e-commerce security and payment systems mgt 3225: e-business lecture 5: e-commerce security and...

34
MGT 3225: E-Business Lecture 5: E-commerce Security and E-commerce Security and Payment Systems Payment Systems Md. Mahbubul Alam, PhD

Upload: rose-newman

Post on 01-Jan-2016

233 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

MGT 3225: E-Business

Lecture 5: E-commerce Security and E-commerce Security and

Payment SystemsPayment Systems

Md. Mahbubul Alam, PhD

Page 2: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

The E-commerce Security Environment The Internet is an open, vulnerable-design network, lacks

many basic security features. Overall size and losses of cybercrime unclear

Difficult to quantify the actual amount of the loss 2012 survey: Average annualized cost of cybercrime was $8.9

million/year Online credit card fraud & phishing attacks are perhaps the

most high-profile form of e-commerce crimes.

What is Good E-commerce security? To achieve highest degree of security

o New technologieso Organizational policies and procedureso Industry standards and government laws

Other factorso Time value of money perfect security of every item is not needed forever. o Weigh the cost of security against the potential losso Security often breaks at weakest link

Slide 5-2

Page 3: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

The E-commerce Security Environment

Slide 5-3

E-commerce security is multi-layered, and must take into account new technology, policies, and procedures, and laws and industry standards.

Page 4: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Dimensions of E-commerce Security1. Integrity

The ability of ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party.

2. Nonrepudiation The ability of ensure that e-commerce participants do not deny (i.e.,

repudiate) their online actions.

3. Authenticity The ability to identify the identify of a person or entity with whom

you are dealing on the Internet.

4. Confidentiality The ability to ensure that messages and data are available only to

those who are authorized to view them. Privacy The ability to control the use of information about oneself.

5. Availability The ability to ensure that an e-commerce site continues to function

as intended.

Slide 5-4

Page 5: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Table 5.3, Page 254

Slide 5-5

Page 6: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

The Tension Between Security and Other Values Ease of use

The more security measures added, the more difficult a site is to use, and the slower it becomes.

Too much security can harm profitability, while not enough security can potentially put you out of business.

Public safety and criminal uses of the Internet Use of technology by criminals to plan crimes or threaten

nation-state.

Slide 5-6

Page 7: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Security Threats in theE-commerce Environment

Three key points of vulnerability in e-commerce environment:

1. Client

2. Server

3. Communications pipeline (Internet communications channels)

Slide 5-7

Page 8: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

A Typical E-commerce Transaction

Figure 5.2, Page 256

Slide 5-8

Page 9: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Vulnerable Points in an E-commerce Transaction

Figure 5.3, Page 257

Slide 5-9

Page 10: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Most Common Security Threats Malicious code (malware, exploits)

Drive-by downloads Viruses replicate & spread to other

programs Worms spread from computer to

computer Ransomware restricting access,

asking for payment. Trojan horses Backdoors remotely access Bots, botnets respond to external

command Threats at both client and server levels

Hacking Hackers vs. crackers (hacker with

criminal intent) Types of hackers: White, black, grey

hats Hacktivism Cybervandalism & data

theft for political purposes.

Potentially unwanted programs (PUPs), installed without user’s consent

Browser parasites monitor & change the setting of a browser.

Adware servers pop-up ads. Spyware collect info such as

keystrokes, e-mail, IM & so on. Phishing, online attack by a third party

to obtain confidential info for financial gain.

Social engineering, exploitation of human fallibility & gullibility to distribute malware.

E-mail scams Spear-phishing Identity fraud/theft

Cybervandalism Disrupting, defacing, destroying Web

site Data breach

Losing control over corporate information to outsiders

Slide 5-10

Page 11: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Most Common Security Threats (cont’d) Credit card fraud/theft Spoofing (hiding true identify by IP/ e-mail) and pharming (redirecting a

Web link to an address different from the intended one.) Spam (junk) Web sites (link farms) collection of advertisements. Identity fraud/theft unauthorized use of another person’s personal data

for illegal purpose. Denial of service (DoS) attack flooding a Web site with useless traffic to

overwhelm network Distributed denial of service (DDoS) attack using numerous computers

to attack the target network from numerous launch points. Sniffing Spying program that monitors information traveling over a

network. Insider attacks Poorly designed server and client software Social network security issues Mobile platform security issues

Vishing target naïve cell phone users with verbal messages to call a certain number.

Smishing exploit SMS/text messages. Madware innocent-looking apps that contain adware that launches pop-up ads.

Cloud security issues

Slide 5-11

Page 12: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Insight on Technology: Class Discussion

Think Your Smartphone Is Secure? What types of threats do smartphones face? Are there any particular vulnerabilities to this type

of device? Are apps more or less likely to be subject to threats

than traditional PC software programs?

Slide 5-12

Page 13: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Technology Solutions Protecting Internet communications

Encryption

Securing channels of communication SSL, VPNs Protecting networks Firewalls

Protecting servers and clients

Slide 5-13

Page 14: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Tools Available to Achieve Site Security

Figure 5.5, Page 276

Slide 5-14

Page 15: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Encryption Transforms data into cipher text readable only by

sender and receiver. Purpose:

To secure stored information To secure information transmission

Cipher text text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver.

Provides 4 of 6 key dimensions of e-commerce security: Message integrity assurance that the message has not been altered. Nonrepudiation prevents the user from denying he/she sent the

message. Authentication provides verification of the identity of the person. Confidentiality assurance that the message was not read by others.

Slide 5-15

Page 16: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Symmetric/Secret Key Encryption Both the sender and receiver use the same digital

key to encrypt and decrypt message. Requires different set of keys for each transaction. Strength of encryption

Length of binary key used to encrypt data. Data Encryption Standard (DES), uses a 56-bit

encryption key. Advanced Encryption Standard (AES)

Most widely used symmetric key encryption Uses 128-, 192-, and 256-bit encryption keys

Other standards use keys with up to 2,048 bits

Slide 5-16

Page 17: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Public Key Encryption Uses two mathematically related digital keys

Public key (widely disseminated) Private key (kept secret by owner)

Both keys used to encrypt and decrypt message

Once key used to encrypt message, same key cannot be used to decrypt message

Sender uses recipient’s public key to encrypt message; recipient uses private key to decrypt it.

Slide 5-17

Page 18: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Public Key Encryption using Digital Signatures and Hash Digests

Hash function: Mathematical algorithm that produces fixed-length number called

message or hash digest. Hash digest of message sent to recipient along with

message to verify integrity Hash digest and message encrypted with recipient’s public

key Entire cipher text then encrypted with sender’s private key

—creating digital signature—for authenticity, nonrepudiation

Slide 5-18

Page 19: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Digital Envelopes Address weaknesses of:

Public key encryption Computationally slow, decreased transmission speed, increased

processing time Symmetric key encryption

Insecure transmission lines

Uses symmetric key encryption to encrypt document Uses public key encryption to encrypt and send

symmetric key “Key within a key”

Slide 5-19

Page 20: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Digital Certificates and Public Key Infrastructure (PKI)

Digital certificate includes: Name of

subject/company Subject’s public key Digital certificate serial

number Expiration date, issuance

date Digital signature of CA

Public Key Infrastructure (PKI): CAs and digital

certificate procedures (issue, verify, guarantee digital certificates.

Pretty Good Privacy (PGP pgpi.org.)

Slide 5-20

Page 21: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Limits to Encryption Solutions Doesn't protect storage of private key

PKI not effective against insiders, employees Protection of private keys by individuals may be haphazard

No guarantee that verifying computer of merchant is secure

CAs are unregulated, self-selecting organizations

Secure Sockets Layer (SSL)/Transport Layer Security (TLS) Establishes secure, negotiated client–server session

Virtual Private Network (VPN) Allows remote users to securely access internal network via the

Internet Wireless (Wi-Fi) networks

WPA2

Slide 5-21

Securing Channels of Communication

Page 22: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Secure Negotiated Sessions Using SSL/TLS

Figure 5.10, Page 286

Slide 5-22

Page 23: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Protecting Networks Firewall

Hardware or software Uses security policy to filter packets Two main methods:

Packet filters, examine data packets to determine whether they are destined for a prohibited port or originate from a prohibited IP address.

Application gateways, filter communication based on the application being requested.

Proxy servers (proxies) Software servers that handle all communications from or sent to the

Internet Limit access of internal clients to external Internet servers. Dual-home system gateway for internal computers, mail server for

external computers. Intrusion detection systems

Examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack.

Intrusion prevention systems Has all functionality of an IDS, with the additional ability to take steps to

prevent and block suspicious activities.

Slide 5-23

Page 24: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Firewalls and Proxy Servers

Slide 5-24

• The Primary function of a firewall is to deny access by remote client computers to local computes.• The primary purpose of a proxy server is to provide controlled access from local computes to

remote computers.

Page 25: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Protecting Servers and Clients Operating system security enhancements

Upgrades, patches

Anti-virus software Easiest and least expensive way to prevent threats to system

integrity Requires daily updates

Slide 5-25

Page 26: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Management Policies, Business Procedures, and Public Laws Worldwide, companies spend more than $65 billion on security

hardware, software, services Managing risk includes:

Technology Effective management policies Public laws and active enforcement

A Security Plan: Management Policies Risk assessment Security policy Implementation plan

Security organization educate & trains users Access controls determine who can gain legitimate access to a

network. Authentication procedures, including biometrics digital signature,

digital certificates, PKI, biological & physical characteristics. Authorization policies, authorization management systems

Security audit routine review of access logs.

Slide 5-26

Page 27: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Developing an E-commerce Security Plan

Figure 5.12, Page 291

Slide 5-27

Page 28: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

The Role of Laws and Public Policy Laws that give authorities tools for identifying,

tracing, prosecuting cybercriminals: National Information Infrastructure Protection Act of 1996 USA Patriot Act Homeland Security Act

Private and private-public cooperation CERT Coordination Center US-CERT

Government policies and controls on encryption software OECD, G7/G8, Council of Europe, Wassener Arrangement

Slide 5-28

Page 29: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Types of Payment Systems Cash

Most common form of payment Instantly convertible into other forms of value No float

Checking transfer Second most common payment form in United States

Credit card Credit card associations Issuing banks Processing centers

Stored value Funds deposited into account, from which funds are paid out or

withdrawn as needed, e.g., debit cards, gift certificates, peer-to-peer payment systems

Accumulating balance Accounts that accumulate expenditures and to which consumers make

period payments e.g., utility, phone, American Express accounts

Slide 5-29

Page 30: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Payment System Stakeholders Consumers

Low-risk, low-cost, refutable, convenience, reliability Merchants

Low-risk, low-cost, irrefutable, secure, reliable Financial intermediaries

Secure, low-risk, maximizing profit Government regulators

Security, trust, protecting participants and enforcing reporting

Slide 5-30

Page 31: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

1. Online credit card transactions, most popular, often default choice of payment for e-commerce.

2. Digital Wallets, use NFC technology. User may pay by simply tapping his phone to a compatible POS terminal with a secret PIN. e.g., Google Checkout.

3. Digital Cash, “currency” represented in an electronic form. e.g., Octopus Card in Hong Kong, Ez-link Card in Singapore.

4. Electronic Cheques

5. Online Stored Value System, e.g., PayPal.

6. Digital Accumulating Balance Payment Systems, similar to “digital Wallets”, ideal for micro-transaction payments, allows user to make multiple purchases, which will be totaled up & billed for at the end of a time period.

7. Mobile Commerce, “Wallet phone” No need card authentication or customer signature. e.g., Osaifu Keitai in Japan.

Electronic Payment Systems: Types

Page 32: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

How an Online Credit Transaction Works

Figure 5.15, Page 302

Slide 5-32

Page 33: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD

Electronic Billing Presentment and Payment (EBPP)

Online payment systems for monthly bills 50% of all bill payments Two competing EBPP business models:

Biller-direct (dominant model) Consolidator

Both models are supported by EBPP infrastructure providers

Slide 5-33

Page 34: E-commerce Security and Payment Systems MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD