Module 1
Module 1
•Threats in E-commerce
•Encryption Overview
•Elements of Encryption
•Secret key encryption
•Public key encryption
•Digital Signatures
•Digital Certificates
•Types of Cryptoghraphies
•SSL
•Smart cards and applications
•EDI
•Evolution,
•uses ,benefits,
•Working of EDI
•EDI component
•Services
•ANSI X12
•EDIFACT
Computer security
2. Server level
• Java applets,
• Active X controls,
• JavaScript, and
• VBScript
• Cookies
Client threats
– Active Content
• Programs that are embedded transparently in Web
pages and cause actions to occur.
• E.g., Display moving graphics, down-load and play
audio, implemented Web-based spreadsheet
programs.
• Programs that interpret or execute instructions
embedded in downloaded objects
• Malicious active content can be embedded into
seemingly innocuous Web pages
Client threats
Java Applet
• JavaScript
• JavaScript is a scripting language developed by
Netscape Corporation to enable Web page designers to
build active content.
• Secrecy Threats:
– Secrecy is the prevention of unauthorized information
disclosure. It requires sophisticated physical and logical
mechanism to implement
– Theft of sensitive or personal information (e-mail
address, credit card number)is a significant danger in e-
commerce
– Sniffer programs can tap into a router of the Internet and
record information while it passes from a client computer
to a Web server.
– IP address of a computer is continually revealed to a
Web server while a user is on the web
Communication Channel Threats
• Integrity Threats:
– Also known as active wiretapping
– Unauthorized party can alter data such as
changing the amount of a deposit or
withdrawal in bank transaction over the
Internet
– A hacker can create a mechanism such that
all transactions from a Web site redirects to a
fake location.
Communication Channel Threats
• Necessity Threats:
– Also known as delay or denial threats
– Disrupt normal computer processing
• Deny processing entirely
• Slow processing to intolerably slow speeds such
that customers get bored not to visit the site
anymore.
• Remove file entirely, or delete information from a
transmission or file
• Divert money from one bank account to another
Server Threats
• Malicious code
– Viruses
– Worms
– Trojan horses
– Bots, botnets
• Unwanted programs
– Browser parasites
– Adware
– Spyware
Most Common Security Threats
• Phishing
– Deceptive online attempt to obtain confidential
information
– Social engineering, e-mail scams, spoofing legitimate
Web sites
– Use of information to commit fraudulent acts (access
checking accounts), steal identity
• Hacking and cybervandalism
– Hackers vs. crackers
– Cybervandalism: Intentionally disrupting, defacing,
destroying Web site
– Types of hackers: White hats, black hats, grey hats
Most Common Security Threats
• Credit card fraud/theft
– Hackers target merchant servers; use data to establish credit
under false identity
• Spoofing: is the creation of Internet Protocol (IP) packets with a forged
source IP address, with the purpose of concealing the identity of the
sender or impersonating another computing system.
• Pharming [ is a cyber attack intended to redirect a website traffic to
another, fake site
1. Message integrity
2. Non repudiation
3. Authentication
4. Confidentiality
Encryption Overview
Processing
Moderate High Modest
Requirements
• Hash function:
• Mathematical algorithm that produces fixed-
length number called message or hash digest
• Hash digest of message sent to recipient along with
message to verify integrity
• Hash digest and message encrypted with recipient’s
public key
• Entire cipher text then encrypted with recipient’s private
key – creating digital signature – for authenticity, non-
repudiation
Public Key Cryptography with Digital Signatures
45
Asymmetric encryption
• Although public key encryption seems to have solved the major
chronic encryption problems of key exchange and message
repudiation, it still has its own problems.
– The biggest problem for public key cryptographic scheme is
speed. Public key algorithms are extremely slow compared to
symmetric algorithms. This is because public key calculations
take longer than symmetric key calculations since they involve
the use of exponentiation of very large numbers which in turn
take longer to compute. For example, the fastest public key
cryptographic algorithm such as RSA is still far slower than any
typical symmetric algorithm. This makes these algorithms and
the public key scheme less desirable for use in cases of long
messages.
– Public key encryption algorithms have a potential to suffer from
the man-in-the-middle attack. The man-in-the-middle attack is a
well known attack, especially in the network community where
an attacker sniffs packets off a communication channel, modifies
them, and inserts them back on to the channel.
Public key cryptography
• With public key cryptography, there are two keys involved.
• One key is needed to encrypt (the recipient's public key) and
another key is needed to decrypt (the recipient's private key).
• Both keys are needed: once you've encrypted your
message with one of these keys, you can only decrypt it with
the other.
• So when you use PGP, you create a keypair.
• One of those, the public key, you publicize as widely as
possible.
• The other one, the private key, you keep safe. Anyone who
wants to send you private email encrypts the message with
your public key.
• Once that message is encrypted, only you -- the owner of
the corresponding private key -- can decipher the message
Encryption Hashing
Output is of a fixed
Length of Output is similar in
short length,
Result length to input
regardless of input
48
Public key cryptography
52
Electronic signature
Financial Applications
• Electronic Purse to replace coins for small purchases in vending
machines and over-the-counter transactions.
• Credit and/or Debit Accounts, replicating what is currently on the
magnetic stripe bank card, but in a more secure environment.
• Securing payment across the Internet as part of Electronic
Commerce.
Communications Applications
• The secure initiation of calls and identification of caller (for billing
purposes) on any Global System for Mobile Communications
(GSM) phone.
• Subscriber activation of programming on Pay-TV.
Applications of smart cards
Government Programs
• Electronic Benefits Transfer using smart cards to carry
Food Stamp and WIC food benefits in lieu of paper
coupons and vouchers.
• Agricultural producer smart marketing card to track
quotas.
Information Security
• Employee access cards with secured passwords and the
potential to employ biometrics to protect access to
computer systems.
Applications of smart cards
Physical Access Control
• Employee access cards with secured ID and the potential to employ
biometrics to protect physical access to facilities.
Transportation
• Drivers Licenses.
• Mass Transit Fare Collection Systems.
• Electronic Toll Collection Systems.
Retail and Loyalty
• Consumer reward/redemption tracking on a smart loyalty card, that is
marketed to specific consumer profiles and linked to one or more specific
retailers serving that profile set.
Health Care
• Consumer health card containing insurance eligibility and emergency medical
data.
Student Identification
• All-purpose student ID card (a/k/a campus card), containing a variety of
applications such as electronic purse (for vending machines, laundry
machines, library card, and meal card).
EDI: Electronic Data Interchange
• Benefits of EDI
Advantages
• Lower operating costs
– Saves time and money
• Less Errors = More Accuracy
– No data entry, so less human error
• Increased Productivity
– More efficient personnel and faster throughput
• Faster trading cycle
– Streamlined processes for improved trading
relationships
Suppliers, manufacturers, and retailers cooperate in some of the most successful
applications of EDI.
Electronic Data Interchange
• EDI Standards
– EDI requires companies to agree on standards
• Compatible hardware and software
• Agreed upon electronic form format
• Objective
– Provide for the communication of EDI data
– Identify alternative communication methods
– Specify the communication standard for
industry use
– Provide operational guidelines for using the
standard
EDI
The Importance of EDI
– Need for timely, reliable data exchange in response to
rapidly changing markets
– Emergence of standards and guidelines
– Spread of information into many organizational units
– Greater reliability of information technology
– Globalization of organizations
EDI
Retailer A Wholesaler A
Retailer B Wholesaler B
Value-added
Network
Retailer C Wholesaler C
Retailer D Wholesaler D