SlideShare a Scribd company logo
Data security in Online
       Commerce

PRESENTATION BY ANAND NAIR FOR DATA
     SECURITY MEET UP. 03/2008
Introduction

 About me:
   More than a decade experience as a researcher and
    developer of secure web services for online infrastructure
   Contributor to open source projects
   Speaker in various meet ups for technology and approach
    for highly scalable secure architecture.
   Recognized as technologist in gaming industry in
    research and development of online infrastructure.
 What’s in presentation
   Data security discussion
   Tools to test security risk
Data vulnerability

The most common web application security weakness is
the failure to properly validate input coming from the
client or environment before using it. This weakness
leads to almost all of the major vulnerabilities in web
applications, such as cross site scripting, SQL injection,
interpreter injection, locale/Unicode attacks, file system
attacks and buffer overflows.
Data Security : Watch the input data


 Data from an external entity or client should never
  be trusted, since it can be arbitrarily tampered with
  by an attacker.
 Unfortunately, complex applications like often have
  a large number of data input points, which makes it
  difficult for a developer to enforce this rule.
Data Security : Types of Attack

 A MitM attack can be performed in two different
 ways:
    The attacker is in control of a router along the normal point of
     traffic communication between the victim and the server the
     victim is communicating with.
    The attacker is located on the same broadcast domain (e.g.
     subnet) as the victim.
    The attacker is located on the same broadcast domain (e.g.
     subnet) as any of the routing devices used by the victim to
     route traffic.
Data Security: Transport Protocol

 Attacker has the ability to view and modify any TCP
  traffic sent to or from the victim machine.
 HTTP traffic is unencrypted and contains no
  authentication. Therefore, all HTTP traffic can be
  trivially monitored/modified by the attacker.
Data Security: Secure transport protocol


 Man in the middle enables the attacker to view most
  exchanged data, but does not enable the attacker to intercept
  data exchanged of protocols that implement their own
  authentication and encryption (e.g. SSH, SSL/TLS).
 The purpose of HTTPS is to create a secure communication
  over top of HTTP by the use of SSL or TLS. On its own
  SSL/TLS can be very effective and secure. However, there are
  significant problems
     The browsers handling of SSL/TLS can lead to issues when both HTTPS
      and HTTP sites are visited by the user.
     Man in middle would present a certificate warning message in the user’s
      browser and likely alert the user to the attack that most users would
      ignore the warning and continue – thus exposing all of their data.
     Alternatively, the attacker could try and use tools such as SSLstrip to
      leverage poor application design with regards to SSL/TLS.
Using Tools



 Toolkit:
   Platform to run the application

   Network switch to create a closed network environment

   Wireshark (www.wireshark.org)

   Burp Suite (www.portswigger.net/burp/download.html)
Using Tools: Wireshark
Using Tools: Burp Wire

More Related Content

PPTX
Wireless Intrusion Techniques
PPTX
Attack lecture #2 ppt
PDF
Cyber security slideshare_oct_2020
PPTX
WEB APPLICATION SECURITY
PPTX
Client server network threat
PPTX
network security
PPTX
Security
PPTX
Types of attack
Wireless Intrusion Techniques
Attack lecture #2 ppt
Cyber security slideshare_oct_2020
WEB APPLICATION SECURITY
Client server network threat
network security
Security
Types of attack

What's hot (20)

PPTX
Security Mechanisms
PPTX
webinos Security privacy
PPT
Types of attack -Part3 (Malware Part -2)
PDF
Chapter 1 Introduction of Cryptography and Network security
PPT
What are various types of cyber attacks
PPTX
Computer security 7.pptx
PPTX
Chapter- I introduction
PPTX
Network security
PPTX
Network attacks
PPTX
Konica Arora
PDF
cisco security training
PDF
8 palo alto security policy concepts
PPTX
Web server security challenges
PPTX
WEB APPLICATION SECURITY
PPTX
Web security
PPT
Chapter 01
PPTX
System Security enviroment in operating system
PPT
Security communication
PPTX
Formal and Practical Aspects of Security of Operating System
PDF
3 palo alto ngfw architecture overview
Security Mechanisms
webinos Security privacy
Types of attack -Part3 (Malware Part -2)
Chapter 1 Introduction of Cryptography and Network security
What are various types of cyber attacks
Computer security 7.pptx
Chapter- I introduction
Network security
Network attacks
Konica Arora
cisco security training
8 palo alto security policy concepts
Web server security challenges
WEB APPLICATION SECURITY
Web security
Chapter 01
System Security enviroment in operating system
Security communication
Formal and Practical Aspects of Security of Operating System
3 palo alto ngfw architecture overview
Ad

Viewers also liked (13)

PPTX
PDF
Computing Science Dissertation
PDF
PPTX
Leadership academy power point
PDF
Social media landscape 2013 Geraud Montigny
PDF
Breve histórico da pedologia
PPTX
The businessman app
PPTX
The businessman app
PPTX
Prototype
PDF
The History of Injectables
PPTX
Community development
PPTX
Community development
Computing Science Dissertation
Leadership academy power point
Social media landscape 2013 Geraud Montigny
Breve histórico da pedologia
The businessman app
The businessman app
Prototype
The History of Injectables
Community development
Community development
Ad

Similar to Data security in online commerce (20)

PDF
Secure Coding BSSN Semarang Material.pdf
PPT
E commerce security
PPT
1 network securityIntroduction - MSC.ppt
PPTX
State of the information security nation
PPT
E-COMMERCE SECURITY (2).ppt
PPT
Electronic commerce security seventh annual edition
PPT
E-COMMERCE SECURITY (1).ppt VI6R7UTGT6T5FRKDLKUTY
PPT
E-COMMERCE SECURITY , e bussines nvjfffbjurgrujgkmdgnfblguisrljkfbbjsreio[q3g...
PPTX
How to Test for The OWASP Top Ten
PPT
Web Application Security
PPTX
Computer Network Case Study - bajju.pptx
PPTX
Top web apps security vulnerabilities
PPTX
ASP.NET security vulnerabilities
PPT
Securing E-Commerce Networks Presentation.ppt
PPTX
Week 7 Basics of Web Security, a course in cyber security.pptx
PPTX
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
PDF
Ch7-Computer Security
PPSX
Secure electronic transaction
PDF
CNIT 129S: Securing Web Applications Ch 1-2
PPT
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
Secure Coding BSSN Semarang Material.pdf
E commerce security
1 network securityIntroduction - MSC.ppt
State of the information security nation
E-COMMERCE SECURITY (2).ppt
Electronic commerce security seventh annual edition
E-COMMERCE SECURITY (1).ppt VI6R7UTGT6T5FRKDLKUTY
E-COMMERCE SECURITY , e bussines nvjfffbjurgrujgkmdgnfblguisrljkfbbjsreio[q3g...
How to Test for The OWASP Top Ten
Web Application Security
Computer Network Case Study - bajju.pptx
Top web apps security vulnerabilities
ASP.NET security vulnerabilities
Securing E-Commerce Networks Presentation.ppt
Week 7 Basics of Web Security, a course in cyber security.pptx
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
Ch7-Computer Security
Secure electronic transaction
CNIT 129S: Securing Web Applications Ch 1-2
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
Teaching material agriculture food technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
sap open course for s4hana steps from ECC to s4
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Data security in online commerce

  • 1. Data security in Online Commerce PRESENTATION BY ANAND NAIR FOR DATA SECURITY MEET UP. 03/2008
  • 2. Introduction  About me:  More than a decade experience as a researcher and developer of secure web services for online infrastructure  Contributor to open source projects  Speaker in various meet ups for technology and approach for highly scalable secure architecture.  Recognized as technologist in gaming industry in research and development of online infrastructure.  What’s in presentation  Data security discussion  Tools to test security risk
  • 3. Data vulnerability The most common web application security weakness is the failure to properly validate input coming from the client or environment before using it. This weakness leads to almost all of the major vulnerabilities in web applications, such as cross site scripting, SQL injection, interpreter injection, locale/Unicode attacks, file system attacks and buffer overflows.
  • 4. Data Security : Watch the input data  Data from an external entity or client should never be trusted, since it can be arbitrarily tampered with by an attacker.  Unfortunately, complex applications like often have a large number of data input points, which makes it difficult for a developer to enforce this rule.
  • 5. Data Security : Types of Attack  A MitM attack can be performed in two different ways:  The attacker is in control of a router along the normal point of traffic communication between the victim and the server the victim is communicating with.  The attacker is located on the same broadcast domain (e.g. subnet) as the victim.  The attacker is located on the same broadcast domain (e.g. subnet) as any of the routing devices used by the victim to route traffic.
  • 6. Data Security: Transport Protocol  Attacker has the ability to view and modify any TCP traffic sent to or from the victim machine.  HTTP traffic is unencrypted and contains no authentication. Therefore, all HTTP traffic can be trivially monitored/modified by the attacker.
  • 7. Data Security: Secure transport protocol  Man in the middle enables the attacker to view most exchanged data, but does not enable the attacker to intercept data exchanged of protocols that implement their own authentication and encryption (e.g. SSH, SSL/TLS).  The purpose of HTTPS is to create a secure communication over top of HTTP by the use of SSL or TLS. On its own SSL/TLS can be very effective and secure. However, there are significant problems  The browsers handling of SSL/TLS can lead to issues when both HTTPS and HTTP sites are visited by the user.  Man in middle would present a certificate warning message in the user’s browser and likely alert the user to the attack that most users would ignore the warning and continue – thus exposing all of their data.  Alternatively, the attacker could try and use tools such as SSLstrip to leverage poor application design with regards to SSL/TLS.
  • 8. Using Tools  Toolkit:  Platform to run the application  Network switch to create a closed network environment  Wireshark (www.wireshark.org)  Burp Suite (www.portswigger.net/burp/download.html)