Study Notes.xlsx - Lesson 7 Chapter 9 access control(protection of EC information access control encryption PKI active tokens attack authentication(3

Study Notes.xlsx - Lesson 7 Chapter 9 access...

This preview shows page 1 out of 221 pages.

You've reached the end of your free preview.

Want to read all 221 pages?

Unformatted text preview: Lesson 7 - Chapter 9 access control (protection of EC information -- access control, encryption & PKI) active tokens attack authentication (3 concepts related to IA model - authentication, authorization and nonrepudiation) authorization (3 concepts related to IA model - authentication, authorization and nonrepudiation) availability (success & security of EC can be measured by 3 components confidentiality, integrity & availability CIA security triad) bometric control biometric systems botnet business continuity plan certificate authority (CA) ciphertext computer security incident management confidentiality (success & security of EC can be measured by 3 components confidentiality, integrity & availability CIA security triad) crackers cryptography cybercrime cybercriminal data breach (unintentional info disclosure, data leak or data loss) Data encryption Standard (DES) denial-of-service (DoS) attack digital certificate (signatures) digital envelope digital signature EC security programs email spam (unsolicited bulk email) encryption exposure firewall fraud hacker hash function honeynet identity fraud identity theft information security Information Assurance (IA) Information Assurance (IA) model integrity (success & security of EC can be measured by 3 components confidentiality, integrity & availability CIA security triad) Internet fraud Information systems security life cycle management intrusion detection system (IDS) macro virus malware message direct mules nonrepudiation (3 concepts related to IA model - authentication, authorization and nonrepudiation) packet (part of firewall) passive tokens personally identifiable info (PII) penetration test (risk assessment) phishing public key encryption public key infrastructure (PKI) risk secure socket layer (SSL) search engine spam symmetric system (part of encryption) 1 of 2 security systems social engineering spam spam site SSL (secure socket layer) stock market fraud splogs (spam blog site) spyware threat Trojan horse virtual private network (VPN) vulnerabilities vulnerability assessment (part of risk assessment) worm virus zombies EC defense strategies - major objectives EC security strategy framework security spending versus needs gap Assessing security needs (risk assessment) Defence 1: of EC systems: Six categories: Defence 2: Securing E-commerce networks: 1. Firewalls: Dual Firewall architecture (DMZ) Personal Firewalls Additional virus, malware and botnet protection 2. Virtual Private Networks (VPN) 3. Intrusion Detection System (IDS) Daling with DOS (denial of service) attacks 4. Honeynets and honeypots Email security Defense 3: General controls, internal controls, compliance and other defense Requiresmechanisms several controls: General controls: Application controls: General, administrative and other controls: Physical controls: administrative controls: Application controls and intelligent agents Intelligent agents: Protecting against spam Protecting against pop up ads Protecting against social engineering attacks Protecting against spyware Business continuity plan (see page 498 exhibit 9.16) then disaster recovery disaster avoidance Risk management and cost benefit analysis Enterprise e-commerce security Drivers of EC security Senior management commitment and support EC security policies and training EC security procedures & enforcement why is it difficult to stop internet crime 1. define e-commerce security. (Turban et al., p. 454) the protection of data, networks, computer programs, computer power, and other elements of computerized informa 2. describe the major computer and e-commerce security incidents. (Turban et al., pp. 454-457) information security, personal security, national security 3. explain the three major drivers of e-commerce security problems. (Turban et al., pp. 454-457) 1. The internet's vulnerable design 2. the shift to profit-induced crimes systems and the of insiders 4. discuss therols need for an e-commerce security strategy. (Turban et al., pp. 459-460) Computer security can be divided into 3 categories: 1. known as the cybercrimes defenses - changing improving its response to plan, new attack methodsexposure, and to new techno 5. define following2.e-commerce securityand terms: business continuity cybercrime, fraud, m risk, spam, vulnerability, hacker, cracker, and zombie (Turban et al., pp. 460-462) see above definitions 6. distinguish among the different types of security threats and provide examples. (Turban et al., pp. 460Unintentional - Human error: in the design of the hardware or information systems, in programming, testing, data c authorization instructions. Errors related can be atoresult of negligence inexperience or misunderstanding (eg. Not chan 1. List the and major security issues e-commerce. The major security issues related to e-commerce include: authentication authorization auditing confidentiality integrity availability nonrepudiation. 2. Explain the three main drivers for e-commerce security issues and attacks. There are many drivers that have contributed to the raise of e-Commerce attacks and threats. The main ones are th vulnerable (open community, virtualmodel? and global network, of source control), the shift to profit-induced crim 3. What design is the information insurance What are itslack components? The information assurance model provides guidelines and framework supporting the protection of e-commerce secu risks and attacks, and unauthorized access or manipulation of data. It has six main Confidentiality: theany assurance that data is kept private and confidential to only thosecomponents: who are allowed to access Integrity: the assurance that the data is accurate or the message has not been changed or modified without auth Availability: the assurance that access to data, e-commerce system or other business services is timely, accessible restricted to only authorized users. that the person accessing the data or the system is allowed to do so and is a real Authentication: the assurance Authorization: the assurance that only an authenticated person can access and perform transactions. Non-repudiation: the assurance that the users or trading partners cannot falsely deny the transaction. 4. Provide examples of technical cyber attacks. Which ones are the most prevalent in the Internet space, an A technical cyber attack uses IT technology and usually takes a methodical approach. Examples of technical cyber a denial-of-service (DoS) attack, distributed (DDoS) attacks, and malicious code (viruses, worms, ma 1. What is an authentication system?denial-of-service List its key elements. An authentication system helps a company identify the legitimate parties to a transaction. It determines the actions t perform to complete the transaction. The basic elements of an authentication system include: groupinororder person to be authenticated distinguishing characteristic system proprietor authentication mechanism access control mechanism. 2. Describe the characteristics of a public/private key system, and compare it to a symmetric (private) key s In the public/private key system, the public key is open to anyone, while the private key is kept secret. The sender ne receiver’s publicpenetration key in ordertests for the receiver to how decode thecan encrypted their privateinfrastructure key. With the sym 3. Describe and explain they be usedmessages to ensurewith e-commerce sec A penetration test is a method of evaluating the security of an e-commerce infrastructure by simulating an attack from source. The testand consists of analyzing system for any potential vulnerabilities and attacks, from the perspective o 4. Describe compare the rolethe of certificates, digital signatures, and digital envelopes. A certificate is a document issued by a trusted third party (e.g., certificate authority) and is designed to authenticate keys. Itsignature contains is information theauthenticate entity, the certificate’s expiry date, the entity’s key. Digital a method about used to the sender’s identity byand applying public public key cryptography in revers verify that the document did indeed originate from the person whose signature is attached and that the document ha Digital envelopes are used to send private messages that can be understood only by a specific recipient. The sende message using theand recipient’s (Mary’s) public keypublic and sends to Mary.inMary, by using her private key to authority. decrypt the Digital signatures digital envelopes both use keys itprovided the certificate by the certificate 5. Explain the role of a certificate authority (CA). Why is a CA necessary? A certificate authority (CA) issues certificates to users. The CA manages the entire life cycle of the certificate includin scrapping, renewal, and replacement. The certificate authority also provides the certificate display function. The CA 6. In Turban et al., answer questions 1, 3, and 4 in Section 9.7 Review (p. 492) and question 5 in Section 9.10 Review Question 1 (page 492) A firewall is a network node that consists of both hardware and software. It serves to isolate a private network from p There are two basic types of firewalls: packet-filtering routers and application-level proxies. The packet-filtering route control by using simple rules (e.g., source and destination IP addresses, source and destination of port numbers, pa determine which packets to allow through. In contrast, application-level proxies use dual network cards and special s repackage acceptable packets and allow them onto the internal network. Review Question 3 (page 492) A virtual private network (VPN) is a secure and encrypted connection between two points on the Internet. VPN can b communication within distributed networks (such as financial branch offices and corporate headquarters) and among remotely or using mobile devices to access their workplace. VPN uses the public Internet to carry information but rem using encryption to scramble the communications, authentication to ensure that the information has not been tampe from a legitimate source, and access control to verify the identity of anyone using the network. Review Question 4 (page 492) An intrusion detection system (IDS) is special security software that can monitor activities across the network or on a There are two types of IDS: host based and network based. A host-based IDS resides on the server or other host sy monitored and is good at detecting critical breaches or security threats such as an attempt to access security files or access. A network-based IDS uses rules to analyze suspicious activity at the perimeter of a network or at key locatio network. Review Question 5 (page 504) The following are the six major reasons why it is difficult to stop computer crimes (refer to Turban et al., pp. 503-50 With a tension between making shipping convenient and ensuring an adequate level of security, enforcing safeguard system and create friction. There is a lack of cooperation between credit card issuers and ISPs. Shoppers are sometimes negligent, relying on protection offered by credit card issuers rather than taking necessary protect themselves from being victimized. Some firms ignore e-commerce security best practices. Businesses may fail to develop a comprehensive security pl and recovery plans), best practices, and business continuity plans. Most importantly, senior management commitme Design and architecture issues occur when IS staff do not properly design and develop software, applications, and s as leaving scripts in the code can allow easy access to hackers. Computer crime can be the result of a lack of due care in business practices such as dealings with external partners outsourcing, business partnerships, leasing, and so on. Lesson 8 - Chapter 10 address verification system (AVS) contact card contactless (proximity) card credit card e-billing e-cheque e-micropayments letter of credit (LC) payment service provider (PSP) private key encryption public key encryption purchasing card secure socket layer (SSL) smart card smart card reader smart card operating system stored-value card virtual credit card Types of smart cards: 1. contact card: 2. contactless (proximity) card: Hybrid cards EPROM, EEPROM 1. Why are traditional payment systems inadequate for e-commerce? Since traditional paper-based payment systems involve physical delivery, they are expensive and slow. In addition, b complete an online transaction without an electronic payment scheme. 2. What participants and procedures are involved in online credit card systems? The key players in the electronic credit card system are cardholder, merchant, card issuer, acquirer, and card brand. steps: a. An issuer (usually a bank) issues a credit card to a cardholder. b. The cardholder presents the card to a merchant in order to pay for a product or service. c. The merchant asks for approval from the card brand company. When the transaction is approved, the merchan d. The merchant sells the slip to their acquirer (usually a bank). e. The acquiring bank requests that the card brand clear the slip and reimburse the acquirer for the amount of the f. The card brand requests payment for the amount of the sale from the issuer. g. Periodically, the issuer bills the amount to the cardholder, or automatically deducts the amount from the cardho 3. What is a smart card? For what types of applications could they be used? A smart card is a plastic payment card with an embedded computer chip that can store data and, in some instances, computer programs. Smart cards are used in conjunction with loyalty card programs, health care delivery, transporta personal identification. In the future, smart cards may be applied to information technology, electronic money, and ot 4. What methods of electronic payment would you recommend for a firm offering health care products onlin An online business should be open to all types of customers and should certainly accept most major credit cards. Ho main customers are seniors, options could vary based on the customer’s location. For example, seniors living in Can use their own credit card to purchase products. E-cheques could be an alternative for those who do not have access Since most e-cash systems are tied to a credit card, they would not be a viable alternative in such cases. 5. Compare e-cash and debit cards. A supply of e-cash is usually delivered by way of a stored-value card. The value is stored in software called an electr may be located on a PC or smart card. A debit card, on the other hand, is a physical card that provides authorization money in the customer’s account and transfer to the merchant’s account. 6. Suggest the best method of electronic payment for a company that wishes to control its office supply pur A purchase card is a good option in such situations. A special-purpose payment card issued to a company’s employe solely for the purchase of nonstrategic materials and services up to a pre-set dollar limit. These cards allow the com of the amount each employee can spend as well as perform bill consolidation and payment reconciliation and suppo In addition, they help the company control its expenses and spending by compiling detailed reports. 7. What is mobile payment? Give examples of types of mobile payment transactions. Mobile payment refers to payment transactions initiated or confirmed using a person’s cell phone or smartphone. Mo usually used for buying music, videos, ringtones, online games, transportation fares, parking tickets, books, magazin products and services. # of factors in determining what e-payment achieves critical mass they include: Independence Interoperability and portability security - how safe is the transfer anonymity divisibility Ease of use transaction fees international support regulations payment cards 3 types: credit card charge cards debit cards Processing cards online two phases: authorization: settlement: 3 basic configuration for this to occur: Lesson 9 - Chapter 6 Bluetooth CRM e-trade & real estate geographical information system (GIS) global positioning system (GPS) location-based m-commerce l-commerce real time location system (RTLS) mobile banking (m-banking) mobile commerce (m-commerce) mobile computing mobile devices mobile web mobile enterprise mobile portal mobile worker microbrowser personal area network (PAN) personal digital assistant (PDA) PRM pervasive computing radio frequency identification (RFID) sensor network smartphone short message service (sms) ubiquitous computing wireless application protocol (WAP) wireless local area network (WLAN) wireless wide area network (WWAN) 4 enterprise applications created to meet specific business needs: major users of m-commerce include: shift paradigm from traditional ecommerce to mobile commerce Benefits of m-commerce Infrastructure - components & services of mobile computing automatic vehicle location - avl location based service social location based marketing 1. What are the key technologies and devices (infrastructure) that support m-commerce applications? There are a number of technologies and devices that support m-commerce. A partial list includes wireless portable c tablet PC, personal digital assistant (PDA), Blackberry, Palmtop, and smart phone. 2. What are the major drivers of m-commerce? The eight major forces driving m-commerce are widespread availability of more powerful devices handset culture service economy vendor's push mobile workforce increased mobility improved price/performance improved bandwidth. 3. Explain how the banking industry could benefit from m-commerce. What key issues should be address Many of the services and value activities offered by the banking industry could benefit from m-commerce. First, m-co communicate with customers by enabling customers to use their mobile handsets to access account balances and r regarding loans, expenses, and portfolios. In addition, m-commerce can help facilitate banking transactions such as SMS, buying goods and services, accessing virtual cash, and so on. The major issues are related to security of data and the system, confidentiality and privacy of communication and tra reliability and connectivity, customer support, and other ethical issues. 4. How might wireless communications support intrabusiness activities? Intrabusiness activities include all the business activities and processes within an organization. By providing mobile communicate efficiently and on time, productivity can increase, customer service levels can improve, and employee increase. In addition, mobile services are important in supporting and facilitating sales force mobilization and job dis that take place between units within the organization, including design, production, delivery, sales, support, and so o 5. Compare m-commerce and l-commerce. M-commerce and l-commerce are both commercial activities that take place electronically with wireless devices. T are matters of scope and time. M-commerce can be used in global application of business activities such as bankin support. However, l-commerce is restricted to the location and time in which commercial activities and services are of GPS-enabled services for navigation, mapping, tracking, and so forth. 6. What are the similarities and differences between ubiquitous and pervasive computing? Ubiquitous and pervasive computing are both computer capabilities and infrastructure that support information app a broad range of network-based services, including Internet-based e-commerce services embedded in objects aroun computing help automate processes and facilitate transactions. The main difference between them is that ubiquitous computing is embedded in mobile environment, whereas perva applications that are not typically mobile. As explained in the textbook, both concepts can be used interchangeably. B around us, whether mobile or not, including cars, tools, appliances, clothing, and other consumer goods that commu interconnected networks. 7. Give examples of sensor n...
View Full Document

  • Spring '14
  • Computer Security, Public key infrastructure, Credit card, Public-key cryptography

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture