电子商务:管理视角 CH11.ppt
《电子商务:管理视角 CH11.ppt》由会员分享,可在线阅读,更多相关《电子商务:管理视角 CH11.ppt(51页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Chapter 11E-Commerce Security 2008 Pearson Prentice Hall,Electronic Commerce 2008,Efraim Turban,et al.Learning Objectives1.Explain EC-related crimes and why they cannot be stopped.2.Describe an EC security strategy and why a life cycle approach is needed.3.Describe the information assurance security
2、 principles.4.Describe EC security issues from the perspective of customers and e-businesses.2Learning Objectives5.Identify the major EC security threats,vulnerabilities,and risk.6.Identify and describe common EC threats and attacks.7.Identify and assess major technologies and methods for securing E
3、C communications.8.Identify and assess major technologies for information assurance and protection of EC networks.3Stopping E-Commerce CrimeslInformation assurance(IA)The protection of information systems against unauthorized access to or modification of information whether in storage,processing or
4、transit,and against the denial of service to authorized users,including those measures necessary to detect,document,and counter such threatslhuman firewallsMethods that filter or limit peoples access to critical business documents4Stopping E-Commerce CrimeslzombiesComputers infected with malware tha
5、t are under the control of a spammer,hacker,or other criminallapplication firewallsSpecialized tools designed to increase the security of Web applicationslcommon(security)vulnerabilities and exposures(CVE)Publicly known computer security risks,which are collected,listed,and shared by a board of secu
6、rity-related organizations(cve.mitre.org)5Stopping E-Commerce CrimeslvulnerabilityWeakness in software or other mechanism that threatens the confidentiality,integrity,or availability of an asset(recall the CIA model).It can be directly used by a hacker to gain access to a system or networklriskThe p
7、robability that a vulnerability will be known and used6Stopping E-Commerce CrimeslexposureThe estimated cost,loss,or damage that can result if a threat exploits a vulnerabilitylstandard of due careCare that a company is reasonably expected to take based on the risks affecting its EC business and onl
8、ine transactions7Stopping E-Commerce CrimeslCSI/FBI Computer Crime and Security SurveyAnnual security survey of U.S.corporations,government agencies,financial and medical institutions,and universities conducted jointly by the FBI and the Computer Security Institute8Stopping E-Commerce CrimeslHighlig
9、hts from CSI/FBI Computer Crime and Security Survey:lTotal financial losses from attacks have declined dramaticallylAttacks on computer systems or(detected)misuse of these systems have been slowly but steadily decreasing in all areaslDefacements of Internet Web sites have increased dramaticallyl“Ins
10、ide jobs”occur about as often as external attackslOrganizations largely defend their systems through firewalls,antivirus software,intrusion detection systems,and server-based access control listslOrganizations largely defend their systems through firewalls,antivirus software,intrusion detection syst
11、ems,and server-based access control listslComputer security investments per employee vary widely9E-Commerce Security Strategy and Life Cycle ApproachlThe Internets Vulnerable Designldomain name system(DNS)Translates(converts)domain names to their numeric IP addresseslIP addressAn address that unique
12、ly identifies each computer connected to a network or the Internet10E-Commerce Security Strategy and Life Cycle ApproachlThe Shift to Profit-Motivated CrimeslTreating EC Security as a ProjectlEC security programSet of controls over security processes to protect organizational assetslFour high-level
13、stages in the life cycle of an EC security program:1.Planning and organizing2.Implementation3.Operations and maintenance4.Monitoring and evaluating11E-Commerce Security Strategy and Life Cycle ApproachlOrganizations that do not follow such a life cycle approach usually:lDo not have policies and proc
14、edures that are linked to or supported by security activitieslSuffer disconnect,confusion,and gaps in responsibilities for protecting assetslLack methods to fully identify,understand,and improve deficiencies in the security programlLack methods to verify compliance to regulations,laws,or policieslHa
15、ve to rely on patches,hotfixes,and service packs because they lack a holistic EC security approach12E-Commerce Security Strategy and Life Cycle ApproachlpatchProgram that makes needed changes to software that is already installed on a computer.Software companies issue patches to fix bugs in their pr
16、ograms,to address security problems,or to add functionalitylhotfixMicrosofts name for a patch.Microsoft bundles hotfixes into service packs for easier installationlservice packThe means by which product updates are distributed.Service packs may contain updates for system reliability,program compatib
17、ility,security,and more13E-Commerce Security Strategy and Life Cycle ApproachlIgnoring EC Security Best PracticeslComputing Technology Industry Association(CompTIA)Nonprofit trade group providing information security research and best practiceslDespite the known role of human behavior in information
18、 security breaches,only 29%of the 574 government,IT,financial,and educational organizations surveyed worldwide had mandatory security training.Only 36%offered end-user security awareness training14Information AssurancelCIA security triad(CIA triad)Three security concepts important to information on
19、the Internet:confidentiality,integrity,and availability15Information AssurancelconfidentialityAssurance of data privacy and accuracy.Keeping private or sensitive information from being disclosed to unauthorized individuals,entities,or processeslintegrityAssurance that stored data has not been modifi
20、ed without authorization;and a message that was sent is the same message that was receivedlavailabilityAssurance that access to data,the Web site,or other EC data service is timely,available,reliable,and restricted to authorized users16Information AssurancelauthenticationProcess to verify(assure)the
21、 real identity of an individual,computer,computer program,or EC Web sitelauthorizationProcess of determining what the authenticated entity is allowed to access and what operations it is allowed to perform17Information AssurancelnonrepudiationAssurance that online customers or trading partners cannot
22、 falsely deny(repudiate)their purchase or transactionldigital signature or digital certificateValidates the sender and time stamp of a transaction so it cannot be later claimed that the transaction was unauthorized or invalid18Information Assurance19Information Assurance20Enterprisewide E-Commerce S
23、ecurity and Privacy Model21Enterprisewide E-Commerce Security and Privacy ModellSenior Management Commitment and SupportlEC Security Policies and TraininglTo avoid violating privacy legislation when collecting confidential data,policies need to specify that customers:lKnow they are being collectedlG
24、ive permission,or“opt in,”for them to be collectedlHave some control over how the information is usedlKnow they will be used in a reasonable and ethical manner22Enterprisewide E-Commerce Security and Privacy Modellacceptable use policy(AUP)Policy that informs users of their responsibilities when usi
25、ng company networks,wireless devices,customer data,and so forth23Enterprisewide E-Commerce Security and Privacy ModellEC Security Procedures and Enforcementlbusiness impact analysis(BIA)An exercise that determines the impact of losing the support of an EC resource to an organization and establishes
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 电子商务:管理视角 CH11 电子商务 管理 视角
限制150内