Podcast
Questions and Answers
What is the purpose of a proxy server?
What is the purpose of a proxy server?
What is the primary goal of a firewall?
What is the primary goal of a firewall?
What is the easiest and least expensive way to prevent threats to system integrity?
What is the easiest and least expensive way to prevent threats to system integrity?
What is a critical component of managing risk?
What is a critical component of managing risk?
Signup and view all the answers
What is a key element of a security plan?
What is a key element of a security plan?
Signup and view all the answers
What is the estimated amount spent by companies worldwide on security hardware, software, and services?
What is the estimated amount spent by companies worldwide on security hardware, software, and services?
Signup and view all the answers
What is the primary purpose of encryption?
What is the primary purpose of encryption?
Signup and view all the answers
What is social engineering?
What is social engineering?
Signup and view all the answers
What is hacktivism?
What is hacktivism?
Signup and view all the answers
What is identity theft?
What is identity theft?
Signup and view all the answers
What is the primary purpose of a firewall?
What is the primary purpose of a firewall?
Signup and view all the answers
What is the primary purpose of a VPN?
What is the primary purpose of a VPN?
Signup and view all the answers
What is phishing?
What is phishing?
Signup and view all the answers
What is sniffing?
What is sniffing?
Signup and view all the answers
What is a major weakness of public key encryption?
What is a major weakness of public key encryption?
Signup and view all the answers
What is the primary function of a digital certificate?
What is the primary function of a digital certificate?
Signup and view all the answers
What is a limitation of PKI?
What is a limitation of PKI?
Signup and view all the answers
What is the primary function of SSL and TLS?
What is the primary function of SSL and TLS?
Signup and view all the answers
What is a benefit of using digital envelopes?
What is a benefit of using digital envelopes?
Signup and view all the answers
What is a concern related to the protection of private keys?
What is a concern related to the protection of private keys?
Signup and view all the answers
What is the primary function of a VPN?
What is the primary function of a VPN?
Signup and view all the answers
What is a limitation of encryption?
What is a limitation of encryption?
Signup and view all the answers
What is a significant challenge in achieving e-commerce security?
What is a significant challenge in achieving e-commerce security?
Signup and view all the answers
What is a key point of vulnerability in the e-commerce environment?
What is a key point of vulnerability in the e-commerce environment?
Signup and view all the answers
What is a common type of malicious code that can threaten e-commerce security?
What is a common type of malicious code that can threaten e-commerce security?
Signup and view all the answers
What is a factor to consider when evaluating the effectiveness of e-commerce security measures?
What is a factor to consider when evaluating the effectiveness of e-commerce security measures?
Signup and view all the answers
What is a challenge in reporting e-commerce security breaches?
What is a challenge in reporting e-commerce security breaches?
Signup and view all the answers
What is a type of underground economy marketplace?
What is a type of underground economy marketplace?
Signup and view all the answers
What is a concern related to e-commerce security?
What is a concern related to e-commerce security?
Signup and view all the answers
What is a key element of achieving good e-commerce security?
What is a key element of achieving good e-commerce security?
Signup and view all the answers
What type of hacking involves disrupting, defacing, or destroying a website?
What type of hacking involves disrupting, defacing, or destroying a website?
Signup and view all the answers
Which type of security threat involves losing control over corporate information to outsiders?
Which type of security threat involves losing control over corporate information to outsiders?
Signup and view all the answers
What is the term for hackers who target merchant servers and use data to establish credit under false identities?
What is the term for hackers who target merchant servers and use data to establish credit under false identities?
Signup and view all the answers
Which type of security threat involves flooding a website with useless traffic to overwhelm the network?
Which type of security threat involves flooding a website with useless traffic to overwhelm the network?
Signup and view all the answers
What is the term for an eavesdropping program that monitors information traveling over a network?
What is the term for an eavesdropping program that monitors information traveling over a network?
Signup and view all the answers
Which type of security threat involves using email scams to trick users into revealing sensitive information?
Which type of security threat involves using email scams to trick users into revealing sensitive information?
Signup and view all the answers
What is the primary purpose of encryption in protecting internet communications?
What is the primary purpose of encryption in protecting internet communications?
Signup and view all the answers
What is the term for security issues that arise from the use of mobile devices to access the internet?
What is the term for security issues that arise from the use of mobile devices to access the internet?
Signup and view all the answers
What is the primary benefit of using symmetric key encryption?
What is the primary benefit of using symmetric key encryption?
Signup and view all the answers
What is a characteristic of public key encryption?
What is a characteristic of public key encryption?
Signup and view all the answers
What is the purpose of a hash function in public key encryption?
What is the purpose of a hash function in public key encryption?
Signup and view all the answers
What is a benefit of using digital signatures?
What is a benefit of using digital signatures?
Signup and view all the answers
What is an advantage of using Advanced Encryption Standard (AES)?
What is an advantage of using Advanced Encryption Standard (AES)?
Signup and view all the answers
What is a limitation of public key encryption?
What is a limitation of public key encryption?
Signup and view all the answers
What is a benefit of using encryption?
What is a benefit of using encryption?
Signup and view all the answers
What is a characteristic of symmetric key encryption?
What is a characteristic of symmetric key encryption?
Signup and view all the answers
What percentage of online payments in 2012 were made using credit cards in the United States?
What percentage of online payments in 2012 were made using credit cards in the United States?
Signup and view all the answers
Which of the following is an example of an online stored value system?
Which of the following is an example of an online stored value system?
Signup and view all the answers
What is the primary mechanism used in mobile payment systems to enable sharing of data between devices?
What is the primary mechanism used in mobile payment systems to enable sharing of data between devices?
Signup and view all the answers
What is the primary characteristic of digital cash?
What is the primary characteristic of digital cash?
Signup and view all the answers
What is the primary purpose of Electronic Billing Presentment and Payment (EBPP) systems?
What is the primary purpose of Electronic Billing Presentment and Payment (EBPP) systems?
Signup and view all the answers
What percentage of all bill payments are made using EBPP systems?
What percentage of all bill payments are made using EBPP systems?
Signup and view all the answers
What is the dominant EBPP business model?
What is the dominant EBPP business model?
Signup and view all the answers
What is the primary limitation of online credit card payments?
What is the primary limitation of online credit card payments?
Signup and view all the answers
What is the primary goal of laws and public policy tools for identifying, tracing, and prosecuting cybercriminals?
What is the primary goal of laws and public policy tools for identifying, tracing, and prosecuting cybercriminals?
Signup and view all the answers
What is the characteristic of cash as a payment system?
What is the characteristic of cash as a payment system?
Signup and view all the answers
What type of payment system accumulates expenditures and to which consumers make period payments?
What type of payment system accumulates expenditures and to which consumers make period payments?
Signup and view all the answers
What is the primary concern of government regulators in payment systems?
What is the primary concern of government regulators in payment systems?
Signup and view all the answers
What is the primary goal of financial intermediaries in payment systems?
What is the primary goal of financial intermediaries in payment systems?
Signup and view all the answers
What is the primary concern of consumers in payment systems?
What is the primary concern of consumers in payment systems?
Signup and view all the answers
Which of the following is an example of a stored value payment system?
Which of the following is an example of a stored value payment system?
Signup and view all the answers
What is the primary goal of private and public cooperation in payment systems?
What is the primary goal of private and public cooperation in payment systems?
Signup and view all the answers
Study Notes
Protecting Networks
- A firewall is a hardware or software that uses security policy to filter packets and has two main methods: packet filters and application gateways.
- Proxy servers handle all communications originating from or being sent to the Internet.
Protecting Servers and Clients
- System security enhancements include upgrades and patches.
- Anti-virus software is the easiest and least expensive way to prevent threats to system integrity, but it requires daily updates.
Management Policies, Business Procedures, and Public Laws
- Worldwide, companies spend $60 billion on security hardware, software, and services.
- Managing risk includes technology, effective management policies, and public laws and active enforcement.
A Security Plan: Risk Management Policies
- A security plan includes risk assessment, security policy, implementation plan, and security audit.
- Security organization, access controls, authentication procedures, authorization policies, and authorization management systems are all part of the security plan.
Common Security Threats
- Potentially unwanted programs (PUPs) include browser parasites, adware, and spyware.
- Phishing threats include e-mail scams, social engineering, and identity theft.
- Hacking threats include hackers vs. crackers, types of hackers (white, black, grey hats), and hacktivism.
- Cybervandalism involves disrupting, defacing, or destroying a website.
- Data breaches involve losing control over corporate information to outsiders.
- Credit card fraud/theft, spoofing, spam, denial of service (DoS) attacks, and distributed denial of service (DDoS) attacks are all common security threats.
- Sniffing threats involve eavesdropping programs that monitor information traveling over a network.
- Insider attacks, poorly designed server and client software, social network security issues, mobile platform security issues, and cloud security issues are all common security threats.
Technology Solutions
- Protecting internet communications involves encryption.
- Securing channels of communication involves SSL and VPNs.
- Protecting networks involves firewalls.
- Protecting servers and clients involves various security solutions.
Digital Envelopes
- Digital envelopes use symmetric key encryption to encrypt documents and public key encryption to encrypt and send symmetric keys.
- Addressing weaknesses of public key encryption include computationally slow, decreased transmission speed, and increased processing time.
- Addressing weaknesses of symmetric key encryption include insecure transmission lines.
Digital Certificates and Public Key Infrastructure (PKI)
- Digital certificates include the name of the subject/company, subject's public key, digital certificate serial number, expiration date, issuance date, and digital signature of the CA.
- Public Key Infrastructure (PKI) includes digital certificate procedures, CAs, and PGP.
Limits to Encryption Solutions
- Encryption does not protect storage of private keys.
- PKI is not effective against insiders, employees, and protection of private keys by individuals may be haphazard.
- There is no guarantee that verifying computer of merchant is secure.
- CAs are unregulated, self-selecting organizations.
Securing Channels of Communication
- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) establish a secure, negotiated client-server session in which URL of requested document, along with contents, is encrypted.
- Virtual Private Network (VPN) allows remote users to securely access internal network via the Internet.
E-commerce Security Environment
- The overall size and losses of cybercrime are unclear due to reporting issues, with 46% of respondents in a 2011 CSI survey detecting a breach in the last year.
- Stolen information is stored on underground economy servers.
Achieving Good E-commerce Security
- To achieve the highest degree of security, new technologies, organizational policies and procedures, and industry standards and government laws are necessary.
- Other factors to consider include the time value of money, the cost of security vs. potential loss, and the fact that security often breaks at the weakest link.
The Tension Between Security and Ease of Use
- The more security measures added, the more difficult a site is to use, and the slower it becomes.
- Public safety and criminal uses of the internet, such as the use of technology by criminals to plan crimes or threaten nation-states, are also a concern.
Security Threats in the E-commerce Environment
- Three key points of vulnerability in the e-commerce environment are:
- Clients
- Servers
- Communications pipeline (internet communications channels)
Common Security Threats
- Malicious code threats include:
- Viruses
- Worms
- Trojan horses
- Drive-by downloads
- Backdoors
- Bots, botnets
- Threats at both client and server levels
- Potentially unwanted programs (PUPs) include:
- Browser parasites
- Adware
- Spyware
- Phishing threats include:
- Email scams
- Social engineering
- Identity theft
- Hacking threats include:
- Hackers vs. crackers
- Types of hackers: white, black, grey hats
- Hacktivism
- Cybervandalism involves disrupting, defacing, or destroying a website.
- Data breach involves losing control over corporate information to outsiders.
- Credit card fraud/theft involves hackers targeting merchant servers and using data to establish credit under false identity.
- Spoofing (pharming) involves hackers setting up fake websites to trick users into revealing sensitive information.
- Spam (junk) websites and denial of service (DoS) attacks are also common threats.
- Distributed denial of service (DDoS) attacks involve hackers flooding a site with useless traffic to overwhelm the network.
- Sniffing threats involve eavesdropping programs that monitor information traveling over a network.
- Insider attacks, poorly designed server and client software, social network security issues, mobile platform security issues, and cloud security issues are also concerns.
Technology Solutions
- Protecting internet communications involves:
- Encryption
- Securing channels of communication involves:
- SSL, VPNs
- Protecting networks involves:
- Firewalls
- Protecting servers and clients involves:
- Various security measures
E-commerce Payment Systems
- Credit cards are a popular payment method, with 44% of online payments in 2012 (U.S.).
- Debit cards are another popular payment method, with 28% of online payments in 2012 (U.S.).
- Limitations of online credit card payment include:
- Security, merchant risk
- Cost
- Social equity
- Alternative online payment systems include:
- Online stored value systems (e.g., PayPal)
- Other alternatives (e.g., Amazon Payments, Google Checkout, Bill Me Later, WUPay, Dwolla, Stripe)
Mobile Payment Systems
- The use of mobile phones as payment devices is established in Europe, Japan, and South Korea, and is expanding in the United States.
- Near field communication (NFC) is a short-range wireless technology for sharing data between devices.
- Mobile payment systems include:
- Google Wallet
- PayPal
- Square
Digital Cash and Virtual Currencies
- Digital cash is based on an algorithm that generates unique tokens that can be used in the "real" world (e.g., Bitcoin).
- Virtual currencies circulate within internal virtual worlds (e.g., Linden Dollars in Second Life, Facebook Credits).
Electronic Billing Presentment and Payment (EBPP)
- Online payment systems for monthly bills involve:
- Biller-direct (dominant model)
- Consolidator
- Both models are supported by EBPP infrastructure providers.
Encryption
- Encryption transforms data into cipher text readable only by the sender and receiver, securing stored information and information transmission.
- Encryption provides four of the six key dimensions of e-commerce security:
- Message integrity
- Nonrepudiation
- Authentication
- Confidentiality
Symmetric Key Encryption
- Symmetric key encryption uses the same digital key to encrypt and decrypt a message.
- Requires a different set of keys for each transaction.
- The strength of encryption depends on the length of the binary key used to encrypt data.
Public Key Encryption
- Public key encryption uses two mathematically related digital keys:
- Public key (widely disseminated)
- Private key (kept secret by owner)
- Both keys are used to encrypt and decrypt a message.
Public Key Encryption using Digital Signatures and Hash
- Hash function: Digests produce a fixed-length number called a message or hash digest.
- Hash digest of a message is sent to the recipient along with the message to verify integrity.
- Hash digest and message are encrypted with the recipient's public key, and the entire cipher text is then encrypted with the recipient's private key, creating a digital signature, for authenticity and nonrepudiation.
The Role of Laws and Public Policy
- Laws that give authorities the power to identify, trace, and prosecute cybercriminals include:
- National Information Infrastructure Protection Act of 1996
- USA Patriot Act
- Homeland Security Act
- Private and private-public cooperation involves:
- CERT Coordination Center
- US-CERT
- Government policies and controls on encryption software include:
- OECD, G7/G8, Council of Europe, Wassener Arrangement
Types of Payment Systems
- Cash is the most common form of payment, instantly convertible into other forms of value, with no float.
- Checking transfer involves transferring funds from a checking account to a merchant's account.
- Credit card payment involves credit card associations, issuing banks, and processing centers.
- Stored value payment involves depositing funds into an account, from which funds are paid out or withdrawn as needed.
- Accumulating balance payment involves accounts that accumulate expenditures and to which consumers make period payments.
Payment System Stakeholders
- Consumers want:
- Low-risk
- Low-cost
- Refutable
- Convenience
- Reliability
- Merchants want:
- Low-risk
- Low-cost
- Irrefutable
- Secure
- Reliable
- Financial intermediaries want:
- Secure
- Low-risk
- Maximizing profit
- Government regulators want:
- Security
- Trust
- Protecting participants and enforcing reporting
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the protection of networks and systems, including firewalls, proxy servers, and securing operating systems.