chapter 13 understanding e-security. 2 objectives what are security concerns (examples)? what are...

14
Chapter 13 Understanding E-Security

Upload: owen-allison

Post on 13-Jan-2016

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

Chapter 13

Understanding E-Security

Page 2: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

2

OBJECTIVES

• What are security concerns (examples)?

• What are two types of threats (client/server)

• Virus – Computer Enemy #1 threat• How to prevent and protect?

Page 3: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

3

SECURITY CONCERNS: examples

• Uncover confidentiality (bank account)• Leak Authentication and Access

Control (user name, password of your Web, email)

• Conduct ID theft (over 50% is credit card fraud)

• Hack or Intrude Web sites

Page 4: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

4

CLIENT SECURITY THREATS

Happens to client computers

examples– Deliberate Corruption of Files (e.g.,

rename files)– Delete Stored Information– Use Virus (bring down system)

Page 5: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

5

SERVER SECURIY THREATS

• Web server with active ports (e.g., 80, 8080) can be misused (scalability or deny of service attack)

• Web server directories (folders) can be accessed and corrupted

Page 6: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

6

Server Threats: DENIAL OF SERVICE

Hackers …• Break into less-secured computers • Installs stealth program which duplicates

itself (congest network traffic)• Target network from a remote location

(RPC) and activates the planted program• Victim’s network is overwhelmed and

other users are denied access to Web and Email

Page 7: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

7

VIRUS – eCommerce Threat #1

• A malicious code replicating itself to cause disruption of the information infrastructure

• Attacks system integrity (cause inconsistent data)

• Target at computer networks, files and other executable objects

Page 8: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

8

EXAMPLES OF VIRUSES

• Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware)

• Boot Virus– Attacks boot sectors of the hard drive

• “Trojan horses” –a botplanted in the systems being attacked, can be operated locally or remotely for malicious purposes

Page 9: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

9

EXAMPLES OF VIRUSES (cont.): Trojan horse

Page 10: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

10

VIRUS CHARACTERISTICS

• Fast to attack– Easily invade and infect computer hard disk

• Slow to defend– Less likely to detect and destroy

• Hard to find (Stealth)– Memory resident (registry)

– Able to manipulate its execution to disguise its presence

Page 11: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

11

BASIC INTERNET SECURITY TIPS

• Use Password– Alphanumeric– Mix with upper and lower cases– Change frequently– No dictionary names

• Use Encryption– Coding of messages in traffic between

the customer placing an order and the merchant’s network processing the order

Page 12: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

12

FIREWALL & SECURITY

• Firewall: frequently used for Internet security - prevent– Enforces an access control policy between two

networks– Detects intruders, blocks them from entry,

keeps track what they did and notifies the system administrator

Page 13: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

13

Other security approach- repair, e.g. AntiSpyware to clean virus

Page 14: Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer

14

Summary and Exercises

• Name a few security concerns

• What are the two types of threats? (client/server)

• Explain Trojan Horse Virus

• How to prevent and repair?