ect 582 secure electronic commerce professor robin burke

58
ECT 582 Secure Electronic Commerce Professor Robin Burke

Upload: tyrone-baker

Post on 30-Dec-2015

224 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: ECT 582 Secure Electronic Commerce Professor Robin Burke

ECT 582Secure Electronic Commerce

Professor Robin Burke

Page 2: ECT 582 Secure Electronic Commerce Professor Robin Burke

Outline

Introductions Course and Syllabus Security E-Commerce

Page 3: ECT 582 Secure Electronic Commerce Professor Robin Burke

Introductions

Student information sheet

Page 4: ECT 582 Secure Electronic Commerce Professor Robin Burke

Administrativa

Contacting meCS&T 453x [email protected]

Course web sitehttp://josquin.cs.depaul.edu/~rburke/

courses/w04/ect360/

Page 5: ECT 582 Secure Electronic Commerce Professor Robin Burke

About Me

2nd year at CTI PhD in AI, 1993 Research

AI applications in E-Commerce"smart catalogs"

Taught web development since 1996 Founded an e-commerce company

Page 6: ECT 582 Secure Electronic Commerce Professor Robin Burke

Course

Public key infrastructurehow to enable large-scale secure

messaging? Secure transactions Securing hosts and applications Privacy

Page 7: ECT 582 Secure Electronic Commerce Professor Robin Burke

Grading

Six assignments – 35% Midterm – 25% Final – 30% Participation – 10%

Page 8: ECT 582 Secure Electronic Commerce Professor Robin Burke

Grading

Three Components Knowledge

Does the work display correct technical knowledge?

Reasoning Does the work indicate good problem-solving

skills? Communication

Is the answer well-written English?

Page 9: ECT 582 Secure Electronic Commerce Professor Robin Burke

Grading, cont'd

A = Excellent work Thorough knowledge of the subject matter Well-considered and creative solutions Well-written answers

B = Very good work Complete knowledge of the subject matter No major errors of reasoning in problem solutions Competent written answers

C = Average work Some gaps in knowledge of subject matter Some errors or omissions in problem solving Written answers may contain grammatical and other errors

D = Below average work Substantial gaps in knowledge of subject matter. Problem solving incomplete or incorrect Poor English in written answers

Page 10: ECT 582 Secure Electronic Commerce Professor Robin Burke

Discussion Forum

Important for this course More DL than local students Automatically mailed to all students

Uses Questions about assignments Announcements Discussion about security issues

DL students required to post at least weekly

All students component of "Participation Grade"

Page 11: ECT 582 Secure Electronic Commerce Professor Robin Burke

Security

1. freedom from danger, risk, etc.: safety2. freedom from care, apprehension or doubt;

well-founded confidence3. something that secures or makes safe;

protection; defense4. precautions taken to guard against theft,

sabotage, the stealing of military secrets, etc

– Webster’s Encyclopedic Unabridged Dictionary of the English Language

Page 12: ECT 582 Secure Electronic Commerce Professor Robin Burke

E-Commerce

the process of electronically buying and selling goods, services and information, and the maintenance of all the relationships, both personal and organizational, required for an electronic marketplace to function.

Page 13: ECT 582 Secure Electronic Commerce Professor Robin Burke

What are we securing?

Page 14: ECT 582 Secure Electronic Commerce Professor Robin Burke

Post-9/11 realities

Aspects of business operations may impact public safety

Page 15: ECT 582 Secure Electronic Commerce Professor Robin Burke

Inherent Hazard

E-commerce opens a hole for interacting with an organization Any Internet user can attack that opening

Good design Minimizes the risk associated with enabling

e-commerce While still preserving its benefits

Bad design Fails to reduce the risks of e-commerce, or Eliminates the benefits of e-commerce

Page 16: ECT 582 Secure Electronic Commerce Professor Robin Burke

Basic concepts

Assets Attackers Attacks Protocol Risk

Page 17: ECT 582 Secure Electronic Commerce Professor Robin Burke

Assets

Financial Customer data Proprietary info Reputation Systems

Page 18: ECT 582 Secure Electronic Commerce Professor Robin Burke

Is e-commerce different?

Need for physical proximity Differences in documents

Page 19: ECT 582 Secure Electronic Commerce Professor Robin Burke

Physical documents

Semi-permanence of ink embedded in paper fibers

Particular printing process letterhead watermark

Biometrics of signature Time stamp Obviousness of modifications,

interlineations, and deletions

Page 20: ECT 582 Secure Electronic Commerce Professor Robin Burke

Computer documents

Computer-based records can be modified freely and without detection

Supplemental control mechanisms must be applied to achieve a level of trustworthiness comparable to that on paper

Less permanent, too

Page 21: ECT 582 Secure Electronic Commerce Professor Robin Burke

Legal differences

In some cases, possession mattersnegotiable document of titlecash money

Page 22: ECT 582 Secure Electronic Commerce Professor Robin Burke

Loss of assets

Physical assetsloss = theft or destruction

Information assetsloss = violation of

• confidentiality• availability• integrity• authenticity

Page 23: ECT 582 Secure Electronic Commerce Professor Robin Burke

Attackers

Class 0casual passerby

Class 1capable outsider

Class 2knowledgeable insider

Class 3determined organization

Page 24: ECT 582 Secure Electronic Commerce Professor Robin Burke

E-Commerce

Proximity is not an issue Scale

Many, many Class 1 attackers Mutability

Easy for insiders to cover their tracks

Page 25: ECT 582 Secure Electronic Commerce Professor Robin Burke

Attack

Any action that compromises the security of an e-commerce system

Simplifying assumptionsecurity = protecting messages

Page 26: ECT 582 Secure Electronic Commerce Professor Robin Burke

Passive vs active

PassiveAttacker monitors communication

• disclose contents• but also traffic analysis

ActiveAttacker interferes with

communication• generates messages• prevents transmission or reception

Page 27: ECT 582 Secure Electronic Commerce Professor Robin Burke

Normal messaging

Alice Bob

Eve

Page 28: ECT 582 Secure Electronic Commerce Professor Robin Burke

Basic attack types

Interception Interruption Modification Fabrication

Page 29: ECT 582 Secure Electronic Commerce Professor Robin Burke

Interception

Attack on confidentiality

Alice Bob

Eve

Page 30: ECT 582 Secure Electronic Commerce Professor Robin Burke

Example: Password sniffer

Program to capture user id / password info

Case in Tokyosniffer installed at Internet cafe16 million Yen stolen

Page 31: ECT 582 Secure Electronic Commerce Professor Robin Burke

Interruption

Attack on availability

Alice Bob

Eve

Page 32: ECT 582 Secure Electronic Commerce Professor Robin Burke

Example: SYN flooding

send open request for TCP connection but don’t respond to handshake

do this over and over again eventually server can't accept new

connections

Page 33: ECT 582 Secure Electronic Commerce Professor Robin Burke

Modification

Attack on integrity

Alice Bob

Eve

Page 34: ECT 582 Secure Electronic Commerce Professor Robin Burke

Example: Shareware trojan

Alice posts a shareware application Eve modifies it to contain her virus Bob downloads the modified version

Page 35: ECT 582 Secure Electronic Commerce Professor Robin Burke

Fabrication

Attack on authenticity

Alice Bob

Eve

Page 36: ECT 582 Secure Electronic Commerce Professor Robin Burke

Example: Session hijacking

Taking over active sessions after Alice leavesbefore application times out

Bypass the authentication processhave Alice's privileges

Page 37: ECT 582 Secure Electronic Commerce Professor Robin Burke

Protocol

A set of formal rules describing how to transmit data, especially across a network....High level protocols deal with the data formatting, including the syntax of messages, the terminal to computer dialogue, character sets, sequencing of messages etc.

– FOLDOC

Page 38: ECT 582 Secure Electronic Commerce Professor Robin Burke

To describe a protocol

The roles who participates

The steps how the interaction unfolds

The messages syntax and meaning of messages sent and

received The process

processing by each player

Page 39: ECT 582 Secure Electronic Commerce Professor Robin Burke

Example: Homework protocol Instructor hands out assignment

includes requirements and due date Student performs assignment

submits by due date Instructor grades assignment

grade is incorporated into course database

Graded work is returned to student

Page 40: ECT 582 Secure Electronic Commerce Professor Robin Burke

Protocol security

Generally we talk about the protecting the protocol messages

Different protocols have different security characteristics Homework protocol is not secure against

fabrication Test taking protocol is more secure

Attacks can target different protocol steps "grader" example

Page 41: ECT 582 Secure Electronic Commerce Professor Robin Burke

Risk

Risk isvalue of loss * probability of loss

Both can be hard to quantify Risk management

process of analyzing and mitigating risk

one technique is historical• what losses have others suffered?

Page 42: ECT 582 Secure Electronic Commerce Professor Robin Burke

What are the primary risks?

1. Disclosure of proprietary information2. Denial of service3. Virus attacks4. Insider net abuse5. Financial fraud6. Sabotage

- CSI/FBI 2003 Computer Crime and Security Survey

Total value of losses: $200 million

Page 43: ECT 582 Secure Electronic Commerce Professor Robin Burke

Secondary risks

Damage to relations with customer or business partners

Legal, public relations, or business resumption cost

Public relations damage Uptake failure due to lack of

confidence

Page 44: ECT 582 Secure Electronic Commerce Professor Robin Burke

Secure E-Commerce

Not E-Commerce Risk Management Very big topic

strategyarchitecturetechnology

Page 45: ECT 582 Secure Electronic Commerce Professor Robin Burke

Security strategy

Threats what is valuable? who might want it?

Vulnerabilities where is the organization exposed?

Defenses what can be done to manage the risks?

Legal what liabilities and legal requirements exist?

Page 46: ECT 582 Secure Electronic Commerce Professor Robin Burke

Security architecture

People how are they hired, trained, monitored,

audited? Systems

what systems exist? how are systems connected to each and to

the larger Internet? Procedures

how are systems used? who gets access to what under what

circumstances?

Page 47: ECT 582 Secure Electronic Commerce Professor Robin Burke

Security technology

Main focus of this course Specific technologies for achieving

security-related goals But

meaningless in the absence of a strategy and an architecture

Page 48: ECT 582 Secure Electronic Commerce Professor Robin Burke

Secure E-Commerce

Technologies for securing the protocols of electronic commerce

One component of risk managementnot the only componentsometimes not even the most

importantbut a basic safeguard

Page 49: ECT 582 Secure Electronic Commerce Professor Robin Burke

What can technology provide?

Confidentiality Authentication Integrity Non-repudiation Access control Availability

Page 50: ECT 582 Secure Electronic Commerce Professor Robin Burke

Confidentiality

Protects against interception Ensures that a message is only

readable by intended recipient Technology

Encryption

Page 51: ECT 582 Secure Electronic Commerce Professor Robin Burke

Authentication

Protects against fabrication Ensures that the origin of a message

or electronic document is correctly identified, with assurance that the identity is not false

TechnologyUser Id/PasswordDigital certificates

Page 52: ECT 582 Secure Electronic Commerce Professor Robin Burke

Integrity

Protects against modification Ensures that only authorized parties

are able to modify an electronic document or

Allow modification to be detected Technology

Digital signatures

Page 53: ECT 582 Secure Electronic Commerce Professor Robin Burke

Non-repudiation

Protects against an e-commerce participant acting in bad faith

Require that neither the sender nor the receiver of a message be able to deny the transmission

Technology(Complicated)

Page 54: ECT 582 Secure Electronic Commerce Professor Robin Burke

Access control

Protects against unauthorized access Allows the establishment of fine-

grained control over access to files and applications for different users and groups

Technology(Various, usually tied to

authentication)

Page 55: ECT 582 Secure Electronic Commerce Professor Robin Burke

Availability

Protects against interruption Requires that computer system asset

be available to authorized parties when needed

Technology(Many)

Page 56: ECT 582 Secure Electronic Commerce Professor Robin Burke

The big picture

Security is a multi-faceted feature of information systems

An organization needsA security strategy tailored for its

particular needsA security architecture that addresses

that strategySecurity technology to realize the

architecture

Page 57: ECT 582 Secure Electronic Commerce Professor Robin Burke

Assignment #1

Subscribe to CERT Advisory mailing list

Post on the "Test" forum RISKS Reaction paper Due before class starts

No late assignments!

Page 58: ECT 582 Secure Electronic Commerce Professor Robin Burke

Next week

Cryptography Reading

Ford & Baum, Ch. 1 & 4Risks Digest

Should be prepared for discussion