E-Commerce and Bank Security

Download Report

Transcript E-Commerce and Bank Security

E-Commerce & Bank
Security
By: Mark Reed
COSC 480
Outline







Introduction
Definition
Security Challenges
Security Terms
Common Threats
Security Practices
Protecting Yourself
Introduction

“Total eCommerce sales for 2006 were
estimated at $108.7 billion. This represents an
increase of 23.5% over 2005,” according to the
U.S. Census Bureau’s E-Commerce Survey.
What is Security?

Dictionary Definition: Protection or defense
against attack, interference, espionage, etc.

Computer Science Classification:
Confidentiality – protecting against unauthorized
data disclosure
 Integrity – preventing unauthorized modification
 Availability – preventing data delays or denials

Security Challenges
Security Terms

Authentication – originator can be verified

Integrity – information has not been altered by an
unauthorized person or process

Non-repudiation – proof of participation by the sender
and/or receiver of a transmission

Privacy – individual rights to nondisclosure
Threats

Social Engineering – mislead the end user

Man-in-the-middle – listen between client/sever

Man-in-the-browser – redirect end-user to
counterfeit sites to steal credentials
Threats Cont.

Malware – poison hosts file and/or DNS to redirect the user to counterfeit sites

Trojan Proxy – http redirector that re-directs all
traffic to a Proxy and sends to the attacker
Malware/Phishing Attack

Poisoning the hosts file to re-direct entries
Spam

“Spam accounts for 9 out of every 10 emails in
the United States.”

MessageLabs, Inc.

Main source of phishing attacks

Not a secure transmission method
Ecommerce Architecture

Support for peak access times

Replication and mirroring to avoid denial of
service attacks

Security of web pages through certificates and
network architecture to avoid spoofing attacks
Security Challenges

Client side security


Sever-side security


Prevent unauthorized access to stored information
Prevent unauthorized access while allowing
authorized user to connect
Application and Database server security

Use security layers between the servers
Client Side Security

Protect information stored on the client system

Use of digital signatures and encryption can
reduce non-repudiation security attacks

Communication security such as secure HTTP
Server-side Security

Place application and database server behind a
firewall in a demilitarized zone (DMZ)

Do not store sensitive information such as credit
card numbers and SSN on web servers

Turn off all unnecessary services and block any
unused ports
Application & Database Security

Application server should shield that database
server from direct contact with web servers

Database servers should be completely isolated
from the internet and any other unsecure server

User passwords when retrieving sensitive
information from the database server
Company Security Precautions

Defense-in-depth strategies that use multiple,
overlapping and mutually supportive systems

Antivirus, firewall, and intrusion detection/prevention

Update software patches on public systems

Block possible harmful email attachment exts.
Security Strengthening

Multi-layer protection approaches

Secret image authentication

Using hardware authentication (serial number)
Amazon PayPhrase
Avoid Security Threats

Do not provide passwords, account numbers, or
other personal information through email

Do not trust links in emails or on websites

Check for the lock icon in the address bar of
your browser
Secure Your PC

Maintain up-to-date antivirus, spyware and
firewall protection

Keep your operating system and applications
up-to-date with security patches

Avoid transaction at wireless hotspots
Conclusion







Introduction
Definition
Security Challenges
Security Issues
Security Practices
Common Threats
Protecting Yourself
Sources

Al-Slamy, Nada. "E-Commerce security." IJCSNS International Journal of Computer Science
and Network Security 8.5 (2008): 5. Print.

Browning, Bob. "Electronic Commerce Tutorial Part 1 - Web Developer's Journal."
Web Developer's Journal - Tips on Web Page Design, HTML, Graphics and Development Tools.
N.p., n.d. Web. 26 Feb. 2010.
<http://webdevelopersjournal.com/columns/ecommerce1.html>.

Ghosh, Anup K.. "Journal of Internet Banking and Commerce." ARRAY Development.
N.p., n.d. Web. 26 Feb. 2010. <http://www.arraydev.com/commerce/JIBC/970404.htm>.

"Computer Laboratory Security Group: Banking security." The Computer Laboratory.
N.p., n.d. Web. 25 Feb. 2010.
<http://www.cl.cam.ac.uk/research/security/banking/>.