Transcript Chapter 5

Chapter 5
Security Threats to Electronic
Commerce
1
Learning Objectives
In this chapter, you will learn about:
• Important computer and electronic commerce
security terms
• The reason that secrecy, integrity, and necessity
are three parts of any security program
• The roles of copyright and intellectual property
and their importance
• Threats and countermeasures to eliminate or
reduce threats
2
Learning Objectives
• Specific threats to client machines, Web
servers, and commerce servers
• Methods that you can use to enhance
security in back office products
• The way in which security protocols help
plug security holes
• The roles that encryption and certificates
play in assurance and secrecy
3
Security Overview
• Computer security is the protection of assets
from unauthorized access, use, alteration, or
destruction.
• Two types of security:
– Physical security
– Logical security
4
Types of Security
• Physical security includes tangible
protection devices such as alarms and
guards.
• Protection of assets using nonphysical
means is called logical security.
5
Implication of Threat
• Any act or object that poses a danger to
computer assets is known as a threat.
• Countermeasure is a procedure that
recognizes, reduces, or eliminates a threat.
• The risk management model shows four
general actions to take for the threat.
Click to see Figure 5-1:
6
7
Computer Security Classification
• Three computer security categories:
– Secrecy
– Integrity
– Necessity
• Secrecy refers to protecting against unauthorized data
disclosure and ensuring the authenticity of the data’s
source.
• Integrity refers to preventing unauthorized data
modification.
• Necessity refers to preventing data delays or denials.
8
Copyright and Intellectual
Property
• Copyright is the protection of expression.
• Intellectual property is the ownership of
ideas and control over the tangible or virtual
representation of those ideas.
• U.S. Copyright Act of 1976
• Copyright Clearance Center provides
copyright information
9
Security Policy and Integrated
Security
• A security policy is a written statement describing:
– Which assets to protect and why to protect
– Who is responsible for that protection
– Which behaviors are acceptable and which are not
• The Center for Security Policy (CSP) hosts
security debates and policies.
10
Security Policy and Integrated
Security
• A security policy is a written statement describing:
– Which assets to protect and why to protect
– Who is responsible for that protection
– Which behaviors are acceptable and which are not
• The Center for Security Policy (CSP) hosts
security debates and policies.
11
Elements of a Security Policy
•
•
•
•
•
Authentication
Access control
Secrecy
Data integrity
Audit
12
Intellectual Property Threats
• Copyright infringements on the Web occur
because users are ignorant of what they can
and cannot copy.
• The Copyright Website tackles the issues of
copyright and newsgroup postings and fair
use.
13
Music Online
• Music industry better illustrates the
copyright and intellectual property issues.
• Napster changed the way music is
delivered.
• The act of ripping a song without proper
permission is a copyright violation.
14
Domain Names
• Issues of intellectual property rights on
Internet Domain Names:
– Cybersquatting
– Name changing
– Name stealing
15
Cybersquatting
• Cybersquatting is the practice of registering
a domain name that is the trademark of
another person or company in the hopes that
the owner will pay huge amounts of money
to acquire the URL.
• On November 29, 1999, the U.S.
Anticybersquating Consumer Protection Act
was signed into law.
16
Name Changing
• Name changing occurs when someone
registers purposely misspelled variations of
well-known domain names.
• The practice of name changing is annoying
to affected online businesses and confusing
to their customers.
17
Name Stealing
• Name stealing occurs when someone
changes the ownership of the domain name
assigned to the site to another site and
owner.
• Once domain name ownership is changed,
the name stealer can manipulate the site.
18
Electronic Commerce Threats
• There are three types of electronic
commerce threats:
– Client threats
– Communication channel threats
– Server threats
19
Client Threats
• Web pages were mainly static.
• The widespread use of active content has
changed the function of Web pages.
• Sources of client threats:
–
–
–
–
Active content
Java, Java Applets, and JavaScript
ActiveX Controls
Graphics, Plug-Ins, and E-mail Attachments
20
Active Content
• Active content refers to programs that are
embedded transparently in Web pages and that
cause action to occur.
• The best-known active content forms are Java
applets, ActiveX controls, JavaScript, and
VBScript.
• Also include graphics and Web browser plug-ins.
21
Active Content
• A Trojan horse is a program hidden inside another
program or Web page that masks its true purpose.
• A zombie is a program that secretly takes
over another computer for the purpose of
launching attacks on other computer.
• Malicious cookie can destroy files stored on
client computers.
22
Java
• Java adds functionality to business applications
and can handle transactions and a wide variety of
actions on the client computer.
• Java sandbox confines Java applet actions to a set
of rules defined by the security model.
• Java is a very powerful development language.
Untrusted applets should not be allowed to access
all of this power. The Java sandbox restricts
applets from performing many activities.
• These rules apply to all untrusted Java applets.
23
Java Applets
• Java applets that are loaded from a local file
system are trusted.
• Trusted applets have full access to system
resources on the client computer.
• Signed Java applets contain embedded
digital signatures from a trusted third party,
which are proof of the identity of the source
of the applet.
24
JavaScript
• JavaScript is a scripting language to enable
Web page designers to build active content.
• JavaScript can invoke privacy and integrity
attacks by executing code that destroys your
hard disk.
• JavaScript programs do not operate under
the restrictions of the Java sandbox security
model.
25
ActiveX Controls
• ActiveX is an object that contains programs and properties that
Web designers place on Web pages to perform particular tasks.
• ActiveX controls run only on computers running Windows and
only on browsers that support them.
• Because ActiveX controls have full access to your computer,
they can cause secrecy, integrity, or necessity violations.
• **ActiveX is a set of technologies that enable software
components to interact with one another in a networked
environment, regardless of the language in which the
components were created. An ActiveX control is a user interface
element created using ActiveX technology. ActiveX controls are
small, fast, and powerful, and make it easy to integrate and reuse
software components.
26
Graphics, Plug-Ins, and E-mail
Attachments
• Graphics, browser plug-ins, and e-mail attachments can
harbor executable content.
• The code embedded in the graphic could be a potential
threat.
• Plug-ins performs their duties by executing commands
buried within the media they are manipulating.
• E-mail attachments provide a convenient way to send
nontext information over a text-only system.
27
Virus
• A virus is software that attaches itself to another
program and can cause damage when the host
program is activated.
• Worm viruses replicate themselves on other
machines.
• A macro virus is coded as a small program and is
embedded in a file.
• The term steganography describes information
that is hidden within another piece of information.
28
Communication Channel Threats
• The Internet is not at all secure.
• Messages on the Internet travel a random
path from a source node to a destination
node.
• Internet channel security threats include:
– secrecy
– integrity
– necessity
29
Secrecy Threats
• Secrecy is the prevention of unauthorized
information disclosure.
• Privacy is the protection of individual rights to
nondisclosure.
• Secrecy is a technical issue requiring sophisticated
physical and logical mechanism.
• Privacy protection is a legal matter.
30
Integrity Threats
• An integrity threat exists when an
unauthorized party can alter a message
stream of information.
• Cyber vandalism is an example of an
integrity violation.
• Masquerading or spoofing is one means of
creating havoc on Web sites.
31
Necessity Threats
• The purpose of a necessity threat is to
disrupt normal computer processing or to
deny processing entirely.
• Necessity threat is also known as a delay,
denial, or denial-of-service threat (DOS).
• eBay faced the denial-of-service attack in
early 2000.
32
Server Threats
• Servers have vulnerabilities that can be
exploited to cause destruction or to acquire
information illegally.
• Server threats include:
–
–
–
–
Web server threats
Database threats
Common gateway interface threats
Other programming threats
33
Web Server Threats
• Setting up a Web server to run in high-privilege
status can lead to a Web server threat.
• The secrecy violation occurs when the contents of
a server’s folder names are revealed to a Web
browser.
• The W3C Threat Document provides information
about server security.
Click to see Figure 5-13:
34
35
Database Threats
• Databases connected to the Web could damage a
company if it were disclosed or altered.
• Anyone obtains user authentication information
can masquerade as a legitimate user.
• The Database threats resource center describes
threats to database systems.
Click to see Figure 5-14:
36
37
Common Gateway Interface
Threats
• Because CGIs are programs, they present a
security threat if misused.
• CGI scripts can be set up to run with high
privileges, which causes a threat.
• CGI programs or scripts can reside about
anywhere on the Web server, they are hard
to track down and manage.
38
Other Programming Threats
• Another serious Web server attack can come from
programs executed by the server.
• Buffer overflows can have moderate to very
serious security consequences.
• A mail bomb is the attack when thousands of
people send a message to a particular address.
Click to see Figure 5-15:
39
40
CERT
• DARPA created the Computer Emergency
Response Team (CERT) Coordination
Center to be located at Carnegie Mellon
University.
• CERT posts “CERT alerts” to inform the
Internet community about recent security
events.
Click to see Figure 5-16:
41
42