1. Trang chủ
  2. » Giáo án - Bài giảng

Electronic commerce fundamentals ch6

46 94 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 46
Dung lượng 1,96 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Objectives ◆ Security measures that can reduce or eliminate intellectual property theft ◆ Securing client computers from attack by viruses and by ill-intentioned programs and scripts dow

Trang 1

Chapter 6

Implementing Security

for Electronic Commerce

Trang 2

Objectives

◆ Security measures that can reduce or eliminate intellectual property theft

◆ Securing client computers from attack

by viruses and by ill-intentioned programs and scripts downloaded in Web pages

◆ Authenticate users to servers and authenticate servers

Trang 3

Objectives

◆ Available protection mechanisms to secure information sent between a client and a server

◆ Message integrity security, preventing another program from altering

information as it travels across the Internet

Trang 4

◆ The role Secure Socket Layer, Secure HTTP and secure electronic transaction protocols play in protecting e-commerce

Trang 5

Protecting Electronic Commerce Assets

◆ You cannot hope to produce secure commerce systems unless there is a written security policy

● What assets are to be protected

● What is needed to protect those assets

● Analysis of the likelihood of threats

● Rules to be enforced to protect those assets

Trang 6

Protecting Electronic Commerce Assets

◆ Both defense and commercial security guidelines state that you must protect assets from

Trang 7

Minimum Requirements for Secure Electronic Commerce

Figure 6-1

Trang 8

Protecting Intellectual Property

◆ The dilemma for digital property is how

to display and make available intellectual property on the Web while protecting those copyrighted works

◆ Intellectual Property Protection in Cyberspace recommends:

● Host name blocking

● Packet filtering

● Proxy servers

Trang 9

Companies Providing Intellectual

Property Protection Software

◆ ARIS Technologies

● Digital audio watermarking systems

◆ Embedded code in audio file uniquely identifying the intellectual property

◆ Digimarc Corporation

● Watermarking for various file formats

● Controls software and playback devices

Trang 10

Companies Providing Intellectual

Property Protection Software

◆ SoftLock Services

● Allows authors and publishers to lock files containing digital information for sale on the Web

● Posts files to the Web that must be unlocked with a purchased ‘key’ before viewing

Trang 11

SoftLock Services Home Page

Figure 6-2

Trang 12

Protecting Client Computers

◆ Active content, delivered over the Internet in dynamic Web pages, can be one of the most serious threats to client computers

◆ Threats can hide in

● Downloaded graphics and plug-ins

● E-mail attachments

Trang 13

● Anyone can read and interpret cookie data

● Do not harm client machines directly, but potentially could still cause damage

◆ Misplaced trust

● Web sites that aren’t really what they seem and trick the user into revealing sensitive data

Trang 14

Monitoring Active Content

◆ Netscape Navigator and Microsoft Internet Explorer browsers are

equipped to allow the user to monitor active content before allowing it to

download

◆ Digital certificates provide assurance to clients and servers that the participant

is authenticated

Trang 15

Digital Certificates

Also known as a digital ID

◆ An attachment to an e-mail message

◆ Embedded in a Web page

◆ Serves as proof that the holder is the person or company identified by the certificate

◆ Encoded so that others cannot read or

Trang 16

VeriSign A Certification Authority

Figure 6-3

Trang 17

VeriSign

◆ Oldest and best-known Certification Authority (CA)

◆ Offers several classes of certificates

● Class 1 (lowest level)

◆ Bind e-mail address and associated public keys

● Class 4 (highest level)

◆ Apply to servers and their organizations

◆ Offers assurance of an individual’s identity and

Trang 18

Structure of a VeriSign Certificate

Figure 6-4

Trang 19

Microsoft Internet Explorer

◆ Provides client-side protection right inside the browser

◆ Reacts to ActiveX and Java-based content

◆ Authenticode verifies the identity of downloaded content

◆ The user decides to ‘trust’ code from

Trang 20

Security Warning and Certificate Validation

Figure 6-5

Trang 21

Internet Explorer Zones and Security Levels

Figure 6-6

Trang 22

Internet Explorer Security Zone Default Settings

Figure 6-7

Trang 24

Setting Netscape Navigator Preferences

Figure 6-8

Trang 25

A Typical Netscape Navigator

Java Security Alert

Figure 6-9

Trang 26

Viewing a Content Provider’s Certificate

Figure 6-10

Trang 27

Dealing with Cookies

◆ Can be set to expire within 10, 20, or

Trang 28

Dealing with Cookies

◆ Earlier browsers simply stored cookies without comment

◆ Today’s browsers allow the user to

● Store cookies without permission or warning

● Receive a warning that a cookie is about

to be stored

● Unconditionally disallow cookies altogether

Trang 29

◆ Providing channel security includes

● Channel secrecy

● Guaranteeing message integrity

● Ensuring channel availability

Trang 31

◆ Calculates a number from any length string

● Asymmetric (Public-key) Encryption

◆ Encodes by using two mathematically related keys

● Symmetric (Private-key) Encryption

Trang 32

Hash Coding, Private-key, and Public-key Encryption

Figure 6-11

Trang 33

Significant Encryption Algorithms and Standards

Figure 6-12

Trang 34

Secure Sockets Layer (SSL) Protocol

◆ Secures connections between two computers

◆ Provides a security handshake in which the client and server computers

exchange the level of security to be used, certificates, among other things

◆ Secures many different types of communications between computers

Trang 35

Secure Sockets Layer (SSL) Protocol

◆ Provides either 40-bit or 128-bit encryption

◆ Session keys are used to create the cipher text from plain text during the session

◆ The longer the key, the more resistant

to attack

Trang 36

Establishing an SSL Session

Figure 6-13

Trang 37

SSL Web Server Information

Figure 6-14

Trang 39

Ensuring Transaction Integrity

Figure 6-15

Trang 40

Guaranteeing Transaction Delivery

◆ Neither encryption nor digital signatures protect packets from theft or slowdown

◆ Transmission Control Protocol (TCP) is responsible for end-to-end control of

packets

◆ TCP requests that the client computer resend data when packets appear to be missing

Trang 41

Protecting the Commerce Server

◆ Access control and authentication

● Controlling who and what has access to the server

● Requests that the client send a certificate

Trang 42

Protecting the Commerce Server

◆ Usernames and passwords are the most common method of providing protection for the server

◆ Usernames are stored in clear text, while passwords are encrypted

◆ The password entered by the user is encrypted and compared to the one on file

Trang 43

Logging On With A Username And Password

Figure 6-16

Trang 44

Operating System Controls

◆ Most operating systems employ username and password authentication

A common defense is a firewall

● All traffic from inside to outside and outside to inside must pass through it

● Only authorized traffic is allowed

● The firewall itself must be immune to penetration

Trang 46

Check Point Software’s Firewall-1 Web Page

Figure 6-17

Ngày đăng: 10/08/2017, 12:19

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN