ECT 582 Secure Electronic Commerce

Download Report

Transcript ECT 582 Secure Electronic Commerce

ECT 582
Secure Electronic
Commerce
Professor Robin Burke
Outline
Introductions
 Course and Syllabus
 Security
 E-Commerce

Introductions

Student information sheet
Administrativa

Contacting me
CS&T 453
 x 25910
 [email protected]


Course web site

http://josquin.cs.depaul.edu/~rburke/c
ourses/w04/ect360/
About Me
2nd year at CTI
 PhD in AI, 1993
 Research

AI applications in E-Commerce
 "smart catalogs"

Taught web development since 1996
 Founded an e-commerce company

Course

Public key infrastructure

how to enable large-scale secure
messaging?
Secure transactions
 Securing hosts and applications
 Privacy

Grading
Six assignments – 35%
 Midterm – 25%
 Final – 30%
 Participation – 10%

Grading




Three Components
Knowledge
 Does the work display correct technical
knowledge?
Reasoning
 Does the work indicate good problemsolving skills?
Communication
 Is the answer well-written English?
Grading, cont'd

A = Excellent work




B = Very good work




Complete knowledge of the subject matter
No major errors of reasoning in problem solutions
Competent written answers
C = Average work




Thorough knowledge of the subject matter
Well-considered and creative solutions
Well-written answers
Some gaps in knowledge of subject matter
Some errors or omissions in problem solving
Written answers may contain grammatical and other errors
D = Below average work



Substantial gaps in knowledge of subject matter.
Problem solving incomplete or incorrect
Poor English in written answers
Discussion Forum




Important for this course
 More DL than local students
 Automatically mailed to all students
Uses
 Questions about assignments
 Announcements
 Discussion about security issues
DL students
 required to post at least weekly
All students
 component of "Participation Grade"
Security
1.
2.
3.
4.
freedom from danger, risk, etc.: safety
freedom from care, apprehension or doubt;
well-founded confidence
something that secures or makes safe;
protection; defense
precautions taken to guard against theft,
sabotage, the stealing of military secrets,
etc
–
Webster’s Encyclopedic Unabridged
Dictionary of the English Language
E-Commerce

the process of electronically buying
and selling goods, services and
information, and the maintenance of
all the relationships, both personal
and organizational, required for an
electronic marketplace to function.
What are we securing?
Post-9/11 realities

Aspects of business operations may
impact public safety
Inherent Hazard

E-commerce opens a hole for interacting
with an organization


Good design



Any Internet user can attack that opening
Minimizes the risk associated with enabling
e-commerce
While still preserving its benefits
Bad design


Fails to reduce the risks of e-commerce, or
Eliminates the benefits of e-commerce
Basic concepts
Assets
 Attackers
 Attacks
 Protocol
 Risk

Assets
Financial
 Customer data
 Proprietary info
 Reputation
 Systems

Is e-commerce different?
Need for physical proximity
 Differences in documents

Physical documents


Semi-permanence of ink embedded in
paper fibers
Particular printing process





letterhead
watermark
Biometrics of signature
Time stamp
Obviousness of modifications,
interlineations, and deletions
Computer documents
Computer-based records can be
modified freely and without detection
 Supplemental control mechanisms
must be applied to achieve a level of
trustworthiness comparable to that on
paper
 Less permanent, too

Legal differences

In some cases, possession matters
negotiable document of title
 cash money

Loss of assets

Physical assets


loss = theft or destruction
Information assets

loss = violation of
•
•
•
•
confidentiality
availability
integrity
authenticity
Attackers

Class 0


Class 1


capable outsider
Class 2


casual passerby
knowledgeable insider
Class 3

determined organization
E-Commerce
Proximity is not an issue
 Scale



Many, many Class 1 attackers
Mutability

Easy for insiders to cover their tracks
Attack
Any action that compromises the
security of an e-commerce system
 Simplifying assumption


security = protecting messages
Passive vs active

Passive

Attacker monitors communication
• disclose contents
• but also traffic analysis

Active

Attacker interferes with
communication
• generates messages
• prevents transmission or reception
Normal messaging
Alice
Bob
Eve
Basic attack types
Interception
 Interruption
 Modification
 Fabrication

Interception
Attack on confidentiality
Alice
Bob
Eve
Example: Password sniffer
Program to capture user id / password
info
 Case in Tokyo

sniffer installed at Internet cafe
 16 million Yen stolen

Interruption

Attack on availability
Alice
Bob
Eve
Example: SYN flooding

send open request for TCP
connection

but don’t respond to handshake
do this over and over again
 eventually server can't accept new
connections

Modification
Attack on integrity
Alice
Bob
Eve
Example: Shareware trojan
Alice posts a shareware application
 Eve modifies it to contain her virus
 Bob downloads the modified version

Fabrication
Attack on authenticity
Alice
Bob
Eve
Example: Session hijacking

Taking over active sessions
after Alice leaves
 before application times out


Bypass the authentication process

have Alice's privileges
Protocol

A set of formal rules describing how to
transmit data, especially across a
network....High level protocols deal
with the data formatting, including the
syntax of messages, the terminal to
computer dialogue, character sets,
sequencing of messages etc.
– FOLDOC
To describe a protocol

The roles


The steps


how the interaction unfolds
The messages


who participates
syntax and meaning of messages sent and
received
The process

processing by each player
Example: Homework
protocol

Instructor hands out assignment


Student performs assignment


submits by due date
Instructor grades assignment


includes requirements and due date
grade is incorporated into course
database
Graded work is returned to student
Protocol security


Generally we talk about the protecting the
protocol messages
Different protocols have different security
characteristics



Homework protocol is not secure against
fabrication
Test taking protocol is more secure
Attacks can target different protocol steps

"grader" example
Risk

Risk is

value of loss * probability of loss
Both can be hard to quantify
 Risk management

process of analyzing and mitigating
risk
 one technique is historical

• what losses have others suffered?
What are the primary risks?
Disclosure of proprietary information
2.
Denial of service
3.
Virus attacks
4.
Insider net abuse
5.
Financial fraud
6.
Sabotage
CSI/FBI 2003 Computer Crime and
Security Survey
Total value of losses: $200 million
1.
Secondary risks
Damage to relations with customer or
business partners
 Legal, public relations, or business
resumption cost
 Public relations damage
 Uptake failure due to lack of
confidence

Secure E-Commerce
Not E-Commerce Risk Management
 Very big topic

strategy
 architecture
 technology

Security strategy

Threats



Vulnerabilities


where is the organization exposed?
Defenses


what is valuable?
who might want it?
what can be done to manage the risks?
Legal

what liabilities and legal requirements exist?
Security architecture

People


Systems



how are they hired, trained, monitored,
audited?
what systems exist?
how are systems connected to each and to
the larger Internet?
Procedures


how are systems used?
who gets access to what under what
circumstances?
Security technology
Main focus of this course
 Specific technologies for achieving
security-related goals
 But


meaningless in the absence of a
strategy and an architecture
Secure E-Commerce
Technologies for securing the
protocols of electronic commerce
 One component of risk management

not the only component
 sometimes not even the most
important
 but a basic safeguard

What can technology
provide?
Confidentiality
 Authentication
 Integrity
 Non-repudiation
 Access control
 Availability

Confidentiality
Protects against interception
 Ensures that a message is only
readable by intended recipient
 Technology


Encryption
Authentication
Protects against fabrication
 Ensures that the origin of a message
or electronic document is correctly
identified, with assurance that the
identity is not false
 Technology

User Id/Password
 Digital certificates

Integrity
Protects against modification
 Ensures that only authorized parties
are able to modify an electronic
document or
 Allow modification to be detected
 Technology


Digital signatures
Non-repudiation
Protects against an e-commerce
participant acting in bad faith
 Require that neither the sender nor
the receiver of a message be able to
deny the transmission
 Technology


(Complicated)
Access control
Protects against unauthorized access
 Allows the establishment of finegrained control over access to files
and applications for different users
and groups
 Technology


(Various, usually tied to
authentication)
Availability
Protects against interruption
 Requires that computer system asset
be available to authorized parties
when needed
 Technology


(Many)
The big picture
Security is a multi-faceted feature of
information systems
 An organization needs

A security strategy tailored for its
particular needs
 A security architecture that addresses
that strategy
 Security technology to realize the
architecture

Assignment #1
Subscribe to CERT Advisory mailing
list
 Post on the "Test" forum
 RISKS Reaction paper
 Due before class starts


No late assignments!
Next week
Cryptography
 Reading

Ford & Baum, Ch. 1 & 4
 Risks Digest


Should be prepared for discussion