#5 E-business Network and Website Security Flashcards
E- business Security Risks
Physical
Internal
External
Transactional
Physical Risks
Network Equipment and Physical Location
Electrical Power Backup
Internet Connectivity Redundancy
Outsourcing risks
Network Equipment and Physical Location
- Equipment and rooms always locked, location annonymous
- Fire suppression systems, train employees
- Substantial construction and design of facilities
Electrical Power Backup
- Batteries, Power Generators
Internet Connectivity Redundancy
- To have more than 1 connection to the internet
Internal Security Risks
Unhappy employees, poor secuirty awarenes and planning
Passwords
Biometrics
Smart Card (embedded memory chip with user ID for authentication of remote user)
Backup and Restore Policies
Disaster Recovery Planning
Outsourcing risks
- Web hosting services
- fee for service arrangement for power, connectivity, security
External Security
Bypass network defences
Hackers
Viruses
Counter by
Firewalls (packet fiiltering, circuit level, application level)
Hackers
- intruders that deliberately gain unauthorized access
- most common=send confusing data
- Crashing a program= take control of computers
- Buffer overlow cause crashes
- White hat: good hackers
- Black hat: steal valuable information, disrupt service or damage
Viruses (External Secuirty
Standard
Worms
Macro Virus
Trojan Horses
Virus Hoaxes
Counter measures
Antivirus software
Employee Education
Updates
Standard
- small destructive programs inserted to other files
- erase files/hardrives, prevent from booting, saving, printing and send repetitive e-mail messages
- spread via email, attachments or when infected program executes
Worms
- replicate itself in computer memory
- use resources, slowing and crashing
Macro Virus
- Infect Macro (word/excel/removable drives)
Virus Hoaxes
Faslse warnings
Trojan Horses
- Maliciouse disguised as fun or useful
- Steal passwords, plant destructive programs
Transactional Secuirty
Authentication
Integrity
Non repudiation
Confidentiaty
Security Protocols
Encryption
Public Keys
VPN
Tunneling
WTLS
WLANs
Secuirty audit
penetrative testing
Secuirty Protocols
Secure Sockets Layer (SSL): public key encryption and digital certificates and included in web browsers/servers
Transport Layer Security (TLS): assure no third part access to internet
Record/Handshake
SET (Secure Electronic Transctions): presenting credit card transaction on internet
Encryption
translaltion of data into a cipher text, where it is decrypted into plain text at the destination
Public Keys
Public: posted into public directory
Private: given only to those requesting
VPN
Private networks that use Internet to transmit data
Tunneling
encapsulate on protocol witin another protocol
WTLS
encryption and digital certificates
WLANs
most vulnerable as hackers require few resoures
Security audit
review policy, emplooyee training and physical secuirty
penetrative testing
insurance, NDA, Scanning tools, Scope, Documentation