Google Answers Logo
View Question
 
Q: e-commerce security ( Answered 4 out of 5 stars,   1 Comment )
Question  
Subject: e-commerce security
Category: Computers > Security
Asked by: bouabidi-ga
List Price: $100.00
Posted: 02 Feb 2004 16:46 PST
Expires: 03 Mar 2004 16:46 PST
Question ID: 302957
how to implement security in e-commerce application?can e-commerce be 100% safe?
Answer  
Subject: Re: e-commerce security
Answered By: easterangel-ga on 02 Feb 2004 19:10 PST
Rated:4 out of 5 stars
 
Hi! Thanks for the question.

I will try to answer your question in a point-by-point manner. I will
also provide small snippets from the articles I will cite but I highly
recommend that you read them in their entirety to get a better grasp
of the topic.

1. How to implement security in e-commerce application?

Overview: 

The following articles provide discussions on how to implement
security among e-commerce applications and environments. Our first
link provides a general overview of the concepts inherent in
e-commerce security.

?Public key infrastructure (PKI) technology uniquely fits the bill for
business to-business transactions, providing robust, bulletproof
security perfectly suited for the environment of electronic business.
In a virtual world where anybody can be anybody, PKI establishes the
essential element of trust ? the foundation for business ? between
buyers and sellers.?

?Another critical issue in B2B security is preventing unauthorized
parties from intercepting messages. There are several basic ways to
minimize eavesdropping and they are often combined in order to reduce
the risk of penetration. One basic step is to establish a secure
communications channel by using one of several protocols that operate
as a layer above the standard Internet TCP protocol. The most popular
of these protocols, secure sockets layer (SSL), provides a range of
security services for communications between a client and server.?

?An alternate approach to ensuring the privacy of communications,
which can be used in place of or in combination with a secure
protocol, involves transmitting a message in a secure form so that it
cannot be opened or read by another party. One of the most popular
approaches is a message format called Secure/Multipurpose Internet
Mail Extensions
(S/MIME)??

?Pretty Good Privacy (PGP) is an alternative to S/MIME. It?s quite
similar in concept to S/MIME but also accommodates digital signatures
and encryption.?

?The Basics of Business-to-Business E-Commerce Security?
http://www.ipnetsolutions.com/download/pdf/wp_security.pdf


-------------------------------------------
After learning the basics and general concepts of e-commerce security,
we will dig into much deeper with the requirements necessary for its
implementation.

One of the first requirements is adopting a security policy.

SECURITY POLICY:

?The primary goals in developing a security policy are to define
organizational expectations for proper system use and define procedure
to prevent, and respond to, security events. Similar to other
organizational policies, the security policy must maintain and
complement the organization?s business objectives. The creation of a
security policy for networked systems is inherently an ongoing and
iterative process due to the dynamic nature of electronic commerce
systems. When new technologies are adopted, an organization?s security
policy and privacy policy must be revisited and oftentimes revised to
respond to the policy conflicts introduced by these new technologies.?

Steps to creating a security policy:

- ?identifying assets centered around software, hardware, people and
documentation;?

- ?evaluating and prioritizing those assets;?

- ?identifying risks and vulnerabilities, including the probabilities of
each;?

- ?defining a policy of acceptable use based on work ethic and culture;?

- ?identifying necessary safeguards, including physical security, au-
dit/logging and incident response;?

- ?creating the plan for a phased approach to introducing the policy;
and communicating policy to users within the organization, as well as
appropriate external individuals such as partners.?

?STRATEGIES FOR DEVELOPING POLICIES AND REQUIREMENTS FOR SECURE
ELECTRONIC COMMERCE SYSTEMS?
http://ecommerce.ncsu.edu/studio/anton+earp.pdf_2.pdf 


--------------------------------
Our next concern will be the technologies involved in e-commerce
security. We have already touched on them on our first resource but
this time we will go into them much deeper.

IDENTITY SECURITY: 

a. SSL:

?In general, SSL uses public key cryptography as its method of communication.
Each communicating host has a public key (available to anyone
interested) and a private key (a non-shared key owned by the host). An
SSL connection involves generating a secret key at connection time for
each host and a public key exchange. By using the Diffie-Hellman or
RSA key exchange algorithms (the two most common), the hosts will not
see each other?s secret keys. For that matter, no passwords are
exchanged and no passwords ever traverse the network. Public key
cryptography is effective because it is virtually impossible to
determine someone?s private key, even if you have the public key.?


b. Real Time Credit Card Authorization:

?Authorizing your customer?s credit card in real time allows you to
verify that the credit card is legitimate and has not been reported
lost or stolen. The authorization can be done with third party
software such as ICVerify (http://www.icverify.com) or Mail Order
Manager (http://dydacomp.com).


c. Address Verification Systems:

?Address Verification Systems (AVS) provide an additional measure of security.
An AVS will cross check the billing address (provided by the
customer). Vendors may decide to decline a transaction based on a
failed check.?

 

d. Card Verification Codes

?Card Verification Codes (CVV2 for Visa, CVVC for MasterCard, and CID for
American Express) is a three or four digit number, independent of the sixteen digit
credit card number.?


e.) Predictive Statistical Model

?A Predictive Statistical Model queries a database (external to your
site) against millions of online sales to come up with a score for a
given transaction. This score quantifies the risk of the transaction.?


f.) Rule-Based Detection

?Rule-Based Detection integrates all of the above into a set of if-then
statements, specific to your organization. The rule set is meant to get better over
time as you become more aware of where the red flags should be. For example,
a business might choose to deny any order greater than $1000.?  

Sample Products: 
FraudShield: www.clearcommerce.com
Equifax ElDverifier: www.equifaxsecure.com


g.) SET

?SET is significant because it allows for payment processing without
the seller ever having to see the customer?s credit card information.
Without SET, a merchant must maintain a database of credit card
numbers on site.?

?Identity Theft and E-Commerce Web Security: A Primer for Small to
Medium sized Businesses?
http://www.giac.org/practical/GSEC/Josh_Sorbel_GSEC.pdf 


-------------------------------------
CONFIGURATION MANAGEMENT:

After the authentication techniques, our next concept for security
will be configuration management.

?Configuration Management is the implementation of a database
(Configuration Management Database - CMDB) that contains details of
the organization's elements that are used in the provision and
management of its IT services. Configuration management is responsible
for the identification, recording, tracking, and reporting of key IT
components or assets called configuration items (CIs).?

?Configurations are the actual arrangement and
functionally-interlocking structures of multiple components of all
hardware and software, regardless of size and location. Without the
definition of all configuration items that are used to provide an
organization's IT services, it can be very difficult to identify which
items are used for which services. This could result in critical
configuration items being stolen, moved or misplaced, affecting the
availability of the services dependant upon them.?


-------------------------
STAFF SECURITY TRAINING and MONITORING:

?Any time an IT candidate is about to be hired, most companies should
do a background check. The price of such checks has dropped
dramatically since the Internet made the practice easy, and a feeling
of assurance about a new employee can be priceless.?

?Although educating employees can result in a definite improvement in
security, it certainly does not hurt to establish some barriers
between workers and data.?

?The solution, Duseja said, might lie in implementation of a layered
security system that puts firewalls at different points and severely
limits data access. Beyond the network level, firewalls can be erected
at the application and desktop levels to give employees only the
access they need.?

?When Employees Are the Enemy - Security from the Inside?
http://www.ecommercetimes.com/perl/story/31238.html 
 

---------------------
Our next 2 links provide some ?good practices? advice on securing
e-commerce applications and systems.

?"MAG 10" STEPS TO A SECURE NETWORK?
http://digitalenterprise.org/security/mag_10.html 

?Security and Encryption?
http://digitalenterprise.org/security/security.html 


------------------------------
2. Can e-commerce be 100% safe?

Just like any man-made technology or object, there is nothing 100%
foolproof. Even homes or a powerful country can be victims to security
breaches. The reasons for such assumptions are the following:

1.) ?Both CERT and @stake recommend vulnerable companies encrypt
network traffic, but even encrypting all network traffic isn't
foolproof protection. While at-risk networks will greatly reduce this
vulnerability's impact through encryption, they warn, sensitive
information leaked from such sources as kernel memory can still be
viewed by prying eyes.?

?Security Firm @stake Says Your Network May Be Leaking Sensitive Data?
http://www.informationweek.com/story/IWK20030107S0003


2.) ?New technologies can improve the quality of life, but they are
not foolproof. The authors point out that computerised
crime-prevention systems are only as reliable as the people who run
them. "Even the tightest security controls may be undermined through
... social engineering or human negligence," they say.?

?Bridging the real and the digital worlds?
http://www.cordis.lu/euroabstracts/en/december03/human01.htm


3.) ?Security incidents were principally generated in the U.S. (81
percent), but the percentage of fraud attempts made from the U.S. was
much lower (48 percent). One reason for the difference is the weak
policing of the Internet outside the U.S., according to Verisign.

"?International criminals can essentially commit fraud with impunity,
given that jurisdiction issues make policing international fraud near
impossible,? the report said.?

?E-commerce Fraud, Security Attacks on the Rise?
http://www.bahamasb2b.com/news/wmview.php?ArtID=2577  


4.) In terms of security flaws, tech enthusiasts wince at the
seemingly simple rules companies fail to comply with properly.

?Top 10 eCommerce flaws?
http://www.nta-monitor.com/news/eflaws-detail.htm 


Search terms used:
e-commerce ecommerce ?e commerce? security implementation foolproof 100% basics
"Configuration management"
security training

I hope these links would help you in your research. Before rating this
answer, please ask for a clarification if you have a question or if
you would need further information.
                 
Thanks for visiting us.                
                 
Regards,                 
Easterangel-ga                 
Google Answers Researcher
bouabidi-ga rated this answer:4 out of 5 stars

Comments  
Subject: Re: e-commerce security
From: wwg-ga on 20 Aug 2004 12:19 PDT
 
Ecommerce transactions occur over publicly accessible (ie, snoopable)
channels and this must be addressed lest customer information (eg,
account numbers, addresses, names, other private data, ...) become
available to the malicious/mendacious. Assorted laws and regulations
have been passed in various places to 'deal' with this problem. Of
course, assorted laws and regulations have been passed to 'deal with'
extortion and kidnapping, much more venerable forms of mendacity, as
well. The malicious may not find such legal threat quite convincing.

In the case of the Internet, it is possible to so increase the level
of difficulty required that the malicious will fail, in practice. This
may be enough. At least in theory. Adequate crypto systems (high
quality algorithms, properly implemented, embedded in crypto systems
using high quality (perhaps even provably secure) cryptographic
protocols, used properly by human users, ...) will work. Note that
there are several contingencies in that sentence; it is in these
details that the Devil lurks. There is much crypto snake oil on the
market, and for most users it is impossible to distinguish between
good cryptosystems and fraudulent cryptosystems. Even without
deliberate fraud, an imperfect implementation of an otherwise
acceptable algorithm or protocol is very likely to be insecure. But,
these are merely engineering problems, if very difficult ones; and
enough attention (ie, money and tained personnel) ought to deal with
them. How one can know they've been dealt with is something else, of
course.

More serious, because harder, are any number of managment problems,
most conncected with the presence of humans somewhere in the loop.
Even if you have the best possible cryptosystem, can you be sure that
its operators have not gotten bored and are taking 'shortcuts', thus
losing all security? Could some person have sufficient gambling debt
to be willing to accept an offer from a representative of Thieves'RUs?
And, is the computer system/network topology you're using sufficiently
well configured that it is not possible for the malicious to acquire
the information you've so carefully protected cryptographically, by
simply copying it from one or more of those computers? With some
operating systems, it is not possible for anyone to have any rational
confidence in the security of their configuration as there have been
for years high numbers of security defects / vulnerabilities
discovered in the operating system, leaving everything on such systems
(however otherwise protected in transit from customer to 'store')
open.

In this context, Bruce Schneier tells the story of some California
house burglars who managed to find a way past the very best (and very
most $) security systems. You know, the kind with a phone connection
to the central office, sensors everywhere, super locks with monster
deadbolts, reinforced door frames, non-duplicatable keys, large
monthly bills, .... In short, the sort of security system we would all
rationally get if the money were available. They simply bypassed it
all -- they used chain saws to go directly through the walls. Neither
doors nor windows, however protected, were an issue.

We humans habitually imagine possible attacks and then try to prevent
them. Or think we're doing something like that. Attacks can be made
from the Internet, so we install a (wonderfully reassuring name!)
firewall. Or viruses might appear on disks, in email, in programs, ...
so we get anti virus software. Truth be told, most folks don't really
understand what's going on in either case, but the marketing machine
(and the commentators) yak on and on and on so it must be the thing to
do... But if someone has decided to use the computer equivalent of a
chainsaw, we're going to be toast.

I think the only answer, and this is not one likely to be welcomed by
those thinking about ecommerce security, is to hire good system
administrators, let them get the tools they think they need, and stay
out of their way, letting them do their jobs. How to decide whether
one has a good one, and whether or not this tool (thousand$?!) is
needed, and whether this scheme will be worthwhile, are other things
altogether. Such folks are not cheap, they want you to do inconvenient
things (eg, shut down this access, don't do that on this machine, no
remote access for that, ...) that may not be easy to understand (or
for some of these folks) to explain, ...

But these kinds of problems are, in other guises, old hat. As a steel
mill manager, are you likely to understand obscure but important
metallurgical stuff? Are you likely to directly understand some arcane
tax provision which your accountant tells you must be observed,
however much a pain? And so on for legal issues, zoning stuff, and
much else. The difference is expectation, I think. These computer
systems are so spiffy, and the marketing folks promise so much, that
it must be possible to do wonderful things, evading all those
unfortunate limitations that we have come to expect in regard to taxes
and legal advice and zoning hassles and ...

Ecommerce security is no exception, I think. There are no magic
answers, anywhere. Just as with accounting advice, or legal advice,
one must do the best one can, knowing that it may not be enough. The
difference is that, if things are so set up as to allow a mistake to
affect 'everything' (a very common design approach in computing) the
consequence of a mistake will be large, and will happen much more
quickly, than with accounting or legal difficulties. Defensive
management is needed, I think, not willing belief in the marketing
claims or one's hidden hope that this computing thing (in this case
ecommerce security) will fix all. Not a very satisfying observation,
but one that has the virtue of tracking reality rather better than do
marketing claims about Wondoware, the solution to everyone's problems,
and easier to use too!

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy