范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey...

43
1 范范范 E-Commerce Security
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    245
  • download

    1

Transcript of 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey...

Page 1: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

1范錚強

E-Commerce Security

Page 2: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

2范錚強

The Security Threats

Computer Crime and Security Survey 2002

90% computers exposed to security violations

40% computers detected external intrusions25 % in 2000

85% computers detected virus

How do companies protect itselves from this hostile environment?

Source: Computer Security Institute (CSI)

Page 3: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

3范錚強

Myths of Information Security

Protection against hackers

Protection against virus

Segregation of external threats

Page 4: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

4范錚強

Brute Force Credit Card Attack Story

The ProblemSpitfire Novelties usually generates between 5 and 30 transactions per day

On September 12, 2002 in a “brute force” credit card attack, Spitfire’s credit card transaction processor processed 140,000 fake credit card charges worth $5.07 each (62,000 were approved)

Page 5: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

5范錚強

Brute Force Credit Card Attack (cont.)

The total value of the approved charges was around $300,000

Spitfire found out about the transactions only when they were called by one of the credit card owners who had been checking his statement online and had noticed the $5.07 charge

Page 6: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

6范錚強

Brute Force Credit Card Attack (cont.)

Brute force credit card attacks require minimal skill

Hackers run thousands of small charges through merchant accounts, picking numbers at random

When the perpetrator finds a valid credit card number it can then be sold on the black market

Some modern-day black markets are actually member-only Web sites like carderplanet.com, shadowcrew.com, and counterfeitlibrary.com

Page 7: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

7范錚強

Brute Force Credit Card Attack (cont.)

Relies on a perpetrator’s ability to pose as a merchant requesting authorization for a credit card purchase requiring

A merchant ID

A password

Both

Page 8: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

8范錚強

Brute Force Credit Card Attack (cont.)

Online Data’s credit card processing services, all a perpetrator needed was a merchant’s password in order to request authorization

Online Data is a reseller of VeriSign Inc. credit card gateway services

VeriSign blamed Online Data for the incident

Online Data blamed Spitfire for not changing their initial starter password

Page 9: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

9范錚強

Brute Force Credit Card Attack Story (cont.)

In April 2002 hackers got into the Authorize.Net card processing system (largest gateway payment system on the Internet)

Executed 13,000 credit card transactions, of which 7,000 succeeded

Entry into the Authorize.Net system required only a log-on name, not a password

Page 10: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

10范錚強

Brute Force Solution

Online Data should assign strong passwords at the start

Customers should modify those passwords frequently

Authorization services such as VeriSign and Authorize.Net should have built-in safeguards that recognize brute force attacks

Page 11: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

11范錚強

Brute Force Credit Card Solution (cont.)

Signals that something is amiss:A merchant issues an extraordinary number of requests

Repeated requests for small amounts emanating from the same merchants

Page 12: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

12范錚強

Brute Force Credit Card Attack (cont.)

The ResultsVeriSign halted the transactions before they were settled, saving Spitfire $316,000 in charges Authorize.Net merchants were charged $0.35 for each transactionThe criminals acquired thousands of valid credit card numbers to sell on the black market

Page 13: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

13范錚強

Brute Force Credit Card Attack (cont.)

What we can learn…Any type of EC involves a number of players who use a variety of network and application services that provide access to a variety of data sources

A perpetrator needs only a single weakness in order to attack a system

Page 14: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

14范錚強

Brute Force What We Can Learn

Some attacks require sophisticated techniques and technologies

Most attacks are not sophisticated; standard security risk management procedures can be used to minimize their probability and impact

Page 15: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

15范錚強

Accelerating Need forE-Commerce Security

Annual survey conducted by the Computer Security Institute and the FBI

Organizations continue to experience cyber attacks from inside and outside of the organization

Page 16: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

16范錚強

Accelerating Need forE-Commerce Security (cont.)

The types of cyber attacks that organizations experience were varied

The financial losses from a cyber attack can be substantial

It takes more than one type of technology to defend against cyber attacks

Page 17: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

17范錚強

Accelerating Need forE-Commerce Security (cont.)

According to the statistics reported to CERT/CC over the past year (CERT/CC 2002)

The number of cyber attacks skyrocketed from approximately 22,000 in 2000 to over 82,000 in 2002

First quarter of 2003 the number was already over 43,000

Computer Emergency Response Team (CERT): Group of three teams at Carnegie Mellon University that monitors incidence of cyber attacks, analyze vulnerabilities, and provide guidance on protecting against attacks

Page 18: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

18范錚強

Security Is Everyone’s Business

Security practices of organizations of various sizes

Small organizations (10 to 100 computers)The “haves” are centrally organized, devote a sizeable percentage of their IT budgets to security

The “have-nots” are basically clueless when it comes to IT security

Page 19: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

19范錚強

Security Is Everyone’s Business (cont.)

Medium organizations (100 to 1,000 computers)

Rarely rely on managerial policies in making security decisions, and they have little managerial support for their IT policiesThe staff they do have is poorly educated and poorly trained—overall exposure to cyber attacks and intrusion is substantially greater than in smaller organizations

Page 20: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

20范錚強

Security Is Everyone’s Business (cont.)

Large organizations (1,000 to 10,000 computers)Complex infrastructures and substantial exposure on the Internet

While aggregate IT security expenditures are fairly large, their security expenditures per employee are low

IT security is part-time and undertrained—sizeable percentage of the large organizations suffer loss or damage due to incidents

Base their security decisions on organizational policies

Page 21: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

21范錚強

Security Is Everyone’s Business (cont.)

Very large organizations (more than 10,000 computers)

extremely complex environments that are difficult to manage even with a larger staff

rely on managerial policies in making IT security decisions

only a small percentage have a well-coordinated incident response plan

Page 22: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

22范錚強

Security Issues

From the user’s perspective:Is the Web server owned and operated by a legitimate company?

Does the Web page and form contain some malicious or dangerous code or content?

Will the Web server distribute unauthorized information the user provides to some other party?

Page 23: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

23范錚強

Security Issues (cont.)

From the company’s perspective:Will the user not attempt to break into the Web server or alter the pages and content at the site?

Will the user will try to disrupt the server so that it isn’t available to others?

Page 24: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

24范錚強

Security Issues (cont.)

From both parties’ perspectives:Is the network connection free from eavesdropping by a third party “listening” on the line?

Has the information sent back and forth between the server and the user’s browser been altered?

Page 25: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

25范錚強

Security Requirements

Authentication The process by which one entity verifies that another entity is who they claim to be

Authorization The process that ensures that a person has the right to access certain resources

Auditing The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions

Page 26: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

26范錚強

Security Requirements (cont.)

Confidentiality Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes

Integrity As applied to data, the ability to protect data from being altered or destroyed in an unauthorized or accidental manner

Page 27: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

27范錚強

Security Issues (cont.)

Non-repudiation The ability to limit parties from refuting that a legitimate transaction took place, usually by means of a signature

Page 28: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

28范錚強

Information Security Vulnerabilities

Intentional Unintentional or Natural Causes

Hardware exposure

Thefts, vandalism, criminal acts

Natural disasters, fire, floods, disk crash

Information exposure

Alteration of data, systematic updates

Incompetence of programmers, missing

Disclosure of information

Unauthorized copy, network interception, fraud

Careless

Network intrusions

Theft of information, alteration of data, use of computers as a crime tool

──

Page 29: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

29范錚強

Safeguarding information

Assess exposure and riskIdentification and protect any possible threats and vulnerabilitiesTechnical and procedural preventions

Understanding the characteristics of security technologiesSOP: Standard Operations Procedure

The strength of a chain is the strength of the weakest link

Page 30: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

30范錚強

Basic Security Concepts

Security is never ABSOLUTEThe balance between security and ease of use

Security is costlyWhat is your exposure and potential loss?How much are you willing to pay?

There are technical and social dimensions in security issues

All perpetrators are human beingsMostly internal employees

Page 31: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

31范錚強

Security and Ease of Use

What will you end up doing, if every time…

You have to unlock 10 locks to get home

You have to lock 10 door before you leave

Risk and Security measures should be balanced

Page 32: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

32范錚強

A simple case

When you take a vacation, you supervisor asks you to provide your password ..

Should you comply?

Can you refuse?

On what basis?

Page 33: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

33范錚強

Business Environment

LegalEnvironment

Insurance

Security Plan

Company

ProcessControl

Personnel Control

DocumentControl

User ControlRecovery Plan

Security Policy

Application

Input and output controls

ProgramControl

AuditTrail

Access Control

PhysicalSegregation

Operations Control

The Onion of Security

Hardware

Comms. ControlInternationalStandards

Page 34: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

34范錚強

Some Basic Security Measures

Virus protection

Encryption

PKI/CA

Page 35: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

35范錚強

Virus Protection

Programs

Files

Analyze ProgramLook for virus

Anti-Virus S/W

Virus code

Fix or Segregate Pass

Page 36: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

36范錚強

Encryption – general concept

Eg. My Phone number: 0916059841Simple multiplication

Multiply by 13—011908777933

I send it to you and you devide by 13…

A simpler scheme980779711866420145509898894141142697598077971186642014550989889414114269759807797118664201455098988941411426975

Key: we have to protect the encryption rule ──Is there any secrete?

Page 37: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

37范錚強

EncryptedMessage

Symmetry Key Encryption

Message EncryptedMessage

Encrypt

Message

Decrypt

S

R

Page 38: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

38范錚強

The concept of two keys

You open a SAFE in a bank

Open AccountVerification of IdentityGet a key – Private Key

UseVerification of Identity, logBank officer take a public key, together with your private key, open the safe

Are you safe? Why?

Page 39: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

39范錚強

Asymmetric Key Encryption

RSA scheme

Invented by three mathematicians with last names starts with R/S/A.

Mathematically generate a pair of “keys”, KA and KB

Generated simultaneously. KA and KB are independent, one cannot be derived from another.

A file encrypted by key KA can only be decrypted by KB and not A, and vice versa

KA is kept private, and KB is open publicly

Page 40: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

40范錚強

Asymmetric Key Encryptionfor Confidentiality

Message EncryptedMessage

Encrypt with Public Key

EncryptedMessage Message

S

RDecrypt with Private Key

Page 41: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

41范錚強

Asymmetric Key Encryptionfor Non-repudiation

Message Encrypted Message

R Public Encrypt

Encrypted Message Message

S

RR Public Decrypt

S Private Decrypt

S Private Encrypt

Page 42: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

42范錚強

PKI/CA

PKI – Public Key InfrastructureEncryption scheme based on RSA encryption

An infrastructure for effective operations

CA – Certificate AuthorityIssuance of Keys

Trusted third party

Hierarchical structure of reference

Page 43: 范錚強 1 E-Commerce Security 范錚強 2 The Security Threats Computer Crime and Security Survey 2002 90% computers exposed to security violations 40% computers.

43范錚強

Issuance of Certificate byCA

IssuerIssue DateHolderPublic Keu

Open for PublicIdentification

John

X509

XXXX Contract

Elec. Document

110111001Digital Signature

CA Certificate

Private Key Public Key

Issuance of Certificate by CA