SlideShare a Scribd company logo
Security and International E-Commerce Jim Maloney [email_address] November 2000 SecurityPortal The focal point for security on the Net ™
Agenda Security and e-commerce Security defined General security threats to e-commerce International security issues Key elements of a security solution  Recommended security approach Summary
Why is security important for E-Commerce? Increased Exposure, Threats, Vulnerabilities, Privacy Concerns Increased Bandwidth Expanded Access ASP Delivery Model Tech-Savvy Culture Mobile Society Increased E-Business Opportunities Sophisticated Applications Customer-Centric Business Models Ubiquitous Internet
Old economy view of security In the “Old Economy” computing security was often viewed as a  discretionary  element of the business The focus was on  protection  of information systems and data
New economy view of security In the “New Economy” computing security is viewed as a  strategic  element of the business The focus is on enabling new ways of doing business and  value creation And from a protection perspective, security is now protecting the entire business, not just its information systems
A working definition of security Confidentiality  – the protection of private data on hosts or in transit Integrity  - the system does not corrupt information or allow unauthorized malicious or accidental changes to information Availability  - the computer system’s hardware and software keeps working efficiently and the system is able to recover quickly and completely if a disaster occurs Accountability  - the ability to determine who is responsible for the result of an action
General security threats to e-commerce Web site defacement Denial of service Theft of customer data Theft of intellectual property Sabotage of data or networks Financial fraud
Resulting business impact Lack of consumer confidence if there are any real or perceived security issues Loss of profits due to last minute security implementations Damage to image and reputation if you have a visible security incident Bankruptcy if the majority of your business transactions occur online Benefits to competitors if your level of security is perceived to be inadequate
International security issues Regulations and policies Education and awareness Cultural norms Access modes Local government stance on cyber crime
Regulations and policies Encryption laws vary greatly from country to country. This can impact both the availability and use of the appropriate technology. http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm Privacy and consumer protection laws also vary greatly from country to country. These laws control how personal data can be used and shared. Can lead to substantial fines if violations occur. http://www.gilc.org/privacy/survey
Education and awareness While malicious, external security attacks get most of the publicity, it is often employee mistakes and oversights that cause security issues Security awareness education for all employees, and specific training for your IT team, can be an excellent defense for both internal and external incidents A recent survey showed that 86% of Shanghai’s networks had security products installed, but less that 2% of the network professionals actually knew how to protect their networks from intruders
Cultural norms Limited work hours for support and emergency response services Being “on-call” Multi-shift operations (24/7) History of not protecting intellectual property Electronic documents Software CDs and DVDs
Access modes There is a rapid increase in the number of users accessing the internet via wireless devices such as cell phones In addition to their small size, portable wireless devices have limited processing power, limited memory and a limited power supply These characteristics lead to several security challenges
Access modes – continued With very limited keyboards and screens, cell phones and handhelds will require new authentication schemes to replace user names and passwords New schemes may include screen-based biometrics, embedded certificates, hardware tokens, web cookies and PINs These devices are viewed as likely platforms for viruses that can be carried from network to network without detection
Access modes - continued Data moving through air is vulnerable to interception using relatively inexpensive equipment The portability of these devices increases the need for physical security and authentication
Local government stance on cyber crime Singapore – Very detailed statutes regarding penalties for criminal hacking Brazil – No special laws against cyber crime (and a very active hacking community) The Philippines had no anti-hacking laws until the “Lovebug” virus was traced back to their country Interpol is working to establish international standards for cyber crime legislation http://www.mossbyrett.of.no/info/legal.html
Asia/Pacific perspective Factors accelerating adoption of security Growth of e-commerce in this region Government initiatives supporting security Recognition of the need for security guidelines, regulations and products that enable interoperability
Asia/Pacific perspective - continued Factors inhibiting the adoption of security Lack of integrated security solutions that can span systems and regions Lack of awareness of security issues and solutions
Security is more than technology Process Technology Monitor Respond Anticipate Defend People
Security is an attribute, not a component System Management and Security Network & Networking Services Hardware & Operating System App App App App User Interface Application Development Environment Information Management Distribution Services
General security approach Develop accurate and complete policies that span the supply chain Make sure that all employees understand the importance of computing security Define clear roles and responsibilities for e-commerce security Perform regular audits, reviews and assessments of security Don’t ignore the physical security of your systems
General security approach - continued Implement and maintain a set of baseline controls for your e-commerce system Implement user ID and authentication via strong passwords, secure tokens or biometrics Have backup and recovery plans in place
Secure web site development tips Include security as part of requirements gathering Include security as part of the architecture Be careful with embedded components Never trust incoming data Provide help to users Use code reviews Be aware of privacy and encryption laws Stay up-to-date on new risks, threat and vulnerabilities Document your security solution
Secure web site development references Recent articles on SecurityPortal: Best Practices for Secure Web Development (parts I and II) Web Security & Commerce (O'Reilly Nutshell) by Simson Garfinkel, Gene Spafford Web Security: A Step-by-Step Reference Guide by Lincoln D. Stein
Summary Security is a critical enabler for e-commerce The negative impact of poor security can be substantial Many of the issues and solutions regarding secure international e-commerce are people and process related, not technical Security is a key attribute of a system that must be designed in, not added on later Maintaining a secure web site requires continuous vigilance
Bibliography E-Business Security: An Essential Element in the Post-Year 2000 World. Gartner Group Research Report, April 17, 2000. The Net Present Value of Security. AtomicTangerine Special Report, October 11, 2000. International Ecommerce. SecurityPortal cover story, November 5, 2000. Information Security: The E-Commerce Driver. Dataquest Market Analysis, January 10, 2000. E-Business Impact on Security Technology and Practices. Gartner Group Research Note, November 11, 1999. Security Services in the Connected Age: From the basement to the boardroom. Gartner Group Market Analysis, July 4, 2000.
Bibliography - Continued Shanghai to Enhance Information Security.  http://www. nikkeibp . asiabiztech .com , February 15, 2000. Wireless Security: Locking Down the Wavelengths. Information Security Magazine, October 2000. Do Handhelds Need Virus Protection? PCWorld.com, June 29, 2000. Best Practices for Secure Web Development.  http:// securityportal .com/cover/coverstory20001030.html , October 30, 2000. Best Practices for Secure Web Development: Technical Details.  http:// securityportal .com/articles/webdev20001103.html , November 10, 2000.

More Related Content

PPTX
Information Security : Is it an Art or a Science
PPTX
Cybersecurity in the Era of IoT
PPTX
IT compliance
PPT
Information security.pptx
PDF
CyberSecurity_for_the_IoT
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PDF
The importance of information security
PPTX
Information Security
Information Security : Is it an Art or a Science
Cybersecurity in the Era of IoT
IT compliance
Information security.pptx
CyberSecurity_for_the_IoT
Cybersecurity-Real World Approach FINAL 2-24-16
The importance of information security
Information Security

What's hot (19)

PPTX
Information & Cyber Security Risk
PPT
Information Technology Policy for Corporates - Need of the Hour
PDF
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
PPTX
Information security: importance of having defined policy & process
PPTX
Maloney slides
PPTX
Importance Of A Security Policy
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
DOCX
The Role of Information Security Policy
PPTX
INFORMATION SECURITY
PPT
S nandakumar
PPT
S nandakumar_banglore
PPT
Introduction to information security
PPTX
Information Systems Policy
PDF
Information Security and Privacy - Public Sector actions, policies and regula...
PDF
Chapter 1 introduction(web security)
PDF
Your organization is at risk! Upgrade your IT security & IT governance now.
PPT
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Information & Cyber Security Risk
Information Technology Policy for Corporates - Need of the Hour
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Information security: importance of having defined policy & process
Maloney slides
Importance Of A Security Policy
ISO 27001 - information security user awareness training presentation - Part 1
The Role of Information Security Policy
INFORMATION SECURITY
S nandakumar
S nandakumar_banglore
Introduction to information security
Information Systems Policy
Information Security and Privacy - Public Sector actions, policies and regula...
Chapter 1 introduction(web security)
Your organization is at risk! Upgrade your IT security & IT governance now.
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Ad

Similar to Maloney Slides (20)

PDF
Ijnsa050215
PPTX
Ecommerce security
PPTX
Security Threats which security threat is any potential danger that can explo...
PPTX
protection & security of e-commerce ...
PPTX
PPT
Security&reliability
PPT
Principles of Electronic Commerce_Unit_III.ppt
PDF
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
PPTX
Risks & secutiry in e commerce
PPTX
Security for e commerce
PPTX
E commerce
PPT
Chapter three e-security
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PDF
E-Commerce Privacy and Security System
PDF
E-Commerce Privacy and Security System
PPTX
Security issues in E-commerce
PPT
Guard Era Security Overview Preso (Draft)
Ijnsa050215
Ecommerce security
Security Threats which security threat is any potential danger that can explo...
protection & security of e-commerce ...
Security&reliability
Principles of Electronic Commerce_Unit_III.ppt
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
Risks & secutiry in e commerce
Security for e commerce
E commerce
Chapter three e-security
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
E-Commerce Privacy and Security System
E-Commerce Privacy and Security System
Security issues in E-commerce
Guard Era Security Overview Preso (Draft)
Ad

More from ecommerce (19)

PPT
E Commerce14a(2)
PPT
E Com Center Klagenfurt
PPT
Ecommerce1
PPT
Cybercrime
PPT
E Commerce14a
PPT
B Hkorba
PPT
Am Cham Taipei Sept2004
PPT
Ecommerce(3)
PPT
Nordin Malaysia
PPT
B4 Gusmeroli
PPT
Ecommerce(2)
PPT
E Commerce052503
PPT
Wsis Alf C7 Unctad
PPT
Ecommerce
PPT
Documentation Set Up
PPT
Ecommerce Overview
PPT
Napier
PPT
S719a
PPT
Mea1
E Commerce14a(2)
E Com Center Klagenfurt
Ecommerce1
Cybercrime
E Commerce14a
B Hkorba
Am Cham Taipei Sept2004
Ecommerce(3)
Nordin Malaysia
B4 Gusmeroli
Ecommerce(2)
E Commerce052503
Wsis Alf C7 Unctad
Ecommerce
Documentation Set Up
Ecommerce Overview
Napier
S719a
Mea1

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Trump Administration's workforce development strategy
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Classroom Observation Tools for Teachers
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
01-Introduction-to-Information-Management.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Trump Administration's workforce development strategy
What if we spent less time fighting change, and more time building what’s rig...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
Supply Chain Operations Speaking Notes -ICLT Program
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
Final Presentation General Medicine 03-08-2024.pptx
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Microbial diseases, their pathogenesis and prophylaxis
Paper A Mock Exam 9_ Attempt review.pdf.
Anesthesia in Laparoscopic Surgery in India
01-Introduction-to-Information-Management.pdf
Yogi Goddess Pres Conference Studio Updates
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Maloney Slides

  • 1. Security and International E-Commerce Jim Maloney [email_address] November 2000 SecurityPortal The focal point for security on the Net ™
  • 2. Agenda Security and e-commerce Security defined General security threats to e-commerce International security issues Key elements of a security solution Recommended security approach Summary
  • 3. Why is security important for E-Commerce? Increased Exposure, Threats, Vulnerabilities, Privacy Concerns Increased Bandwidth Expanded Access ASP Delivery Model Tech-Savvy Culture Mobile Society Increased E-Business Opportunities Sophisticated Applications Customer-Centric Business Models Ubiquitous Internet
  • 4. Old economy view of security In the “Old Economy” computing security was often viewed as a discretionary element of the business The focus was on protection of information systems and data
  • 5. New economy view of security In the “New Economy” computing security is viewed as a strategic element of the business The focus is on enabling new ways of doing business and value creation And from a protection perspective, security is now protecting the entire business, not just its information systems
  • 6. A working definition of security Confidentiality – the protection of private data on hosts or in transit Integrity - the system does not corrupt information or allow unauthorized malicious or accidental changes to information Availability - the computer system’s hardware and software keeps working efficiently and the system is able to recover quickly and completely if a disaster occurs Accountability - the ability to determine who is responsible for the result of an action
  • 7. General security threats to e-commerce Web site defacement Denial of service Theft of customer data Theft of intellectual property Sabotage of data or networks Financial fraud
  • 8. Resulting business impact Lack of consumer confidence if there are any real or perceived security issues Loss of profits due to last minute security implementations Damage to image and reputation if you have a visible security incident Bankruptcy if the majority of your business transactions occur online Benefits to competitors if your level of security is perceived to be inadequate
  • 9. International security issues Regulations and policies Education and awareness Cultural norms Access modes Local government stance on cyber crime
  • 10. Regulations and policies Encryption laws vary greatly from country to country. This can impact both the availability and use of the appropriate technology. http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm Privacy and consumer protection laws also vary greatly from country to country. These laws control how personal data can be used and shared. Can lead to substantial fines if violations occur. http://www.gilc.org/privacy/survey
  • 11. Education and awareness While malicious, external security attacks get most of the publicity, it is often employee mistakes and oversights that cause security issues Security awareness education for all employees, and specific training for your IT team, can be an excellent defense for both internal and external incidents A recent survey showed that 86% of Shanghai’s networks had security products installed, but less that 2% of the network professionals actually knew how to protect their networks from intruders
  • 12. Cultural norms Limited work hours for support and emergency response services Being “on-call” Multi-shift operations (24/7) History of not protecting intellectual property Electronic documents Software CDs and DVDs
  • 13. Access modes There is a rapid increase in the number of users accessing the internet via wireless devices such as cell phones In addition to their small size, portable wireless devices have limited processing power, limited memory and a limited power supply These characteristics lead to several security challenges
  • 14. Access modes – continued With very limited keyboards and screens, cell phones and handhelds will require new authentication schemes to replace user names and passwords New schemes may include screen-based biometrics, embedded certificates, hardware tokens, web cookies and PINs These devices are viewed as likely platforms for viruses that can be carried from network to network without detection
  • 15. Access modes - continued Data moving through air is vulnerable to interception using relatively inexpensive equipment The portability of these devices increases the need for physical security and authentication
  • 16. Local government stance on cyber crime Singapore – Very detailed statutes regarding penalties for criminal hacking Brazil – No special laws against cyber crime (and a very active hacking community) The Philippines had no anti-hacking laws until the “Lovebug” virus was traced back to their country Interpol is working to establish international standards for cyber crime legislation http://www.mossbyrett.of.no/info/legal.html
  • 17. Asia/Pacific perspective Factors accelerating adoption of security Growth of e-commerce in this region Government initiatives supporting security Recognition of the need for security guidelines, regulations and products that enable interoperability
  • 18. Asia/Pacific perspective - continued Factors inhibiting the adoption of security Lack of integrated security solutions that can span systems and regions Lack of awareness of security issues and solutions
  • 19. Security is more than technology Process Technology Monitor Respond Anticipate Defend People
  • 20. Security is an attribute, not a component System Management and Security Network & Networking Services Hardware & Operating System App App App App User Interface Application Development Environment Information Management Distribution Services
  • 21. General security approach Develop accurate and complete policies that span the supply chain Make sure that all employees understand the importance of computing security Define clear roles and responsibilities for e-commerce security Perform regular audits, reviews and assessments of security Don’t ignore the physical security of your systems
  • 22. General security approach - continued Implement and maintain a set of baseline controls for your e-commerce system Implement user ID and authentication via strong passwords, secure tokens or biometrics Have backup and recovery plans in place
  • 23. Secure web site development tips Include security as part of requirements gathering Include security as part of the architecture Be careful with embedded components Never trust incoming data Provide help to users Use code reviews Be aware of privacy and encryption laws Stay up-to-date on new risks, threat and vulnerabilities Document your security solution
  • 24. Secure web site development references Recent articles on SecurityPortal: Best Practices for Secure Web Development (parts I and II) Web Security & Commerce (O'Reilly Nutshell) by Simson Garfinkel, Gene Spafford Web Security: A Step-by-Step Reference Guide by Lincoln D. Stein
  • 25. Summary Security is a critical enabler for e-commerce The negative impact of poor security can be substantial Many of the issues and solutions regarding secure international e-commerce are people and process related, not technical Security is a key attribute of a system that must be designed in, not added on later Maintaining a secure web site requires continuous vigilance
  • 26. Bibliography E-Business Security: An Essential Element in the Post-Year 2000 World. Gartner Group Research Report, April 17, 2000. The Net Present Value of Security. AtomicTangerine Special Report, October 11, 2000. International Ecommerce. SecurityPortal cover story, November 5, 2000. Information Security: The E-Commerce Driver. Dataquest Market Analysis, January 10, 2000. E-Business Impact on Security Technology and Practices. Gartner Group Research Note, November 11, 1999. Security Services in the Connected Age: From the basement to the boardroom. Gartner Group Market Analysis, July 4, 2000.
  • 27. Bibliography - Continued Shanghai to Enhance Information Security. http://www. nikkeibp . asiabiztech .com , February 15, 2000. Wireless Security: Locking Down the Wavelengths. Information Security Magazine, October 2000. Do Handhelds Need Virus Protection? PCWorld.com, June 29, 2000. Best Practices for Secure Web Development. http:// securityportal .com/cover/coverstory20001030.html , October 30, 2000. Best Practices for Secure Web Development: Technical Details. http:// securityportal .com/articles/webdev20001103.html , November 10, 2000.