itec5611s. kungpisdan 1 course outline revisited 1.overview of electronic commerce 2.e-marketplace...

56
ITEC5611 S. Kungpisdan 1 Course Outline Revisited 1. Overview of Electronic Commerce 2. E-Marketplace 3. Retailing in Electronic Commerce 4. Consumer Behavior, Market Research, and Advertisement 5. Business-to-Business E-Commerce 6. Public B2B Exchanges and Support Services 7. E-Supply Chains, Collaborative Commerce, Intrabusiness EC, and Corporate Portals 8. Project1 Presentation#1 (29/7/07) 9. Project1 Presentation#2 (5/8/07) 10. EC Architectural Framework & EC Security (19/8/07) 11. Electronic Payment Systems (19/8/07) 12. Search Engines, Directory Services and Internet Advertising (26/8/07) 13. Mobile Commerce and Pervasive Computing (2/9/07) 14. Building EC Applications and Infrastructure (9/9/07) 15. Project Presentation#1 (16/9/07)

Upload: wilfred-bond

Post on 12-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 1

Course Outline Revisited

1. Overview of Electronic Commerce2. E-Marketplace3. Retailing in Electronic Commerce4. Consumer Behavior, Market Research, and Advertisement5. Business-to-Business E-Commerce6. Public B2B Exchanges and Support Services7. E-Supply Chains, Collaborative Commerce, Intrabusiness EC, and Corporate

Portals8. Project1 Presentation#1 (29/7/07)9. Project1 Presentation#2 (5/8/07)10. EC Architectural Framework & EC Security (19/8/07)11. Electronic Payment Systems (19/8/07)12. Search Engines, Directory Services and Internet Advertising (26/8/07)13. Mobile Commerce and Pervasive Computing (2/9/07)14. Building EC Applications and Infrastructure (9/9/07)15. Project Presentation#1 (16/9/07)

Page 2: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

Chapter 11EC Architectural Framework and EC Security

Page 3: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 3

Outline

• EC Architectural Framework• EC Security

– Basic Security Issues– Security Incidences– Securing EC Communications– Securing EC Networks– Securing Web Servers

Page 4: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 4

Secure Payment ProtocolsOnline Payment Infrastructure

Security and Encryption Technology

Network Protocol StandardsNetwork Infrastructure (Internet)

Business Service InfrastructureDirectories, Search Engines etc

Netw

ork

ed M

ultim

edia

con

tent

pu

blish

ing tech

no

log

ies( HT

ML

,XM

L,

JA

VA

,Gra

ph

ics, Vid

eo tools etc.)In

form

ati

on

Dis

trib

uti

on

& M

essa

gin

gT

ech

nol

og

ies

( H

TT

P,S

MT

P,

etc.

)

Legal and Public Policy FrameworkPublic key, Identification and Authentication Infrastructure

E-commerce ApplicationsCatalog based retail, Marketing & Advert.,

Banking& Investments, Supply Chain Management, Auctions, Home shopping,

procurements

E-commerce ApplicationsCatalog based retail, Marketing & Advert.,

Banking& Investments, Supply Chain Management, Auctions, Home shopping,

procurements

EC Framework

Page 5: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 5

Network Infrastructure

• The Internet Superhighway is responsible for seamless, reliable transportation on Information among host devices.

• Local Area Networks, IEEE 802.3 Standards and Ethernet• Wide Area Networks• The Seamless Interface is offered through

– Internet and TCP/IP Model– IP Addressing and Domain Naming System– Internet Industry Structure

Page 6: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 6

Information Distribution Technologies

Standard Protocols for Information Distribution on Internet• File Transfer Protocol (FTP)• Simple Mail Transfer Protocol (SMTP) • Hyper Text Transfer Protocol (HTTP)• Web Server Implementations

– Apache Web Server– Microsoft’s IIS

Page 7: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 7

Multimedia Publishing Technologies

• Information Publishing and Web Browsers– Hyper Text Markup Language (HTML)– Forms and Common Gateway Interface – Active Server Pages (ASP), Cold Fusion Markup Language – Dynamic HTML– HTML Editors– XML

• Multimedia Content – Graphics and Image Formats– Web Image Formats– Other Multimedia objects

• VRML

Page 8: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 8

Security and Encryptions

• Importance of security for Electronic Commerce and Inherent vulnerability of Internet

• Protecting the Web (HTTP) Service• The Issues in Transaction Security

– Cryptography and Cryptanalysis– Symmetric key cryptographic Algorithms– Public Key Algorithms– Authentication protocols– Integrity and Non-repudiation

• Digital Certificates and Signatures• Electronic Mail Security

– PGP, S/MIME• Security protocols for Web Commerce

– SSL, TLS

Page 9: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 9

Payment Services

• Payment Systems• Characteristics of Online Payment Systems

– Pre-Paid Electronic Payment Systems– Instant-paid Electronic Payment Systems– Post-Paid Electronic Payment Systems

• Some Electronic Payment Systems – Secure Electronic Transaction (SET) for Credit Cards– Ecash– NetCheque

Page 10: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 10

Business Service Infrastructure

• Searching and Locating Information on Web Space• Information Directories

– Purpose– Organization – Information Location in Information Directories

• Search Engines– Purpose– Organization– Location of Information using Search Engines

• Improving the search results • Internet Advertising

– Importance – Models

Page 11: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 11

Public Policy and Legal Infrastructure

• Universal Access to Network Infrastructure• Model Law for Electronic Commerce• Taxation Issues in Electronic Commerce• Need for Public Key Infrastructure (PKI)• Digital Certificates and Digital Signatures

Page 12: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 12

Outline

• EC Architectural Framework• EC Security

– Basic Security Issues– Security Incidences– Securing EC Communications– Securing EC Networks– Securing Web Servers

Page 13: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 13

Basic Security Issues

• What kinds of security questions arise?– From the user’s perspective:

• Is Web server owned and operated by a legitimate company?

• Does Web page and form contain any malicious or dangerous code or content?

• Will the owner of the Web site will not distribute the information the user provides to some other party?

Page 14: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 14

Basic Security Issues

• What kinds of security questions arise?– From the company’s perspective:

• How does the company know the user will not attempt to break into the Web server or alter the pages and content at the site?

• How does the company know that the user will not try to disrupt the server so that it is not available to others?

Page 15: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 15

Basic Security Issues

• What kinds of security questions arise?– From both parties’ perspectives:

• How do both parties know that the network connection is free from eavesdropping by a third party “listening” on the line?

• How do they know that the information sent back-and-forth between the server and the user’s browser has not been altered?

Page 16: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 16

Basic Security Issues

• Authentication• Authorization• Auditing• Confidentiality (Privacy)• Integrity• Availability• Non-repudiation

Page 17: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 17

Exhibit 11.1 General Security Issues at EC Sites

Page 18: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 18

Outline

• EC Architectural Framework• EC Security

– Basic Security Issues– Security Incidences– Types of Threats and Attacks– Securing EC Communications– Securing EC Networks– Securing Web Servers

Page 19: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 19

Threats and Vulnerabilities

Page 20: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 20

Security Incidences

• Probe– A probe is characterized by unusual attempts to gain access to a system

or to discover information about the system. – Sometimes followed by a more serious security event, but they are often

the result of curiosity or confusion. • Scan

– A large number of probes done using an automated tool. – Often a prelude to a more directed attack on systems whose security can

be breached.• Account Compromise

– Unauthorized use of a computer account by someone other than the account owner, without involving system-level or root-level privileges. It might expose the victim to serious data loss, data theft, or theft of services.

– The lack of root-level access means that the damage can usually be contained, but a user-level account opens up avenues for greater access to the system.

Page 21: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 21

Security Incidences (cont’d)

• Root Compromise – Similar to an account compromise, except that the account that has

been compromised has special privileges on the system.

• Packet Sniffer – A program that captures data from information packets as they travel

over the network.

Page 22: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 22

Security Incidences (cont’d)

denial-of-service (DoS) attackAn attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources

distributed denial-of-service (DDoS) attackA denial-of-service attack in which the attacker gains illegal administrative access to as many computers on the Internet as possible and uses the multiple computers to send a flood of data packets to the target computer

Page 23: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 23

Exhibit 11.2 Using Zombies in a Distributed Denial-of-Service Attack

Page 24: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 24

Security Incidences (cont’d)

• Exploitation of Trust – Computers on the networks enjoy trust relationships with one

another. – If attackers can forge their identity, they may be able to gain

unauthorized access to other computers.

• Malicious Code – A generic term for programs that cause undesired results on a

system when executed. Such programs are generally discovered after the damage is done. Malicious code includes Trojan horses, viruses, and worms.

• Internet Infrastructure Attacks – These attacks involve key components of the Internet infrastructure

rather than specific systems on the Internet. The attacks are rare but have serious implications on a large portion of Internet.

Page 25: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 25

Security Incidences (cont’d)

• Social Engineeringsocial engineeringA type of nontechnical attack that uses social pressures to trick computer users into compromising computer networks to which those individuals have access

• Two types of social engineering: human-based and computer-based

– A multiprong approach should be used to combat social engineering

• Education and training• Policies and procedures• Penetration testing

Page 26: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 26

Outline

• EC Architectural Framework• EC Security

– Basic Security Issues– Security Incidences– Securing EC Communications– Securing EC Networks– Securing Web Servers

Page 27: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 27

Securing EC Communications

access controlMechanism that determines who can legitimately use a network resource

• Something you know: password• Something you have: smartcard, tokens• Something you are: biometrics

passive tokensStorage devices (e.g., magnetic strips) that contain a secret code used in a two-factor authentication systemactive tokensSmall, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system

Page 28: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 28

Securing EC Communications

biometric systems

Authentication systems that identify a person by measurement of a biological characteristic, such as fingerprints, iris (eye) patterns, facial features, or voice

physiological biometrics

Measurements derived directly from different parts of the body (e.g., fingerprint, iris, hand, facial characteristics)

behavioral biometrics

Measurements derived from various actions and indirectly from various body parts (e.g., voice scans or keystroke monitoring)

Page 29: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 29

Securing EC Communications

fingerprint scanningMeasurement of the discontinuities of a person’s fingerprint, which are then converted to a set of numbers that are stored as a template and used to authenticate identity

iris scanningMeasurement of the unique spots in the iris (colored part of the eye), which are then converted to a set of numbers that are stored as a template and used to authenticate identity

Page 30: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 30

Securing EC Communications

encryption

The process of scrambling (encrypting) a message (plaintext) into ciphertext in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it

plaintext + encryption algorithm + key ciphertext

Page 31: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 31

Page 32: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 32

Securing EC Communications

symmetric (private) key system

An encryption system that uses the same key to encrypt and decrypt the message

Data Encryption Standard (DES)

The standard symmetric encryption algorithm supported the NIST and used by U.S. government agencies until October 2, 2000

Rijndael

The new Advanced Encryption Standard used to secure U.S. government Communications since October 2, 2000

Page 33: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 33

Exhibit 11.4 Symmetric (Private) Key Encryption

Page 34: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 34

Securing EC Communications

• Public (Asymmetric) Key Encryptionpublic key encryptionMethod of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa

public keyEncryption code that is publicly available to anyone

Page 35: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 35

Securing EC Communications

• Digital Signaturesdigital signature

An identifying code that can be used to authenticate the identity of the sender of a document

hash

A mathematical computation that is applied to a message, using a private key, to encrypt the message

Page 36: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 36

Securing EC Communications

• Digital Signaturesmessage digest

A summary of a message, converted into a string of digits, after the hash has been applied

digital envelope

The combination of the encrypted original message and the digital signature, using the recipient’s public key

Page 37: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 37

Exhibit 11.5 Digital Signatures

Page 38: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 38

Securing EC Communications

public key infrastructure (PKI)A scheme for securing e-payments using public key encryption and various technical components

digital certificateVerification that the holder of a public or private key is who he or she claims to be

certificate authorities (CAs)Third parties that issue digital certificates

Page 39: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 39

Securing EC Communications

Secure Socket Layer (SSL)Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality

Transport Layer Security (TLS)As of 1996, another name for the SSL protocol

Page 40: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 40

Outline

• EC Architectural Framework• EC Security

– Basic Security Issues– Security Incidences– Securing EC Communications– Securing EC Networks– Securing Web Servers

Page 41: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 41

Securing EC Networks

• The selection and operation of these technologies should be based on certain design concepts, including:

– Layered security– Controlling access– Role-specific security– Monitoring– Keep systems patched– Response team

Page 42: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 42

Exhibit 11.6 Layered Security

Page 43: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 43

Security at Each Layer

Page 44: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 44

Securing EC Networks

firewallA network node consisting of both hardware and software that isolates a private network from a public network

packet-filtering routersFirewalls that filter data and requests moving from the public Internet to a private network based on the network addresses of the computer sending or receiving the request

Page 45: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 45

Securing EC Networks

packetsSegments of data and requests sent from one computer to another on the Internet; consist of the Internet addresses of the computers sending and receiving the data, plus other identifying information that distinguish one packet from another

packet filtersRules that can accept or reject incoming packets based on source and destination addresses and the other identifying information

Page 46: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 46

Securing EC Networks

application-level proxyA firewall that permits requests for Web pages to move from the public Internet to the private networkbastion gatewayA special hardware server that utilizes application-level proxy software to limit the types of requests that can be passed to an organization’s internal networks from the public InternetproxiesSpecial software programs that run on the gateway server and pass repackaged packets from one network to the other

Page 47: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 47

Exhibit 11.7 Application Level Proxy (Bastion Gateway Host)

Page 48: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 48

Securing EC Networks

demilitarized zone (DMZ)

Network area that sits between an organization’s internal network and an external network (Internet), providing physical isolation between the two networks that is controlled by rules enforced by a firewall.

personal firewall

A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card.

Page 49: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 49

Exhibit 11.8 Demilitarized Zone (DMZ)

Page 50: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 50

Securing EC Networks

virtual private network (VPN)

A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network

Page 51: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 51

Securing EC Networks

intrusion detection systems (IDSs)

A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees

honeypots

Production systems (e.g., firewalls, routers, Web servers, database servers) designed to do real work but that are watched and studied as network intrusions occur

Page 52: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 52

Outline

• EC Architectural Framework• EC Security

– Basic Security Issues– Security Incidences– Securing EC Communications– Securing EC Networks– Securing Web Servers

Page 53: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 53

• HTTP Server (aka Web Server) -- If the site is well secured, only interaction will happen through this service counter

• HTTP Servers bind to a privileged port (80), thus run as a root. This provides them unlimited access to the host system.

• Run in chrooted environment– %chroot /www /etc/httpd/bin/httpd will set the root file system of

httpd as /www only files under the /www can be accessed by the webserver

– User can not serve files from Home directories

Web Server Security

Page 54: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 54

Web Server Security

• Each HTTP Server has 4 configuration files– Access.conf Access Control– httpd.conf Server Configuration– mime.types File extension and meanings– srm.conf Options including directories and Users.

• Define in httpd.conf ServerRoot /var/httpd/• Define in srm.conf /var/httpdocs

Page 55: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

ITEC5611 S. Kungpisdan 55

• Each HTTP Server has 4 configuration files– Access.conf Access Control– httpd.conf Server Configuration– mime.types File extension and meanings– srm.conf Options including directories and Users.

• Define in httpd.conf ServerRoot /var/httpd/• Define in srm.conf /var/httpdocs

Root

Serverroot

Documentroot

Web Server Security

Page 56: ITEC5611S. Kungpisdan 1 Course Outline Revisited 1.Overview of Electronic Commerce 2.E-Marketplace 3.Retailing in Electronic Commerce 4.Consumer Behavior,

Questions?

Next lecture:Electronic Payment Systems