unit 2 web security
unit 2 web security
unit 2 web security
Unit-2
Browser Security
E-Commerce Security
Browser Security
• Web Browsers are the most commonly used Internet application.
• Many applications used today use web browsers as their interface, providing
a consistent and familiar user interface.
• The enormous popularity of the web browser also makes it an ideal target
for malicious individuals who wish to steal our data or interfere with our
everyday activities.
• There are two primary avenues for preventing these threats: adopting
technical solutions that can limit their impact, such as browser security
solutions and web filtering and, educating users to adopt safe browsing
practices.
• Weak Antivirus Software and Other Protections
• Redirects and Pop-up Ads
• Browser Extensions and Plugins
• Communication with DNS Servers
• Saved Passwords and Form Info
• Malicious File Downloads
• Phishing Attacks
• Browser Hijacking
• Cross-Site Scripting (XSS)
• Cookie Theft
Figure 5.2
Dr. Dimple Chawla, Assistant Professor, VSIT-VIPS
What Is Good E-commerce Security?
• Sniffing • Cybervandalism:
• Eavesdropping program that • Intentionally disrupting,
monitors information traveling defacing, destroying Web site
over a network • Data breach
• Insider jobs • When organizations lose
• Poorly designed server and client control over corporate
software information to outsiders
• Social network security • Spam/junk Web sites
• Mobile platform threats • Hacking
• Same risks as any Internet • Hackers vs. crackers
device • Types of hackers: White, black,
• Malware, botnets, grey hats
vishing/smishing • Spoofing
• Encryption
•Transforms data into cipher text readable only by sender
and receiver
•Secures stored information and information transmission
•Provides 4 of 6 key dimensions of e-commerce security:
• Message integrity
• Nonrepudiation
• Authentication
• Confidentiality
•Hash function:
• Mathematical algorithm that produces fixed-length number called
message or hash digest
•Hash digest of message sent to recipient along with
message to verify integrity
•Hash digest and message encrypted with recipient’s
public key
•Entire cipher text then encrypted with recipient’s
private key—creating digital signature—for
authenticity, nonrepudiation
• Figure 5.12
• Firewall
• Hardware or software
• Uses security policy to filter packets
• Two main methods:
• Packet filters
• Application gateways
• Proxy servers (proxies)
• Software servers that handle all communications originating from or being
sent to the Internet
• Figure 5.13
• Anti-virus software:
• Easiest and least expensive way to prevent threats to system integrity
• Requires daily updates
■Risk assessment
■Security policy
■Implementation plan
❖Security organization
❖Access controls
❖Authentication procedures, including biometrics
❖Authorization policies, authorization management
systems
■Security audit