communications
originating from or being sent to the Internet, acting as a spokesperson or
bodyguard for the organization.

Fig. Firewalls and Proxy Servers

4. Protecting servers and client:


• Operating system controls allow for the authentication of the user and
access controls to files, directories, and network paths.
• Anti-virus software is the easiest and least expensive way to prevent
threats to system integrity.

Policies, Procedures, and Laws:


Developing an e-commerce security plan:
• Perform a risk assessment
• Develop a security policy
• Develop an implementation plan
• Create a security organization
• Perform a security audit.
lOMoARcPSD|28245750

Fig. Policies, Procedures & Law: Developing an E-


Commerce Security Plan

You might also like