1. Find out about SET and the use of RSA 128-bit encryption for e-commerce.
The SET ENCRYPTION PASSWORD states that the default password and hint will be used for encryption and decryption. The password is not related to authentication but to the actual encryption and decryption process.
RSA is an algorithm for public key cryptography. It involves public key and a private key. Messages can be encrypted using the public key and can only be decrypted using the private key.
2. What can you find out about network and host-based intrusion detection systems?
Network-based intrusion detection systems use raw network packets as the data source. It monitors and analyzes all traffic in real-time as it travels through the network. It uses the following 4 techniques to recognise an attack.
i. Pattern, expression or bytecode matching,
ii. Frequency or threshold crossing
iii.Correlation of lesser events
iv. Statistical anomaly detection
Host-based intrusion detection systems work best in simple environments. It relies on auditing logs for suspicious activities.
3. What is 'phishing'?
Phishing is the process of attempting to acquire sensitive information like usernames, password, credit card details, etc by pretending to be trustworthy entity in an electronic communication like email.
4. What is SET and how does it compare with SSL as a platform for secure electronic transaction? Is SET in common use?
As described previously, SET is related to the enecryption and decryption process.
SSL is the standard security technology for establishing an encrypted link between a web server and a browser. This ensures all data passed between the client and the server is authenticated. To create a SSL connection, the web server needs to have a SSL certificate. This needs to be obtained from a Certification Authority who validates all the server's details before issuing the certificate. The web server will match the SSL certificate to the private key.
SET is not commonly used. SSL is the industry standard and is widely used.
5. What are cookies and how are they used to improve security? Can the cookies be a security risk?
A cookie is a small text file (less than 4KB) that is sent by the web server and stored in the client's computer. The cookie can contain information that can be later used by the server for client identification. Cookies contain attributes to determine which host names, URI path can access the cookie and may also contain a expiry date.
Cookies give the impression of a session and can be used by the server to check if the client is validated or not. Cookies can also contain access control information after a user is validated. This reduces the server resources by not needing to validate the client each time the request is sent.
However, this also leads to a security issue. For example, an eavesdropper armed with a packet sniffer could simply inercept the cookie as it passes from the browser to the server using it to obtain free access to the site.
That's why, cookies should contain as little private information as possible.
6. What makes a firewall a good security investment? Accessing the internet, find two or three firewall vendors. Do they provide hardware, software or both.
A firewall is a part of computer system or network that is designed to authorize each request to the server. It is a device or a set devices configured to permit or deny requests based on rules and other criteria. This makes it a good investment since it can be used to authorize clients.
Firewalls can be implemented in either hardware or software or both.
7. What measures should e-commerce provide to create trust among their potential customers? What measures can be verified by the customer?
E-commerce websites should be created such that the potential customer is aware that it is secure to pass on credit card details and other personal details and should be made aware of any privacy statements. The following are some other measures that can be verified by the customer.
i. All transactions from the site should be secure - that is, use https and not http.
ii. A session should time-out after a definite time interval. (system)
iii. Customer should be always aware about the amount they are paying.
iv. Customer should have the option to update orders before it is completed.
v. Custome should be made aware where the payment is going and should receive necessary information regarding the purchase.
8. Get the latest PGP information from http://en.wikipedia.org/wiki/Pretty_Good_privacy.
The use of digital certificates and passports are just two examples of many tools for validating legitimate users and avoiding consequences such as identity theft. What others exist?
i. SSL is used to authenticate users on the web.
ii. Firewall is used to authorize users before giving them access to any resource.
iii. Anti-virus programs exist to identify and eliminate viruses and malware.
References:
http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic=/db2/rbafzmstsetep.htm
http://en.wikipedia.org/wiki/RSA
http://documents.iss.net/whitepapers/nvh_ids.pdf
http://en.wikipedia.org/wiki/Phishing
http://info.ssl.com/article.aspx?id=10241
http://www.w3.org/Security/Faq/wwwsf2.html
http://en.wikipedia.org/wiki/Firewall_%28computing%29
The SET ENCRYPTION PASSWORD states that the default password and hint will be used for encryption and decryption. The password is not related to authentication but to the actual encryption and decryption process.
RSA is an algorithm for public key cryptography. It involves public key and a private key. Messages can be encrypted using the public key and can only be decrypted using the private key.
2. What can you find out about network and host-based intrusion detection systems?
Network-based intrusion detection systems use raw network packets as the data source. It monitors and analyzes all traffic in real-time as it travels through the network. It uses the following 4 techniques to recognise an attack.
i. Pattern, expression or bytecode matching,
ii. Frequency or threshold crossing
iii.Correlation of lesser events
iv. Statistical anomaly detection
Host-based intrusion detection systems work best in simple environments. It relies on auditing logs for suspicious activities.
3. What is 'phishing'?
Phishing is the process of attempting to acquire sensitive information like usernames, password, credit card details, etc by pretending to be trustworthy entity in an electronic communication like email.
4. What is SET and how does it compare with SSL as a platform for secure electronic transaction? Is SET in common use?
As described previously, SET is related to the enecryption and decryption process.
SSL is the standard security technology for establishing an encrypted link between a web server and a browser. This ensures all data passed between the client and the server is authenticated. To create a SSL connection, the web server needs to have a SSL certificate. This needs to be obtained from a Certification Authority who validates all the server's details before issuing the certificate. The web server will match the SSL certificate to the private key.
SET is not commonly used. SSL is the industry standard and is widely used.
5. What are cookies and how are they used to improve security? Can the cookies be a security risk?
A cookie is a small text file (less than 4KB) that is sent by the web server and stored in the client's computer. The cookie can contain information that can be later used by the server for client identification. Cookies contain attributes to determine which host names, URI path can access the cookie and may also contain a expiry date.
Cookies give the impression of a session and can be used by the server to check if the client is validated or not. Cookies can also contain access control information after a user is validated. This reduces the server resources by not needing to validate the client each time the request is sent.
However, this also leads to a security issue. For example, an eavesdropper armed with a packet sniffer could simply inercept the cookie as it passes from the browser to the server using it to obtain free access to the site.
That's why, cookies should contain as little private information as possible.
6. What makes a firewall a good security investment? Accessing the internet, find two or three firewall vendors. Do they provide hardware, software or both.
A firewall is a part of computer system or network that is designed to authorize each request to the server. It is a device or a set devices configured to permit or deny requests based on rules and other criteria. This makes it a good investment since it can be used to authorize clients.
Firewalls can be implemented in either hardware or software or both.
7. What measures should e-commerce provide to create trust among their potential customers? What measures can be verified by the customer?
E-commerce websites should be created such that the potential customer is aware that it is secure to pass on credit card details and other personal details and should be made aware of any privacy statements. The following are some other measures that can be verified by the customer.
i. All transactions from the site should be secure - that is, use https and not http.
ii. A session should time-out after a definite time interval. (system)
iii. Customer should be always aware about the amount they are paying.
iv. Customer should have the option to update orders before it is completed.
v. Custome should be made aware where the payment is going and should receive necessary information regarding the purchase.
8. Get the latest PGP information from http://en.wikipedia.org/wiki/Pretty_Good_privacy.
The use of digital certificates and passports are just two examples of many tools for validating legitimate users and avoiding consequences such as identity theft. What others exist?
i. SSL is used to authenticate users on the web.
ii. Firewall is used to authorize users before giving them access to any resource.
iii. Anti-virus programs exist to identify and eliminate viruses and malware.
References:
http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic=/db2/rbafzmstsetep.htm
http://en.wikipedia.org/wiki/RSA
http://documents.iss.net/whitepapers/nvh_ids.pdf
http://en.wikipedia.org/wiki/Phishing
http://info.ssl.com/article.aspx?id=10241
http://www.w3.org/Security/Faq/wwwsf2.html
http://en.wikipedia.org/wiki/Firewall_%28computing%29
No comments:
Post a Comment