9 Security Issues in EC mailto ckfarnmgt ncu

  • Slides: 67
Download presentation
9 Security Issues in EC 中央大學. 資訊管理系 范錚強 mailto: ckfarn@mgt. ncu. edu. tw http:

9 Security Issues in EC 中央大學. 資訊管理系 范錚強 mailto: ckfarn@mgt. ncu. edu. tw http: //www. mgt. ncu. edu. tw/~ckfarn 2013. 05 中央大學。范錚強 1

What Is Information Security? Protecting information and information systems from unauthorized access, use, disclosure,

What Is Information Security? Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction 中央大學。范錚強 2

安全威脅有多大? 2010年電腦犯罪及安全調查 來源:Computer Security Institute (CSI), CSI Survey 2010/11 2007年美國企業因資訊安全問題而衍生的 損失,平均高達 35萬 (2006: 17萬)

安全威脅有多大? 2010年電腦犯罪及安全調查 來源:Computer Security Institute (CSI), CSI Survey 2010/11 2007年美國企業因資訊安全問題而衍生的 損失,平均高達 35萬 (2006: 17萬) 41. 1%企業遭受到某種資訊安全破壞 (2007: 46%; 2006: 53%; 2005: 56%) https: //cours. etsmtl. ca/log 619/documents/divers/CSIsurvey 2010. pdf 中央大學。范錚強 3

Major EC Security Concerns 中央大學。范錚強 6

Major EC Security Concerns 中央大學。范錚強 6

The Drivers of EC Security Problems The Internet’s Vulnerable Design 開放系統設計 彈性的定址方式 (IP address,

The Drivers of EC Security Problems The Internet’s Vulnerable Design 開放系統設計 彈性的定址方式 (IP address, Domain name) Keystroke logging (keylogging): A method of capturing and recording user keystrokes The Shift to Profit-Induced Crimes Internet underground economy E-markets for stolen information made up of thousands of websites that sell credit card numbers, social security numbers, other data such as numbers of bank accounts, social network IDs, passwords, and much more 中央大學。范錚強 7 9 -7

What kinds of security questions arise? From the user’s perspective: How can the user

What kinds of security questions arise? From the user’s perspective: How can the user be sure that the Web server is owned and operated by a legitimate company? How does the user know that the Web page and form do not contain some malicious or dangerous code or content? How does the user know that the owner of the Web site will not distribute the information the user provides to some other party? 中央大學。范錚強 8

What kinds of security questions arise? From the company’s perspective: How does the company

What kinds of security questions arise? From the company’s perspective: How does the company know the user will not attempt to break into the Web server or alter the pages and content at the site? How does the company know that the user will not try to disrupt the server so that it is not available to others? 中央大學。范錚強 9

What kinds of security questions arise? From both parties’ perspectives: How do both parties

What kinds of security questions arise? From both parties’ perspectives: How do both parties know that the network connection is free from eavesdropping by a third party “listening” on the line? How do they know that the information sent back-and-forth between the server and the user’s browser has not been altered? 中央大學。范錚強 10

Basic Security Terminology Business continuity plan 商業存續計畫 A plan that keeps the business running

Basic Security Terminology Business continuity plan 商業存續計畫 A plan that keeps the business running after a disaster occurs; each function in the business should have a valid recovery capability plan Cybercrime 網路犯罪 Intentional crimes carried out on the Internet Cybercriminal 網路罪犯 A person who intentionally carries out crimes over the Internet Exposure 風險暴露 The estimated cost, loss, or damage that can result if a threat exploits a vulnerability 中央大學。范錚強 11 9 -11

Basic Security Terminology 2 Fraud 弊端 Any business activity that uses deceitful practices or

Basic Security Terminology 2 Fraud 弊端 Any business activity that uses deceitful practices or devices to deprive another of property or other rights Malware (malicious software) 惡意軟體 A generic term for malicious software Phishing 釣魚法 A crimeware technique to steal the identity of a target company to get the identities of its customers Risk 風險 The probability that a vulnerability will be known and used 中央大學。范錚強 12 9 -12

Basic Security Terminology 3 Social engineering 社交 程 A type of nontechnical attack that

Basic Security Terminology 3 Social engineering 社交 程 A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network Spam 垃圾郵件 The electronic equivalent of junk mail Vulnerability 弱點 Weakness in software or other mechanism that threatens the confidentiality, integrity, or availability of an asset (recall the CIA model); it can be directly used by a hacker to gain access to a system or network Zombies 僵屍 Computers infected with malware that are under the control of a spammer, hacker, or other criminal 中央大學。范錚強 13 9 -13

Security Battleground 中央大學。范錚強 14

Security Battleground 中央大學。范錚強 14

The Threats, Attacks, And Attackers Unintentional Threats Human error (標錯價) Environmental hazards (天然災害) Malfunctions

The Threats, Attacks, And Attackers Unintentional Threats Human error (標錯價) Environmental hazards (天然災害) Malfunctions in the computer system Intentional Attacks and Crimes The Criminals and Methods Hacker: Someone who gains unauthorized access to a computer system Cracker: A malicious hacker 中央大學。范錚強 15 9 -15

EC Security Requirements Authentication身份確認 Process to verify (assure) the real identity of an individual,

EC Security Requirements Authentication身份確認 Process to verify (assure) the real identity of an individual, computer program, or EC website Authorization授權 Process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform Auditing 稽核 Availability 可用性 Nonrepudiation 不可否認 Assurance that online customers or trading partners cannot falsely deny (repudiate) their purchase or transaction 中央大學。范錚強 16

The Defense: Defenders, Strategy, And Methods EC security strategy A strategy that views EC

The Defense: Defenders, Strategy, And Methods EC security strategy A strategy that views EC security as the process of preventing and detecting unauthorized use of the organization’s brand, identity, website, e-mail, information, or other asset and attempts to defraud the organization, its customers, and employees deterring measures Actions that will make criminals abandon their idea of attacking a specific system (e. g. , the possibility of losing a job for insiders) 中央大學。范錚強 17

Methods prevention measures Ways to help stop unauthorized users (also known as “intruders”) from

Methods prevention measures Ways to help stop unauthorized users (also known as “intruders”) from accessing any part of the EC system detection measures Ways to determine whether intruders attempted to break into the EC system; whether they were successful; and what they may have done information assurance (IA) The protection of information systems against unauthorized access to or modification of information whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats 中央大學。范錚強 18

Malicious Code: Viruses, Worms, And Trojan Horses Virus A piece of software code that

Malicious Code: Viruses, Worms, And Trojan Horses Virus A piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it requires that its host program be run to activate it Worm A software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine Macro virus (macro worm) A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed 中央大學。范錚強 20

Other Technical Attack Methods Trojan horse A program that appears to have a useful

Other Technical Attack Methods Trojan horse A program that appears to have a useful function but that contains a hidden function that presents a security risk Banking Trojan A Trojan that comes to life when computer owners visit one of a number of online banking or e-commerce sites Denial-of-service (Do. S) attack An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources 中央大學。范錚強 22

Technical Attack Methods Page hijacking Creating a rogue copy of a popular website that

Technical Attack Methods Page hijacking Creating a rogue copy of a popular website that shows contents similar to the original to a Web crawler; once there, an unsuspecting user is redirected to malicious websites Botnet A huge number (e. g. , hundreds of thousands) of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet Malvertising 中央大學。范錚強 23

Nontechnical Attacks: Social Engineering A type of nontechnical attack that uses social pressures to

Nontechnical Attacks: Social Engineering A type of nontechnical attack that uses social pressures to trick computer users into compromising computer networks to which those individuals have access 向屬下要帳號密碼 A multiprong approach should be used to combat social engineering Education and training Policies and procedures Penetration testing 中央大學。范錚強 24

Nontechnical Methods Social Phishing Sophisticated Phishing Methods Identity Theft and Identify Fraud that involves

Nontechnical Methods Social Phishing Sophisticated Phishing Methods Identity Theft and Identify Fraud that involves stealing an identity of a person and then the use of that identity by someone pretending to be someone else in order to steal money or get other benefits 中央大學。范錚強 25

Social Networking Makes Social Engineering Easy 中央大學。范錚強 27

Social Networking Makes Social Engineering Easy 中央大學。范錚強 27

Nontechnical Methods e-mail spam A subset of spam that involves nearly identical messages sent

Nontechnical Methods e-mail spam A subset of spam that involves nearly identical messages sent to numerous recipients by e-mail Spyware Software that gathers user information over an Internet connection without the user’s knowledge search engine spam Pages created deliberately to trick the search engine into offering inappropriate, redundant, or poor-quality search results spam site Page that uses techniques that deliberately subvert a search engine’s algorithms to artificially inflate the page’s rankings Splog Short for spam blog, a site created solely for marketing purposes 中央大學。范錚強 28

CIA security triad (CIA triad) Three security concepts important to information on the Internet:

CIA security triad (CIA triad) Three security concepts important to information on the Internet: confidentiality, integrity, and availability 中央大學。范錚強 29

CIA Triad Confidentiality Assurance of data privacy and accuracy. Keeping private or sensitive information

CIA Triad Confidentiality Assurance of data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes Integrity Assurance that stored data has not been modified without authorization; a message that was sent is the same message that was received Availability Assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to unauthorized users 中央大學。范錚強 30

The Information Assurance Model Assessing Security Needs vulnerability assessment The process of identifying, quantifying,

The Information Assurance Model Assessing Security Needs vulnerability assessment The process of identifying, quantifying, and prioritizing the vulnerabilities in a system penetration test (pen test) A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source, (e. g. , a cracker) EC security programs All the policies, procedures, documents, standards, hardware, software, training, and personnel that work together to protect information, the ability to conduct business, and other assets 中央大學。范錚強 31

The Defense Side of EC Systems 1) Defending access to computing systems, data flow,

The Defense Side of EC Systems 1) Defending access to computing systems, data flow, and EC transactions 2) Defending EC networks 3) General, administrative, and application controls 4) Protection against social engineering and fraud 5) Disaster preparation, business continuity, and risk management 6) Implementing enterprisewide security programs 中央大學。范錚強 34

Access control Mechanism that determines who can legitimately use a network resource Authorization and

Access control Mechanism that determines who can legitimately use a network resource Authorization and Authentication biometric control An automated method for verifying the identity of a person based on physical or behavioral characteristics biometric systems Authentication systems that identify a person by measurement of a biological characteristic, such as fingerprints, iris (eye) patterns, facial features, or voice 中央大學。范錚強 35

Securing EC Communications public key infrastructure (PKI) A scheme for securing e-payments using public

Securing EC Communications public key infrastructure (PKI) A scheme for securing e-payments using public key encryption and various technical components encryption The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or timeconsuming for an unauthorized person to unscramble (decrypt) it plaintext An unencrypted message in human-readable form 中央大學。范錚強 36

Securing EC Communications ciphertext A plaintext message after it has been encrypted into a

Securing EC Communications ciphertext A plaintext message after it has been encrypted into a machine-readable form encryption algorithm The mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa key The secret code used to encrypt and decrypt a message 中央大學。范錚強 37

Securing EC Communications Symmetric (private) key system An encryption system that uses the same

Securing EC Communications Symmetric (private) key system An encryption system that uses the same key to encrypt and decrypt the message Data Encryption Standard (DES) The standard symmetric encryption algorithm supported the NIST and used by U. S. government agencies until October 2, 2000 中央大學。范錚強 38

Public (Asymmetric) Key Encryption public key encryption Method of encryption that uses a pair

Public (Asymmetric) Key Encryption public key encryption Method of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa public key Encryption code that is publicly available to anyone 中央大學。范錚強 39

Digital Signatures digital signature An identifying code that can be used to authenticate the

Digital Signatures digital signature An identifying code that can be used to authenticate the identity of the sender of a document hash A mathematical computation that is applied to a message, using a private key, to encrypt the message digest A summary of a message, converted into a string of digits, after the hash has been applied digital envelope The combination of the encrypted original message and the digital signature, using the recipient’s public key 中央大學。范錚強 45

Secure Socket Layer (SSL) Protocol that utilizes standard certificates for authentication and data encryption

Secure Socket Layer (SSL) Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality 在用戶不知覺的情況之下,交換資料的電 腦間交換非對稱金鑰 Transport Layer Security (TLS) As of 1996, another name for the SSL protocol 中央大學。范錚強 47

Firewall A single point between two or more networks where all traffic must pass

Firewall A single point between two or more networks where all traffic must pass (choke point); the device authenticates, controls, and logs all traffic 中央大學。范錚強 48

Securing EC Networks DMZ: Demilitarized Zone 非戰區 Network area that sits between an organization’s

Securing EC Networks DMZ: Demilitarized Zone 非戰區 Network area that sits between an organization’s internal network and an external network (Internet), providing physical isolation between the two networks that is controlled by rules enforced by a firewall. personal firewall A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card. 中央大學。范錚強 50

Virtual private network (VPN) A network that uses the public Internet to carry information

Virtual private network (VPN) A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network Protocol tunneling Method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address 中央大學。范錚強 51

Business Continuity and Disaster Recovery Planning Disaster avoidance An approach oriented toward prevention. The

Business Continuity and Disaster Recovery Planning Disaster avoidance An approach oriented toward prevention. The idea is to minimize the chance of avoidable disasters (such as fire or other human-caused threats). Risk-management and cost-benefit analysis Risk-Management Analysis Ethical Issues 中央大學。范錚強 66

EC Security Policies and Training Acceptable use policy (AUP) Policy that informs users of

EC Security Policies and Training Acceptable use policy (AUP) Policy that informs users of their responsibilities when using company networks, wireless devices, customer data, and so forth. 中央大學。范錚強 67