1. Trang chủ
  2. » Luận Văn - Báo Cáo

Lecture E-commerce (7/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver

51 152 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 51
Dung lượng 2,41 MB

Nội dung

Chapter 5 - Online security and payment systems. The topics discussed in this chapter are: What is the difference between hacking and cyberwar? Why has cyberwar become more potentially devastating in the past decade? What percentage of computers have been compromised by stealth malware programs? Will a political solution to MAD 2.0 be effective enough?

Trang 1

Kenneth C

Laudon Carol Guercio Traver

business. technology. society

seventh edition

Trang 3

potentially devastating in the past decade?

compromised by stealth malware

programs?

Trang 4

detected security breach in last year

 Of those that shared numbers, average loss $288,000

 Stolen information stored on underground economy servers

Trang 5

SOURCE: Based on data from

Computer Security Institute,

2009

Trang 6

Organizational policies and procedures

Industry standards and government laws

 Other factors

Time value of money

Cost of security vs potential loss

Security often breaks at weakest link

Trang 7

The E­commerce Security Environment

Trang 8

Pearson Education, Inc.

Table 5.2, Page 270

Trang 12

Pearson Education, Inc.

Vulnerable Points in an  E­commerce Environment

Figure 5.4, Page 274

SOURCE: Boncella, 2000.

Trang 14

Pearson Education, Inc.

Most Common Security Threats (cont.)

 Deceptive online attempt to obtain confidential information

 Social engineering, e-mail scams, spoofing legitimate Web sites

 Use of information to commit fraudulent acts (access checking accounts), steal identity

Trang 15

Most Common Security Threats (cont.)

 Hackers target merchant servers; use data to establish credit under false identity

 Spoofing

 Pharming

 Spam/junk Web sites

 Denial of service (DoS) attack

 Hackers flood site with useless traffic to overwhelm network

 Distributed denial of service (DDoS) attack

Trang 16

 Single largest financial threat

 Poorly designed server and client software

 Mobile platform threats

 Same risks as any Internet device

 Malware, botnets, vishing/smishing

Trang 17

 Protecting networks (firewalls)

 Protecting servers and clients

Trang 19

Encryption

Transforms data into cipher text readable only

by sender and receiver

Secures stored information and information

Trang 20

Pearson Education, Inc.

Symmetric Key Encryption

 Sender and receiver use same digital key to

encrypt and decrypt message

 Requires different set of keys for each

transaction

 Strength of encryption

 Length of binary key used to encrypt data

 Advanced Encryption Standard (AES)

 Most widely used symmetric key encryption

 Uses 128-, 192-, and 256-bit encryption keys

 Other standards use keys with up to 2,048

bits

Slide 5­20

Trang 21

Public Key Encryption

 Uses two mathematically related digital keys

 Public key (widely disseminated)

 Private key (kept secret by owner)

 Both keys used to encrypt and decrypt message

 Once key used to encrypt message, same key cannot be used to decrypt message

 Sender uses recipient’s public key to encrypt

message; recipient uses his/her private key to decrypt it

Trang 22

Pearson Education, Inc.

Public Key Cryptography – A Simple Case

Figure 5.8, Page 289

Trang 23

Public Key Encryption using Digital Signatures and 

Hash Digests

 Hash function:

 Mathematical algorithm that produces fixed-length number

called message or hash digest

 Hash digest of message sent to recipient along

with message to verify integrity

 Hash digest and message encrypted with

recipient’s public key

 Entire cipher text then encrypted with recipient’s

private key – creating digital signature – for

authenticity, nonrepudiation

Trang 24

Pearson Education, Inc.

Public Key Cryptography with Digital Signatures

Figure 5.9, Page 291

Trang 25

Digital Envelopes

 Address weaknesses of:

 Public key encryption

 Computationally slow, decreased transmission speed, increased processing time

 Symmetric key encryption

 Insecure transmission lines

 Uses symmetric key encryption to encrypt

document

 Uses public key encryption to encrypt and send symmetric key

Trang 26

Pearson Education, Inc.

Creating a Digital Envelope

Figure 5.10, Page 292

Trang 27

Digital Certificates and  Public Key Infrastructure (PKI)

 Name of subject/company

 Subject’s public key

 Digital certificate serial number

 Expiration date, issuance date

 Digital signature of CA

 CAs and digital certificate procedures

 PGP

Trang 28

Pearson Education, Inc.

Digital Certificates and Certification Authorities

Figure 5.11, Page 294

Trang 29

Limits to Encryption Solutions

PKI not effective against insiders, employees

Protection of private keys by individuals may

Trang 31

Securing Channels of Communication

 Establishes a secure, negotiated client-server

session in which URL of requested document,

along with contents, is encrypted

 Provides a secure message-oriented

communications protocol designed for use in

conjunction with HTTP

 Allows remote users to securely access internal

network via the Internet, using Point-to-Point

Trang 32

Pearson Education, Inc.

Secure Negotiated Sessions Using SSL

Figure 5.12, Page 298

Trang 33

Protecting Networks

Hardware or software

Uses security policy to filter packets

Two main methods:

1 Packet filters

2 Application gateways

Software servers that handle all

communications originating from or being

sent to the Internet

Trang 34

Pearson Education, Inc.

Firewalls and Proxy Servers

Figure 5.13, Page 301

Trang 35

prevent threats to system integrity

Trang 36

Pearson Education, Inc.

Management Policies, Business  Procedures, and Public Laws

of IT budget on security hardware,

software, services ($120 billion in 2009)

Technology

Effective management policies

Public laws and active enforcement

Trang 37

 Authentication procedures, inc biometrics

 Authorization policies, authorization management

systems

Trang 38

Pearson Education, Inc.

Developing an E­commerce Security Plan

Figure 5.14, Page 303

Trang 39

The Role of Laws and Public Policy

 Laws that give authorities tools for identifying,

tracing, prosecuting cybercriminals:

 National Information Infrastructure Protection Act of 1996

 USA Patriot Act

 Homeland Security Act

 Private and private-public cooperation

 CERT Coordination Center

 US-CERT

 Government policies and controls on encryption software

 OECD guidelines

Trang 40

this type of device?

prove?

to threats than traditional PC software

Trang 42

 Peer-to-peer payment systems

Trang 43

 Copyright © 2011 

Trang 44

28 % online payments in 2009 (U.S.)

 Limitations of online credit card

payment

Security

Cost

Social equity

Trang 45

How an Online Credit Transaction Works

Trang 46

Pearson Education, Inc.

 Emulates functionality of wallet by authenticating consumer,

storing and transferring value, and securing payment process from consumer to merchant

 Early efforts to popularize failed

 Newest effort: Google Checkout

 Value storage and exchange using tokens

 Most early examples have disappeared; protocols and practices too complex

Trang 47

 Based on value stored in a consumer’s bank,

checking, or credit card account

 PayPal, smart cards

 Users accumulate a debit balance for which they are billed at the end of the month

 Extends functionality of existing checking accounts for use online

Trang 48

Pearson Education, Inc.

Mobile Payment Systems

 Use of mobile handsets as payment devices

well-established in Europe, Japan, South Korea

 Japanese mobile payment systems

 E-money (stored value)

 Mobile debit cards

 Mobile credit cards

 Not as well established yet in U.S

 Majority of purchases are digital content for use on cell phone

Trang 49

more feasible now than in the past?

helping to develop mobile payment

systems.

grown faster? What factors will spur their

Trang 50

Pearson Education, Inc.

Electronic Billing Presentment and 

Payment (EBPP)

EBPP; expected to continue to grow

Biller-direct (dominant model)

Consolidator

infrastructure providers

Trang 51

All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher Printed in the United States of America.

Copyright © 2011 Pearson Education, Inc.  

Publishing as Prentice Hall

Ngày đăng: 18/01/2020, 18:32

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w