Download Web Site Development Tools

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Information security wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Cyberattack wikipedia , lookup

Unix security wikipedia , lookup

Network tap wikipedia , lookup

Distributed firewall wikipedia , lookup

Hacker wikipedia , lookup

Security-focused operating system wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Mobile security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Chapter 7
E-Business Network
and Web Site
Security
E-Business Technologies
1
Objectives
In this chapter, you will learn to:
• Describe general e-business and Web site
security issues
• Identify ways to protect the physical security of a
network
• List internal network security risks and explain
how to protect against them
• Discuss external network and Web site security
risks and explain how to protect against them
E-Business Technologies
2
Objectives
In this chapter, you will learn to:
• Identify the risks associated with an e-business’s
online transactions
• Illustrate a virtual private network
• Describe wireless security issues
• Discuss the importance of security audits
E-Business Technologies
3
General Network and Web Site
Security Issues
• E-business security: protecting data and physical
networks
• E-business security risks include:
– Physical risks: Damage to network and data
– Internal risks: Threats originating within
organization
– External risks: Threats from outside the
organization
– Transactional risks: Data loss and interception
E-Business Technologies
4
Valued Gateway
Client:
Physical Risks
• Include accidental or deliberate damage to
equipment or data resulting from natural disaster
or sabotage
• Specific issues include:
– Network equipment and physical location
– Electrical power backup
– Internet connectivity redundancy
– Outsourcing physical risks
E-Business Technologies
5
Network Equipment and
Physical Location
Equipment and locations security include:
• Network facilities location: network equipment and server
rooms always locked, locations anonymous
• Fire protection: install fire-suppression systems that do not
damage servers, routers, electrical equipment - but these
systems might be fatal to humans
• Network facilities construction: construction and design of
facilities more substantial than conventional office space
and with particular attention to electrical and
communication considerations
E-Business Technologies
6
Electrical Power Backup
• E-businesses should consider two levels of
backup power:
– Batteries that assume power within milliseconds of
a failure
– Power generators that automatically start when the
batteries die
• Critical servers should never be out more than
five minutes per year to achieve “five nines
reliability” (99.999% uptime)
E-Business Technologies
7
Internet Connectivity Redundancy
• E-businesses should have more than one
connection to the Internet
• ISPs and Web hosting companies often have
connections to more than one network service
provider (NSP)
• Complete data-center redundancy allows
e-businesses to continue operations from a
different location in the event of a major disaster
• What is the price of redundancy and when is the
price too high?
E-Business Technologies
8
Outsourcing Physical Risks
• Using Web hosting services provides physically
secure environment for e-business servers
• Fee for service arrangement provides power,
connectivity, and secure environment
• Eliminates internal risks to physical security
• What are the benefits for small firms to
outsource?
E-Business Technologies
9
Physical Risks to Network and
Web Site Assets
• Include accidental or deliberate damage to
equipment or data is accidental or deliberate
more likely?
• Caused by natural disaster or sabotage
• Threat to network infrastructure includes:
– Damage to network equipment
– Damage to power supplies
– Damage from fire
E-Business Technologies
10
Network Equipment and
Physical Location
• Physical security begins with equipment safety
• Threat reduction includes proper management of
network facilities location and fire protection
• Security countermeasures for network facilities
locations include:
– Locked network equipment room doors with
restricted personnel access
– Locations of servers and switching equipment kept
anonymous
E-Business Technologies
11
Network Equipment and
Physical Location
• Fire protection and countermeasures to
prevent fire damage include:
– Use fire suppression system approved for
electrical fires in server, switch, and power
rooms
– Use only fire extinguishers approved for
electrical fires in server, switch, and power
rooms
– Pre-select and train employees responsible for
fire control
E-Business Technologies
12
Internal Security Risks
• Come from inside the company: unhappy
employees, poor security awareness, poor
planning
• Establishing and enforcing security policy
is first countermeasure
• Additional countermeasures include:
– Password protecting the network
– Using biometric identification
– Using smart card authorization
E-Business Technologies
13
Passwords
• Passwords are used to identify a specific
computer user and grant user access
• Effective when created properly and changed
regularly
DO
DON’T
Use a combination of at least
six characters and numbers
Use familiar names, dates, or
numbers significant to user
Use easy to remember
combinations
Use common words from the
dictionary, street names, etc.
Change password periodically Pick new password similar to
the old password
E-Business Technologies
14
Biometric Identification
• Measurement of biological
data
• Biometric security devices
and software measure and
record a computer user’s
unique human
characteristics (such as
eye retina or iris) for user
identification
• Still under development
E-Business Technologies
15
Smart Card
• Smart cards contain an
embedded memory chip
with user identification
information
• Can be used to
authenticate a remote user
logging into a network
• Disadvantage: Risk of loss
or theft
E-Business Technologies
16
Backup and Restore
Policies and Procedures
• Describes the plan for securing vital data files
and software in case of disaster
• Specifies when and how critical files and software
are backed up
• Backups should be built in to daily, weekly,
monthly network maintenance schedule
• Test restore procedure, and archive, by
performing periodic restores
E-Business Technologies
17
Backup and Restore
Policies and Procedures
• Backup media should also be stored offsite or at
least a second copy of the backup media)
• Some e-businesses assign backup
responsibilities to employees outside of IT
department
• Offsite storage also available via Internet
connection from data management companies
E-Business Technologies
18
Disaster Recovery Planning
• Disaster Recovery Plan part of e-business’
Business Continuity Plan
• DRP for network operations should include
procedures for handling electrical outages, data
loss, and security breaches
• Plan can include the use or redundant servers
and equipment to handle system failover
• DRP should be tested periodically
E-Business Technologies
19
External Security Risks
• Originate outside the company’s network
• Must bypass network defenses
• Connecting to the Internet exposes private
LANs to risk of attack
• Stringent security necessary to protect
against external risk
E-Business Technologies
20
Hackers
• Outside intruders that deliberately gain
unauthorized access to individual computers or
computer networks
• White hat hackers find and make known
weaknesses in computer systems without regard
for personal gain
• Black hat hackers (crackers) gain access to steal
valuable information, disrupt service, or cause
damage
E-Business Technologies
21
Hacker Attack Tactics
• Objective: interrupt operations or use hacked
computer as base of attack on other computers
• The most common method is to send confusing
data to a server or other computer
• Crashing a program can allow a hacker to take
control of computers
• Buffer overflows tie up operating memory,
degrading performance, causing crashes
E-Business Technologies
22
Distributed Denial of Service Attacks
• Denial of Service (DoS) attacks designed to
disable network using flood of useless traffic
• Distributed DoS uses multiple computers to
attack networks
• DDoS attacks include:
– Unending string of Pings
– Sending hundred of huge e-mail messages
E-Business Technologies
23
E-Business Technologies
24
Web Site Defacement
• Hacker deliberately changes the content of Web
pages
• Caused by breaking into network, accessing Web
site files and modifying files
• Better known victims include FBI, Goodyear, NY
Times, and NASA
E-Business Technologies
25
Hacker Countermeasures
• Firewalls designed to resist buffer overflows
and other common types of hacker attacks
• Firewall types include:
– Packet-filtering firewalls
– Circuit-level firewalls - verified by TCP, the weakness
is that once it is verified subsequent packets are not
verified
– Application-level firewalls (e-mail, FTP, or some other
application)
E-Business Technologies
26
E-Business Technologies
27
hacking back is illegal
Hacker Countermeasures
• Network Address Translation uses external IP addresses to
hide internal IP addresses
• Proxy server uses external IP address to send HTTP
request over Internet and forwards responses from HTTP
servers to requesting client using internal IP address
E-Business Technologies
28
How Filters Work
• A filter is a process or device
that screens incoming
information
• Allows only information that
meets specified criteria
through
• Disabling service ports
denies access to HTTP, email from Internet
• Restricting access to internal
IP addresses hides
computers
E-Business Technologies
29
Viruses
Standard computer viruses:
• Are small, usually destructive, programs that are
inserted into other files that then become
“infected”
• Infect executable programs or operating system
files, spreading when infected program executes
• Can also spread via e-mail headers or
attachments
• Can prevent a computer system from booting,
erase files or entire hard drives, prevent the
saving or printing of files, and send repetitive email messages
E-Business Technologies
30
Worms
• Viruses that reside in a computer’s memory
replicating itself
• Uncontrolled replications consume a computer’s
resources, slowing or crashing the system
NAME
DATE
IDENTIFIED
WHAT IT DOES
W32.Nimda.
A@mm
9/18/2001
Sent as e-mail or MS
Outlook/Outlook
Express folders. Attacks
IIS Web servers.
E-Business Technologies
31
Macro Viruses
• A macro virus is a virus that infects macros
• Distributed in files such as Word documents or
Excel workbooks e-mailed or transferred via
floppy disk
NAME
DATE
IDENTIFIED
WHAT IT DOES
W97M.Debil
Byte.A
02/05/2002
Infects MS Word
Normal.dot template,
and subsequent
documents
E-Business Technologies
32
Trojan Horses
• Pretends to be something useful or fun, does
something malicious instead
• Used to steal passwords, record a user’s keystrokes,
locate IP addresses, and plant other destructive
programs
NAME
DATE
IDENTIFIED
WHAT IT DOES
Backdoor.
Surgeon
02/20/2002
Allows hacker to take
control by opening a port
(35000) and get control of
computer
E-Business Technologies
33
Wireless Viruses
• “Liberty Crack” Palm Trojan, identified in
August 2000
– Could delete all applications on a Palm device
• “Phage” discovered in September 2000
– Infected Palm operating system applications and
documents
– Proliferated when users beamed or shared an
infected document
E-Business Technologies
34
Virus Hoaxes
• Some so-called viruses trumpeted in the media or
announced via warning e-mails are just hoaxes
• False warnings about viruses proliferate as
quickly as real viruses
• Creates an atmosphere in which a real virus
warning might not be taken seriously
• Several antivirus software vendors maintain upto-date information on viruses, worms, Trojan
horses, and hoaxes. This information is available
online.
E-Business Technologies
35
Virus Countermeasures
• Countermeasures to block infections include:
– Antivirus software
– Employee education
– Installing software updates and patches
– User awareness
– Use of application software tools
– It's not just the job of IT, but of all users
E-Business Technologies
36
Transactional Security
• Transactional security includes:
–
–
–
–
Authentication
Integrity
Nonrepudiation
Confidentiality
• Protective measures include: sending and
receiving encrypted messages or data, using
digital certificates to authenticate the parties
involved in the transaction, and storing retained
customer information properly
E-Business Technologies
37
Encryption
• Cryptography is the art of protecting information by
encrypting it
• Encryption is the translation of data into a secret code
called ciphertext
• Ciphertext that is transmitted to its destination and
then decrypted (or returned to its unencrypted format)
is called plaintext
• Both parties in a transaction need access to
encryption key
• Network encryption uses two keys: a public key to
encrypt information and a private key to decrypt it
E-Business Technologies
38
Public Key Infrastructure
• An e-business obtains public and private keys from
a certificate authority (CA)
• Public keys are posted to a public directory
• Private keys are given only to the e-business
requesting the keys
• A digital certificate is the electronic security
credential that certifies an entity’s identity
E-Business Technologies
39
E-Business Technologies
40
How Public Key Encryption Works
• Public-key encryption is asymmetric
• Uses very large prime numbers to create public
keys
• Public and private keys are used for the initial
session greeting; session keys encrypt and
decrypt data
• Session keys are shorter keys created and used
only during the current session and discarded
afterward
• In the U.S., session keys usually consist of 16
digits equaling 128 bits, also called 128-bit keys
E-Business Technologies
41
Security Protocols
• Secure Sockets Layer (SSL) uses public key
encryption and digital certificates; and is
included in Web browsers/Web servers
• Transport Layer Security (TLS) used to assure no
third-party access to Internet communications
Uses two protocols:
– TLS Record Protocol
– TLS Handshake Protocol
• Secure Electronic Transactions (SET) protocol
used for presenting credit card transaction on the
Internet
E-Business Technologies
42
Virtual Private Networks
• Virtual Private Networks (VPNs) are
private networks that use the Internet to
transmit data
VPNs use:
• Firewalls
• Public key encryption
• Digital certificates
E-Business Technologies
43
E-Business Technologies
44
Tunneling
• Tunneling encapsulates one protocol within
another protocol requires telecomm equipment
that supports VPN
• VPNs using the Internet encapsulate encrypted
data, sending and receiving IP addresses, and a
special tunneling protocol within a regular IP
packet
• Tunneling protocols include: Point-to-Point, GRE,
L2TP, and IPSec
• Method of data encryption and encapsulation
depends on the protocol used
E-Business Technologies
45
Wireless Security
• Eavesdropping on early wireless transmissions
was fairly simple:
– FDMA technologies stayed on one frequency for
call duration, required “listening device” that
operated on same frequency
– TDMA technologies switch can be intercepted
using device that listens for one-third of a second
and then decompresses signal into full second of
speech
• CDMA (other current standards) poses more of a
challenge, but … not invincible
E-Business Technologies
46
WAP and WTLS
• Wireless Transport Layer Security (WTLS) uses
encryption and digital certificates
• Upon accessing WAP server, WAP client requests
secure connection
• WAP server responds by sending digital
certificate, with public key
• WAP client generates encrypted session key to
WAP server, which decrypts the key
• WAP client/server can send/receive encrypted
data for balance of session
E-Business Technologies
47
WLANs and Security
• WLANs are most vulnerable at wireless access
points
• Hackers need only an 802.11b-enabled laptop, an
inexpensive antennae, and WLAN access point
detection software, such as NetStumbler
• Using “meaningful” access point names and
“default” settings on wireless access points
simplifies hacker’s job
• Using Wireless Equivalent Privacy (WEP) security
protocol (IEEE 802.11b Wi-Fi) provides encryption
and authentication of wireless transmissions
E-Business Technologies
48
IrDA and Bluetooth Security
• Short distances and line-of-sight requirements for IrDA
devices make “sniffers” impractical
• Using laptops with default IrDA port settings in public
places (such as airports) automatically allows networking
with other IrDA devices without authentication or
passwords
• Bluetooth uses 128-bit link key, private encryption keys,
user PIN and device addresses for transmission security
• Bluetooth vulnerability: device address sent with each
transmission and user PINs can be compromised easily by
theft or loss of device
E-Business Technologies
49
Security Audits
• Security audit is a comprehensive review and
assessment of an e-business’s security
vulnerabilities
• A complete security audit should include:
reviewing security policies, employee security
training, and the physical security of the
e-business’s offices and network facilities
• Audits can include examining the technical
security of a network via penetration testing or
actual attempted hacking attacks by security
audit personnel
E-Business Technologies
50
Penetration Test Protection
• When evaluating security firms request:
– Proof of insurance: cover cost of fixing
damage/losses caused by penetration testing
– Nondisclosure agreements: prevent disclosure of
test results, network and proprietary information
– Scanning tools: determine what scanning tools will
be used for testing
– Scope of engagement: scope of audit and test
plans
– Documentation: final detailed accounting of audit,
including individual test results, findings
E-Business Technologies
51