Evaluate the Usability of Security Audits in Electronic Commerce
|
|
|
- Veronica Jennings
- 9 years ago
- Views:
Transcription
1 Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka Institute of Information Technology, Malabe Campus, New Kandy Road, Malabe. [email protected], [email protected], [email protected], [email protected] Abstract The advent and the expansion of the Internet increases the amount of trade electronically. Electronic commerce encompasses a series of business activities and processes from ebanking to offshore manufacturing to elogistics. However, the expansion of ecommerce is found to be limited in the South Asian region and especially in Sri Lanka, mainly to: security issues and a lack of trust in conducting business over the Internet or any other network. Security Audit helps to overcome esecurity issues to a great extent. esecurity Audit includes: Internet configuration, design and implementation assistance, development of information security policy, independent evaluation of security countermeasures and firewall service, firewall audit etc. can apply to all other South Asian countries too. Our research was to identify and understand what e is, evaluate its usability in ecommerce and identify its usage in business anizations. These objectives were realized through discussions and interviews with Information Security Professionals, auditors and with the use of a questionnaire. The scope of the questionnaire was narrowed and used on a selected sample of business anizations using ecommerce in Sri Lanka. 1. Introduction 1.1 Electronic Commerce Electronic commerce can be defined as businesses electronically through electronic data transmission technologies such as the Internet and World Wide Web by using Web applications such as Web sites, services, instant messaging, Electronic Data Interchange (EDI), File Transfer Protocol (FTP), shopping carts etc to transact goods, services, data and funds relating to transactions as well as regular money transfers between business and the consumer or another business anization. An important aspect to be borne in mind with electronic commerce is that important business transactions are electronically. Electronic methods to deal with business transactions are considered quite simple and help increase profits through increasing sales and decreasing transaction costs and can be available to customers at any time from anywhere. Electronic commerce, the types of which are described below, eliminates the middleman in transactions so that the business directly interacts with the customer and the relationship between businesses and the customer increases. It also allows for business to expand across geographical borders to help narrow market segments, geographically impossible, reach the global 31.1
2 K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage marketplace with speedy transactions. Customers too benefit from electronic commerce with new market channels offering a wide range of choices for their business purposes. 1.2 Types of Electronic Commerce Business to Business (B2B) - is business transactions between two business anizations using electronic means such as EDIs or engage in supply chain technology among trusted business partners. Business to Consumer (B2C) - unknown business partners access business information systems of the suppliers. Consumer to Consumer (C2C) - Auction sites where customers are buyers as well as sellers. Business to Government (B2G) - electronic business transactions between companies and governments. 1.3 The Electronic Commerce Architectures Two tier architecture A client accesses the server using a Web browser resident in the client machine and the server provides the requested service. Three tier architecture A middle tier is added to the client environment and the server environment. Distributed enterprise architecture Distributed enterprise architecture Organizations that have extended their operations to many different physical locations need to manage and make data available for all users, therefore the database systems that are been used, store the same data in many different physical locations. Enterprise Resource Planning (ERP) software give greater flexibility to these businesses with standardised business object models and distributed object computing. 2. Security Issues The use of the Internet and networks for on-line purchasing and electronic transactions, contribute towards growth in global electronic commerce. However, the public remains concerned about privacy, security and equitable access costs. Any ecommerce on the Internet is subject to interception, tracking or attack and requires the use of cryptography to code transmissions for security and privacy with which encrypted data becomes reasonably secure at each end. There is a need for digital certificates to establish the authenticity of on-line users and also a Public Key Authentication Framework for security. 2.1 ecommerce Security Classification Any ecommerce system has to meet four requirements: privacy which requires information to be kept from unauthorized parties, integrity which relates to messages that must not be altered or tampered with, authentication which refers to sender and recipient proving their identities to each other, and non-repudiation which refers to a necessity for proof that the message was indeed received. Privacy is handled by encryption. In Public Key Infrastructure (PKI) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Special Issue of the International Journal of the Computer, the Internet and Management, Vol.15 No. SP4, November,
3 Digital signatures perform authentication and integrity. A plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key are sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function. The message digest value remains unchanged. Very often, the message is also time stamped by a third party agency, which provides non-repudiation. Information sent over the Internet commonly uses the set of rules called Transmission Control Protocol / Internet Protocol (TCP/IP). The information is broken into packets, numbered sequentially, an error control attached and individual packets sent by different routes. TCP/IP reassembles in order and resubmits packets showing errors. Secure Socket Layers (SSL) use PKI and digital certificates to ensure privacy and authentication. Firewalls protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees. 2.2 Practical Consequences The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirements. In order to be absolutely safe, sensitive information and customer details should be saved on zip-disks, a physically separate PC or with a commercial file storage service. Multiple back-ups of essential information must be kept stored safely off-site and ensure they are secure. 3. Detailed Analysis of the Research ecommerce includes the conduct of business with customers, suppliers, and other external business partners using Internet or any other public/private network. Mainly it can be categorized into B2B & B2C ecommerce. This is a vast area. We limited our research scope to B2C ecommerce over the Internet. More and more anizations now try to use electronic means to conduct business with customers. The connection with the internet exposes B2C applications to inherent threats such as hackers, viruses & impersonation which would affect the confidentiality, integrity and availability of the application. Therefore B2C ecommerce reviews would play a significant role to avoid from those threats by assessing the adequacy of the protection against such threats. 3.1 Objectives Identify and understand what e is Evaluate its usability in Electronic commerce Identify its usage in business anizations 3.2 Research Focus Audits in the following areas: Evaluating The Business Aspects Of An Ecommerce Application Change & Content Management Process Communication Control Reviews Data Storage Integrity Review Protection Against External Threats Availability Of The Application & Business Continuity Review Efficiency & Effectiveness Reviews Third Party Services Reviews. 31.3
4 K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage Evaluating the Business Aspects In order to evaluate the security audits in Business Aspects we focused our questionnaire as follows: 1. On evaluating the compatibility of business strategy with the B2C applications objectives 2. Extent to which the anizations financial viability depends on the site 3. Business viability (cost-benefit) of the B2C application in the business. 1.) Evaluate the compatibility of business strategy with B2C applications objectives 2.) Extent to which anizational viability depends on the site 3.) Business viability all Table 1 Results For Evaluating The Business Aspects According to the research results almost all anizations, which is 88 carry out audits on business aspects. It is a combination of 100 contribution in evaluating the compatibility of business strategy with the B2C applications objectives and business viability (cost-benefit) of the B2C application. But the audit reviews in the extent to which the anizations financial viability depends on the site was carried out only by 65 of the population Evaluate the Change and Content Management Process For the evaluation of the security audits carried out in Change & Content Management Process of the anization we carried out our research on the areas of: 1. Maintenance of change logs of the application 2. Appropriateness of language used, presentation & correctness of information published, 3. Adequacy of audit trails relating to key contents (terms, conditions & prices). 1.) Maintenance of change logs of the application 2.) Appropriateness of language used 3.) Adequacy of audit trails relating key contents Table 2 Results for Evaluate the Change & Content Management Process all According to our research almost all anizations carry out compliance audits on development process of the anization. s carried in the area of maintenance of change logs of the application and appropriateness of language, presentation & correctness of information is done 100 by our population. The audit reviews regarding adequacy of audit trials relating to key contents (terms, conditions & prices) is done only by 65 of our population. Therefore, the overall reviews under the area of Change & Content Management Process is of the overall population, with which we can conclude that almost all anizations carry out security audits reviews in Change & Content Management Process Communication Control Review 88 The communication control review focuses on secure communication channel used by companies when communicating with external parties via the Internet or other Special Issue of the International Journal of the Computer, the Internet and Management, Vol.15 No. SP4, November,
5 private networks they use. The available technologies include encryption methods. The questionnaire contained questions based on the following: 1. Appropriate encryption technology/ mechanism used in transmission 2. Security of communication across the network No of 1.) Access Logs ) Access privileges to the database With the table we can arrive at the following conclusion regarding Communication control reviews: According to the survey the companies that perform communication control reviews are out of a total of 20 companies considered in the sample do compliance audits on encryption technologies used in transmitting their data through the network and only 57.1 conduct audits on security of the communication across the network. Therefore, it can be determined that companies pay very little attention in carrying out security audits in the area of communication control Data Storage Integrity Review all ) Archived data Table 3 Results For Communication Control Review With data storage integrity review, our main concern was on how companies store their data, use authentication methods and access logs which are necessary to protect data from unintentional or intentional access to them. Under the data storage integrity the questionnaire contained questions on the following: 1. Access logs 2. Access privileges to the database 3. Archived data 1.) Appropriate encryption technology/ mechanism used in transmission 2.) Security of the communication across the network Table 4 Results For Data Storage Integrity Review Process all 43 According to the table we observe that except for access privileges to the database audits majority of the companies perform audits under the data storage integrity domain. We can arrive at the following conclusion regarding this domain reviews: Most of the companies in the sample analyzed conduct reviews on the data storage integrity which remains at Audits on access logs and archived data are carried out by all the companies and audits on access privileges are by Protection against External Threats In a B2C Web site security audit the auditor should evaluate the threats imposed by the environment, taking into account the nature of the business anization. External threats can arise from various sources such as hackers, competitors etc. The nature of the business anization: market share, intensity of competition, use of Information Technology for business, was used to 31.5
6 K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage determine the possible threats and their sources. In a security audit it should be assessed whether countermeasures are in place in order to commensurate those external threats. The questionnaire focused on five such areas reviewed under such process. 1. Security architecture of the application 2. Virus protection mechanism 3. Firewall implementation 4. Intrusion detection mechanism 5. Existence of relevant logs as well as their ongoing reviews. 1.) Security Architecture of the application 2.) Virus protection mechanism 3.) Firewall implementation 4.) Intrusion detection mechanism. 5.) Existence of relevant logs as well as their ongoing reviews all Table 5 Results for Protection against External Threats According to the observations except for the log reviews, other reviews are performed by a majority of 85 anizations. Taken as a whole, 76 of companies have reviews under the External threats review domain. This is a positive sign Availability of the Application and Business Continuity The loyalty & reliability of customers is retained and the revenue generation through the Web site is greatly dependent on its availability. Therefore, the questionnaire included security audit assessments of: 1. Capacity planning process 2. Backup storage 3. Disaster recovery procedure 4. Fallback arrangements 1.) Capacity planning process all 2.) Backup storage ) Disaster recovery procedure 4.) Fallback arrangements Table 6 Results for Availability of the Application & Business Continuity From the above table we can conclude that businesses concern, on availability & business continuity is as high as 88 since availability & business continuity is of vital importance for Web business. Performance of such reviews would safeguard company s Website objectives and thereby safeguard the company assets Efficiency and Effectiveness Reviews The reviews carried under efficiency and effectiveness were to determine whether anizations carry out security audits regarding the volume of transactions handled by the Websites, how cost effective the application as well as how easy it is to use and to find any audit on customer feedback regarding the Websites. The questionnaire addressed the following areas: 1. Volume of transaction through B2C application Special Issue of the International Journal of the Computer, the Internet and Management, Vol.15 No. SP4, November,
7 2. Cost efficiency of the ecommerce application 3. Ease of use of the application 4. Customer feedback 1.) Volume of transaction through B2C application 2.) Cost efficiency of the ECommerce application 3.) Ease of use of the application 4.) Customer feedback 5 25 The table provides values for us to arrive at the following conclusion regarding reviews on Efficiency and effectiveness: Companies who do perform reviews on their volume of transaction handled through the B2C applications are few and as a percentage it is 25 from the total sample of 20 companies. Most of the companies perform reviews on ease of use and customer feedback about the applications. A lesser number of companies perform reviews on cost effectiveness of the ecommerce application which is 40. Therefore, we can arrive at a conclusion that a majority of the companies, which is 58.75, do perform security audits on efficiency and effectiveness of the B2C applications they use Third Party Services Reviews all Table 7 Results for Efficiency and Effectiveness Reviews In reviews on third party services the research focuses on whether the B2C ecommerce solution depends on any thirdparty service providers, such as an Internet Service Provider (ISP), Certificate Authority (CA), Registration Authority (RA) or Webhosting agency) and protection mechanism provided by the third parties are reviewed in security audits. The questionnaire was on the following areas: 1. Appropriate and adequate procedures at the third party s end 2. Adequate protection of the interests of the anization as related to contracts and service level agreements 1.) Procedures at the third parties end are appropriate & adequate 2.) Interest of the anization are being protected due to third party contracts From the results we can come to following conclusion regarding the third party services: The reviews on procedures at the third party s ends are appropriate and adequate enough as performed by 55 percent of the companies and 85 performs audits on interests of the anization are being protected adequately due to related contracts and service level agreements. Therefore, 70 of 20 companies, which is a majority from the total sample, do perform audits on third party services. 4. Conclusion Table 8 Results For Third Party Services Reviews all 70 The research concentrated on eight major areas of electronic commerce to 31.7
8 K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage determine whether they are currently used by businesses. It was revealed that different businesses had different and varied focus Graph1: Overall Performance Of ECommerce Security Audit Evaluating the Business Aspects Evaluate the Change & Content Management Process Communication Control Review Data Storage Integrity Review Protection Against External Threats Availability of an Application & Business Continuity Efficiency and Effectiveness Reviews Third Party Services Reviews The highest focus has gone into Availability of the application & Business continuity reviews, Evaluating the Business aspects audits and Evaluate the Change & Content management process. As a percentage it is 88, whereas the least number of audits that is only 43 of the companies have Communication control review However, it is interesting to note that there is use of security audits with many of the participant businesses indicating their awareness and performance of security audits. Accordingly, we could conclude that concerns regarding security reviews are on the rise and would remain so. However there is a lack of computer aided tools available for the purpose. Perhaps, availability of such tools could entail better security facilities for ecommerce to become popular. 5. Recommendations There should be awareness rising at regional level regarding the usability of security audit in the B2C ecommerce and the importance to maintain such audits should be highlighted. Some regulatory body or institution can be created at regional level to monitor or enforce the necessity of security audit requirements for B2C applications. This could be very much useful and productive for the anizations to achieve their web site objectives, profits and there by achieve anizational mission and vision. Regional standards for B2C ecommerce security audits can be developed taking into account all international standards like COBIT available. Further when anizations perform security audits on B2C applications they should look into all possible areas of possible security breach and perform the audit. It should not be biased towards any area. 6. References [1] Gary P. Schneider, Electronic Commerce. Fourth Annual Edition. [2] ecommerce Security: Securing the Network Perimeter mplate=/contentmanagement/ [3] Electronic Commerce - Wikipedia, The Free Encyclopedia (2006) ommerce [4] Basic Guide to ecommerce (Doing Business Over the Internet/Web) mmrce/e_cmmrce.htm [5] ecommerce Advantages and Disadvantages mc/ec1/ec1_3.htm Special Issue of the International Journal of the Computer, the Internet and Management, Vol.15 No. SP4, November,
9 [6] Advantages of ecommerce s.htm [7] ecommerce Architecture /spring2005/cmpe472archit-2003.ppt [8] ecommerce Architecture alfred.cse.buffalo.edu/dbgroup/ecom mercearchitecture.pdf 31.9
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
ELECTRONIC COMMERCE SYSTEMS
CHAPTER ELECTRONIC COMMERCE SYSTEMS This chapter discusses one of the most visible segments of the business world today e-commerce. In general terms, the issues involve the electronic processing and transmission
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
Analysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Module 6. e-business and e- Commerce
Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Electronic Commerce. Chapter Overview
Electronic Commerce Chapter Overview This chapter presents an overview of how e-commerce works, from the perspective of the organization and the customer. Businesses and individuals use e-commerce to reduce
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
White paper. Implications of digital certificates on trusted e-business.
White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
WebEx Security Overview Security Documentation
WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Introduction to E-commerce
i Zheng Qin Introduction to E-commerce With 98 figures Springer Contents Part 1 Fundamentals 1 Fundamentals of E-commerce 3 1.1 The Origin and Development of E-commerce 4 1.1.1 The Origin and Development
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22
IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22 Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits
Overview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...
Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Generic Aspects and Special Issues for High Speed Networks. Carsten Benecke, DFN-FWL, University of Hamburg
Generic Aspects and Special Issues for High Speed Networks Carsten Benecke, DFN-FWL, University of Hamburg DFN security projects in Hamburg What is network security? How do we achieve network security?
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
A Framework for Secure and Verifiable Logging in Public Communication Networks
A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr [email protected]
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Chapter 10. e-payments
Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
The Second National HIPAA Summit
HIPAA Security Regulations: Documentation and Procedures The Second National HIPAA Summit Healthcare Computing Strategies, Inc. John Parmigiani Practice Director, Compliance Programs Tom Walsh, CISSP Practice
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
