Page 327 - Introduction to Electronic Commerce and Social Commerce
P. 327

314                                                     10  E-Commerce Security and Fraud Issues and Protections

             1.  Conduct a vulnerability assessment of your EC systems. A  10.6   DEFENDING INFORMATION
              vulnerability assessment is a process of identifying and   SYSTEMS AND E-COMMERCE
              evaluating problem areas that are vulnerable to attack on a
              computerized  system.  The  EC  system  includes  online  Defending information systems regardless of their nature are
              ordering, communication networks, payment gates, prod-  similar and are described in many books (e.g., by Andress 2014).
              uct database, fraud protection, and so forth. The most criti-  We provide only highlights of this security, dividing it into
              cal vulnerabilities are those that can interrupt or shut down  three categories: (1) Access control, encryption, and PKI, (2)
              the business. For example, a DoS can prevent order taking;  Security in e-commerce networks, and (3) General controls,
              a virus attack can prevent communication. The assessment  spam, pop ups, and social engineering. In Section 10.7 we
              will determine the need for, and priority of, the defense  describe fraud protection.
              mechanisms. For an overview of vulnerability assessment   A comprehensive coverage of cybersecurity threats and
              including the process, see  searchmidmarketsecurity.  defense is provided by Scott in several volumes titled Cyber-
              techtarget.com/definition/vulnerability-analysis.  security 101. Volume 1 (Scott 2016a) covers mostly nontechni-
             2.  Conduct  penetration  (pen)  tests  (possibly  implemented  cal areas, while Volume 2 (Scott 2016b) covers mostly technical
              by hiring ex-hackers) to find the vulnerabilities and secu-  areas. A comprehensive book regarding defense against attacks
              rity weaknesses of a system. These tests are designed to  on the Web is provided by Harwood (2015).
              simulate outside (external) attacks.  This is also called
              “black-box”  testing.  In  contrast,  software  development
              companies conduct intensive “white-hat” testing, which   The Defense I: Access Control, Encryption,
              involves a careful inspection of the system—both hard-  and PKI
              ware and software. Other types of pen testing include tar-
              geted texting, blind testing, and double blind testing.  In this section, we describe the following topics: Access con-
                                                              trol methods, biometric systems, encryption, and PKI encryp-
              For more information, see searchsoftwarequality.tech-  tion. For an overview of the defense, see Cloud (2015).
           target.com/definition/penetration-testing.
                                                                Access Control
             Penetration Test
                                                              Access control determines who (person, program, or machine)
           A penetration test (pen test) is a method of assessing the  can legitimately use the organization’s computing resources
           vulnerability of a computer system. It can be done manually,  (which resources, when, and how).
           by allowing experts to act as hackers to simulate malicious
           attacks. The process checks the weak (vulnerable) points that  Authorization and Authentication
           an attacker may find and exploit. Any weakness that is discov-  Access control  involves  authorization  (having the  right  to
           ered is presented to management, together with the potential  access) and authentication, which is also called user identifi-
           impact and a proposed solution. A pen test can be one step in  cation (user ID), i.e., proving that the user is who he or she
           a comprehensive security audit.                    claims to be. Each user has a distinctive identification that dif-
              Several methods can be used to execute pen tests (e.g.,  ferentiates it from other users. Typically, user identification is
           automated process). In addition, many software tools are  used together with a password.
           available for this purpose. For a review and a tutorial, see
           pen-tests.com and  coresecurity.com/penetration-testing-  Authentication
           overview. For more on penetration tests, see Maxwell (2016).  After a user has been identified, the user must be authenticated.
                                                              Authentication is the process of verifying the user’s identity
                                                              and access rights. Verification of the user’s identity usually is
             SECTION 10.5  REVIEW QUESTIONS                   based on one or more characteristics that distinguish one indi-
                                                              vidual from another.
             1.  What is Information Assurance? List its major components.
             2.  Define confidentiality, integrity, and availability.    Biometric Systems
             3.  Define authentication, authorization, and nonrepudiation.
             4.  List the objectives of EC strategy.          A biometric authentication is a technology that measures
             5.  List the eight categories of defense in EC systems.  and analyzes the identity of people based on measurable
             6.  Describe vulnerability assessment.             biological or behavioral characteristics or physiological
             7.  What is a penetration test?                  signals.
   322   323   324   325   326   327   328   329   330   331   332