1 / 14

E-Security: Threats, Preventions, and Protections

Learn about the security concerns in e-commerce, including threats to confidentiality, authentication, and access control. Understand client and server security threats, such as file corruption, information deletion, and denial of service attacks. Discover the dangers of viruses and Trojan horses, and how to prevent and repair them. Get essential internet security tips and explore the use of firewalls for enhanced protection.

kestevez
Download Presentation

E-Security: Threats, Preventions, and Protections

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 13UnderstandingE-Security

  2. OBJECTIVES • What are security concerns (examples)? • What are two types of threats (client/server) • Virus – Computer Enemy #1 threat • How to prevent and protect?

  3. SECURITY CONCERNS: examples • Uncover confidentiality (bank account) • Leak Authentication and Access Control (user name, password of your Web, email) • Conduct ID theft (over 50% is credit card fraud) • Hack or Intrude Web sites

  4. CLIENT SECURITY THREATS Happens to client computers examples • Deliberate Corruption of Files (e.g., rename files) • Delete Stored Information • Use Virus (bring down system)

  5. SERVER SECURIY THREATS • Web server with active ports (e.g., 80, 8080) can be misused (scalability or deny of service attack) • Web server directories (folders) can be accessed and corrupted

  6. Server Threats: DENIAL OF SERVICE Hackers … • Break into less-secured computers • Installs stealth program which duplicates itself (congest network traffic) • Target network from a remote location (RPC) and activates the planted program • Victim’s network is overwhelmed and other users are denied access to Web and Email

  7. VIRUS – eCommerce Threat #1 • A malicious code replicating itself to cause disruption of the information infrastructure • Attacks system integrity (cause inconsistent data) • Target at computer networks, files and other executable objects

  8. EXAMPLES OF VIRUSES • Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware) • Boot Virus • Attacks boot sectors of the hard drive • “Trojan horses” –a bot planted in the systems being attacked, can be operated locally or remotely for malicious purposes

  9. EXAMPLES OF VIRUSES (cont.): Trojan horse

  10. VIRUS CHARACTERISTICS • Fast to attack • Easily invade and infect computer hard disk • Slow to defend • Less likely to detect and destroy • Hard to find (Stealth) • Memory resident (registry) • Able to manipulate its execution to disguise its presence

  11. BASIC INTERNET SECURITY TIPS • Use Password • Alphanumeric • Mix with upper and lower cases • Change frequently • No dictionary names • Use Encryption • Coding of messages in traffic between the customer placing an order and the merchant’s network processing the order

  12. FIREWALL & SECURITY • Firewall: frequently used for Internet security - prevent • Enforces an access control policy between two networks • Detects intruders, blocks them from entry, keeps track what they did and notifies the system administrator

  13. Other security approach- repair, e.g. AntiSpyware to clean virus

  14. Summary and Exercises • Name a few security concerns • What are the two types of threats? (client/server) • Explain Trojan Horse Virus • How to prevent and repair?

More Related