SENECA COLLEGE, TORONTO | |
As Taught by Prof. Tim Richardson School of Marketing and e-Business, Faculty of Business |
DETAILED OUTLINE©
.
DETAILED OUTLINE, Security Considerations©
4. Security Considerations
In dealing with a matter
as serious as internet security issues it is prudent to issue a "disclaimer",
namely:
It is not intended that
the presentation of these topics will result in the participants learning
everything
they need to know about e-security; - but rather
1. create an awareness of
the business and marketing consequence of these security considerations
2. identify resources they
can access should they need to know a lot more
This section of IEC 719 will be delivered with some key guest speakers, in addition to lectures by the course professor and related reading material.
Security Considerations can be broadly categorized into three main areas (WTGR)
. | Coverage
The subject of security concerns cannot be properly dealt with in this section given time constraints. Originally when IEC 802 was taught in 1999, security concerns was only mentioned in one and a half classes. In IEC 719 (Sept-Dec 2000) we have made security concerns a whole section of one month. Ideally, security concerns could be a complete course by itself but our present IEC curriculum does not allow for this. This section of the course will be delivered in December and due to final exam schedules and Christmas holidays we will only be able to have 3 (possibly 2) in-class sessions to discuss this material. There is more material listed below than we can discuss in class. We will concentrate on the issues at the beginning of this list and leave the topics at the end for your personal reading interest should you have the time. The criteria for choosing the following links and information is not based on creating "e-commerce experts" among the IEC participants but rather giving you a solid introduction to the major topics in this area and allow you to know about the risks and consequences. Most of these links can allow you to read much material further if you develop a strong interest on a particular area (eg. Digital Cryptography) WTGR |
|
|
|
. | . | .
|
Electronic Commerce: Security, Risk Management and Control by Greenstein and Feinman. http://www.mhhe.com/business/accounting/greenstein/ In the 4rth section of IEC 719, this book by Greenstein should be used more extensively than it was in Nov 2000. Ideally this section of the course should utilize the following chapters in Greenstein,
|
E-commerce
Security Textbook
|
Neal
Hannon's book The
Business of the Internet
- Chpt 6 deals with business security issues - strongly recommended reading http://web.bryant.edu/~nhannon /Website/chapter6.html This chapter discusses how computer security gets more complicated when companies start using the Internet for business, and the additional measures business must take to keep to protect their information. Chapter begins with a very good example of how a system was hacked by focusing on the weakest link. The Chapter recounts how "Fortune magazine found a company named WheelGroup, a security company located in San Antonio, Texas. Run by Tony Jennings, a former Air Force captain, WheelGroup also employs former National Security Agency employees. Armed with computers, modems, and phone lines, WheelGroup set its sights on a company identified only as "Corp. XYZ". Its mission was to crack this company's internal computer security system. The WheelGroup began by locating
the company in the public records of InterNIC, the Internet computer registry
service. In doing so, WheelGroup determined all the addresses of company's
computers that were actually connected to the Internet. Several hours later,
the group encountered the company's firewall. The firewall had just been
installed and contained all the latest security features. No break-in
through the firewall occurred. This could be the end of the story if
it were not for a device called a "dialer." A dialer is a program that
automatically dials thousands of numbers looking for phones that are answered
by modems. WheelGroup used such a program and found six computers
that not only answered the call with a modem, but also responded to a common
account name and password for that kind of computer. "
(WheelGroup no longer exists
as an independent company, in April 1998 they were bought out by Cisco
for $124 million)
|
E-commerce
Security Textbook
|
Chapter 5 in Schneider and
Perry's book is titled "Security Threats to Electronic Commerce"
http://www.course.com/downloads/sites/ecommerce/ch05.html Chapter 6 is titled "Implementing
Security for Electronic Commerce"
In Chapter 5 one of the key points noted at the beginning of the chapter is Security Policy and Integrated Security. Various experts agree that the most security situations in e-commerce are vulnerabilities caused by people either not having a sound security policy that sets out procedures, or they have a policy, but do not follow it. The rest of the material in the chapter is organized around three themes
Dan Janal is the author of several books, and much of the content is helpfully available online. One of his books titled Risky Business: Protect Your Business from Being Stalked, Conned or Blackmailed on the Web is particularly helpful to this section. In an online excerpt from this book, Mr. Janal lists 30 practical ways to protect yourself and your organization from online attacks. The list, which you should
read through, is available at
5. If you sell products on the Internet, fight fraud by requiring customers to tell you where they live. Credit card companies call this "address verification" and it can cut your fraud rate down to next-to-nothing! |
The SANS Institute http://www.sans.org
Bethesda, Maryland, USA in their own words "The SANS
(System Administration, Networking, and Security) Institute is a cooperative
research and education organization through which more than 96,000 system
administrators, security professionals, and network administrators share
the lessons they are learning and find solutions for challenges they face.
SANS was founded in 1989."
|
|
What products
does SANS offer people interested in the most contemporary and reliable
internet security information?
SANS offers three different free electronic subscriptions:
|
The ECRC Program is sponsored by the U.S. Department of Defense Joint Electronic Commerce Program Office (JECPO). The Bremerton ECRC is operated by Concurrent Technologies Corporation, EDC of Kitsap County and Olympic College for JECPO |
Electronic Commerce Resource Center
'ECRC'
Bremerton, WA USA The ECRC describes itself as a "clearinghouse and jumpstation for electronic commerce information and resources" |
"The Security Resources page includes resources on a variety of security issues, including document transfers, financial transactions, firewalls, and virus information. The ECRC also offers a free Internet Security Issues seminar" | http://www.becrc.org/security.htm
|
Mr. Sean Rooney, President |
Mr. Rooney is personally
very knowledgable about the "hacker and cracker" side of the security industry
and can provide some "nitty gritty" insights into what vulnerabilities
can exist and why we should be concerned.
Coldstream is a Canadian IT security service company that has many security services, some of which are:
|
Security
Considerations Proper
|
|
Security
Considerations Proper
|
|
Security
Considerations Proper
|
|
Security
and Cryptography
|
Cryptography |
In the on-line version of Chpt 6 of his book, The Business of the Internet Neil Hannon, notes a link to an article about Netscape Communications Corp. white paper that deals with the issue of intranet security and some of its many challenges. "Cryptography Is The Key To Intranet Security Needs" http://www.techweb.com/se/directlink.cgi?CRN19970630S0089 Copyright (c) 1997 CMP Media Inc. "What is cryptography? Cryptography
comprises a family of technologies that include the following:
|
Encryption
Hackers
|
"Why Cryptography Is
Harder Than It Looks" by Bruce Schneier
CTO and Founder, Counterpane Internet Security, Inc.(as cited by Neil Hannon) http://www.counterpane.com/whycrypto.html WTGR notes this is a very
very useful article to read thoroughly. Here is a snapshot of some of the
points made by Schneier
- a very long article explaining Echelon
|
Internal
Threats and Problems |
Joaquim Menezes writing in a May issue of Computing Canada subtitled a May 26th article "Expert Says Ignorance, Internal Threats far more Problematic than Possible External Threats" There are a number of articles we could swamp you with reading in this area but suffice it to say that a good summary of the issues could be quoted from Richard Reiner "A disgruntled employee with
access to corporate passwords can wrought much more damage than a hacker
who has got into a system by exloiting a buffer overflow"
|
||||
Internal
Threats and Problems |
"Investigators Root Out Elusive Internal Security Threats" Geoffrey Downey writing in the May 26th, 2000 isssue of Computing Canada http://www.plesman.com/Archives/cc/2000/May/2611/cc261106a.html Downey's article carries
the theme that companies shouldn't just be concerned about the outside
world when trying to eliminate security threats. Downey quotes extensively
from Scott Loveland, a former RCMP officer who works with other former
Mounties at KPMG's security branch titled
Loveland is quoted by Downey as saying that in terms of real problems in security, "the threat from internal is larger than external in terms of frequency" - meaning, people who are going to cause security problems are most frequently going to be unhappy current employees who have access to the system - which makes it difficult to defend against. Loveland also cautions that sometimes, "some perceived security issues aren't attacks at all...For example, if you have a server that is getting 65,000 hits on the administrator password with failed log-ins, is that a penetration from the outside, ... or is that a misconfigured NT box somewhere in the testing lab?" |
Professional
Security Service Companies |
KPMG Investigation and Security Inc.
part of the large KMPG accounting and consulting group of companies http://www.kpmg.ca/english/services Norman Inkster is the President of KPMG ISI and is best known for being the former Commissioner for the RCMP Many of the large professional
service firms such as KPMG, Price Waterhouse Coopers, Ernst & Young
have publications on their web sites re: e-commerce
|
Wireless Security | - scanned article re: Royal
Bank buying Security First Network Bank
"Royal Bank in Wireless
Security Venture"
Royal Bank formed a company
with Baldhead Systems www.baldhead.com/
Pilieci quotes Jim Connor,
Manager of Electronic Services Technologies for Royal Bank as saying
On Baldhead's web site, they
still have the digital version of the June 2000 press release. You can
read all the points yourself at
This clearly indicates that Royal Bank considered more and more customers will be accessing banking services through mobile devices and they are building capability by buying into a company developing products for this market. |
Why do sites use Cookies?
http://www.cookiecentral.com/faq/#1.3 "There are many reasons a given site would wish to use cookies. These range from the ability to personalize information (like on My Yahoo or Excite), or to help with on-line sales/services (like on Amazon Books or Microsoft), or simply for the purposes of tracking popular links or demographics (like DoubleClick)." Cookies also provide programmers with a quick and convenient means of keeping site content fresh and relevant to the user's interests because the cookie tells them simple information about who has been hitting what part of the page |
some cookie FAQs
http://www.cookiecentral.com/faq/ |
"Many Netizens are concerned, "If I allow a Web 'cookie' to be set, someone can access my hard drive." However, cookies cannot be used to get data or view data off your hard drive. Cookies can only get data from what has been written to the cookie file. Are cookies dangerous to your computer? NO. The cookie is simply a text file saved in your browser's directory or folder. It cannot be used as a virus, and it cannot access your hard drive. MSN and Netscape use cookies to store information so you don't have to remember it (passwords, etc.). If you want to see what information is stored in your cookie file, use a word processor to open a file called cookies.txt or MagicCookie. Don't want to accept cookies? Configure your browser to warn you when one is about to be set or refuse them all. It's your choice." |
The text to the left was quoted from the page http://www.becrc.org/ec/webdev/cookies.html |
Virus
Protection and busines risk Virus
|
"IT's Battleground: The Quest for Virus Protection" is the title of an August 4th, 2000 in Computing Canada www.plesman.com/Archives/cc/2000/Aug/2616/cc261614a.html
In this August 4rth article it is noted that "A recent survey estimated that viruses and other destructive acts will cost large businesses (over 1,000 employees) worldwide $US1.6 trillion this year and result in almost 40,000 person-years of lost productivity ...It's no wonder the anti-virus software market has hit almost $US70 million so far this year [2000]"
From the August 4rth article "Symantec, publisher of the market-leading Norton Anti-Virus, has seen an average of 115 new viruses each month this year, up 30 per cent from 1999." |
National
Government Involvement in internet crime and e-business Security National
|
|
National
Government Involvement in internet crime and e-business Security National
|
The RCMP's
Computer Crime Prevention webpage with sections on
"Emerging Internet-related crimes include piracy, copyright infringement, currency and document counterfeiting, smuggling, hate- and sex-related offences, stalking, extortion, mischief, conspiracy, theft, fraud, and gambling." from an article on the RCMP
web site titled
Maclean's online magazine had a story June 12th, 2000, "Canada's police are only starting to catch up with hackers and other criminals who target online computer users" The article mentions a number of well known internet security situations that have happened and says that "Canada's response has been relatively low-key" www.macleans.ca/pub-doc/2000/06/12/Technology/35694.shtml written by Chris Wood with Brenda Ranswell in Montreal and Robert Scott in Toronto RCMP involvement with e-businesses that have been hit by cyber crime. A recent example (Feb 2000)
is what happened to the HMV website. Basically, it was a denial of service
attack. HMV's site went offline for an hour Feb. 7 after being flooded
with bogus information.
|