Title: Risks of Insecure Systems
1Unit 6
- Risks of Insecure Systems
2What is risk, in the context of electronic
commerce?
- The possibility of
- _________________________________
- destruction, generation, or use of data or
programs that physically, mentally, or
financially harms another party - _________________________________.
3Consumer Exposures
- Most Commonly Mentioned?
- Least Commonly Incurred?
-
- Impact of Consumer Perceptions?
-
4Consumer Exposures
- Transmitted Data
- _____________________
- Stored Data and Cookies
- Name, Address, Demographic Info, SS Number
- Surveillance of ______________________
- Double Click
- RealNetworks
- __________________________
- Malicious Web Sites
5Commercial Exposures
- Resources
- ________________ Resources
- Email Services
- _______________________
- General Hardware Resources
- ________________ Productivity
- Inappropriate Internet Browsing
- _________________________
6Commercial Exposures
- Information
- _____________________
- CD Universe
- Employee Data
-
- Operational
-
-
7Commercial Exposures
- Revenue
- _____________________________
- Customers and Business Partners
- _____________________________
- Ricochet.net
- Damage Reputations
- RT66
8Sources of Threats and Risk
- Internal
- ______________________ Acts
- Unauthorized Access to Data and Systems
- Abuse of Authorized Privileges
- Financial Fraud
- ______________________ Acts
- ______________ Use of Email and Internet
- Careless Programming or System Design
9Sources of Threats and Risk
- External
- Threats from external sources are growing at a
dramatic rate. -
-
-
-
10Sources of Threats and Risk
- External
- Motivating Factors
-
- CD Universe
- Political Statement
- Federal Government Websites
-
- Denial of Service Attacks
- Harmless Pranks
- University of Georgia
11Electronic Commerce Threats
- Viruses
- Transmitted by Email and Disks without
_________________ - ________________________________
- Perform Acts of Nuisance or Destruction
- Commonly Associated with __________
12Electronic Commerce Threats
- Melissa Virus
- Transmitted by unrequested Email
- Here is that document you asked fordont show
anyone else -) - Released by opening attached Word Document
- Alter Macro Security Settings
- Send duplicate email to the first 50 addresses
located in Outlook address book. - Alter ________________________________
13Electronic Commerce Threats
- Trojan Horses
- Enter under the guise of ________________ Files
or Programs - Received in Email or Downloaded from Malicious
Websites - _________________ Key Strokes
- Peruse Stored Data
- _________________ Sensitive Data without Consent
14Electronic Commerce Threats
- Email Spoofing
- Email sent through the _______ of another user.
- Easily Accomplished
- Hostile Content
- Requests for Private Information
- Result in _____________________________
15Electronic Commerce Threats
- Social Engineering
- Abuse the ____________________ of employees.
- Facilitated by Email or phone messages
- Perpetrator poses as a ____________________
- Requests for passwords or other private
information - Gains unauthorized access to network resources or
applications - American On-Line
16Electronic Commerce Threats
- Denial of Service Attacks
- Render Networks or Servers Useless.
- Targets are flooded by large amounts of
_____________________________________ - Traffic overload shutdown service
- Networks are not _______________________ rather
they are blocked. - Results in lost _________________________
17Electronic Commerce Threats
- Denial of Service Attacks
- Common Methods
- SYN Attacks
- Flooding the Server with connection requests
-
- Flooding the Server with Data
- Facilitated by _________________________
18Electronic Commerce Threats
- Password Cracking
- Susceptible Passwords
-
- Insecurely Transmitted Passwords
- Cookies
-
- EBAY
19Electronic Commerce Threats
- System Manipulation
- CGI Scripts
- Programs that execute commands between web
servers and ___________ business applications - Facilitate _____________________________
- Can be manipulated for malicous purposes
Back-End Systems
WEB Server
CGI Scripts
20Electronic Commerce Threats
- Active Content
- ActiveX, Java Applets, Java Scripts
- Programs embedded in websites that allow users to
________________________________. - ________________ downloaded to the users machine
- ________________element for thriving EC
Applications - Malicious capabilities
21Electronic Commerce Threats
- Malicious Websites
- Seek out sensitive information or files
- Lures visitors with by
-
-
- Exploit _______________ capabilities of WEB.
- Malicious programs are transmitted under the
guise of a legitimate program or transaction. - Man in the Middle Attacks
22Implications for the Accounting Profession -
Intranet Internal Controls
- The accounting firm must know its clients
- exact number of intranets and servers
- the data and processing methods contained on each
intranet - intranets (which ones) contain data and
processing methods within the domain of the audit
engagement - the configuration and inter-networking
infrastructure and - security methods employed and assess them.
23Implications for the Accounting Profession -
Internet Internal Controls
- The accounting firm must know its clients
- exact number of Internet entry points
- location of firewalls and their exact
configuration - location of other security devices and their
exact configurations or procedures - the network configuration of any internal systems
that are linked to gateway servers and - data access methods for data linked to gateway
servers.
24Electronic Commerce Threats
- Old-Fashion Fraud
-
- Pyramid Schemes, Fraudulent Products, Risk-Free
Investment Schemes - Difficult to Limit
-
-
-
25Cookies
- Cookies were originally designed with good
intentions - to allow a server computer to
offload some of the data storing duties to the
client computer. - Many firms, however, have used this device for
marketing data gathering and to track users
visits.
26Web Site in Marketing Firms Network Visited
(Host)
Marketing Firms
Initial Visit
Initial Visit
visit a site
Load web page with a tag linked to a
marketing firms site and assign a cookie ID
for own web site
Mega Database profiling web surfers visiting
all networked web sites
Linked established from tag loaded by web site
visited
Cookie assigned specifically targeted advertisem
ents appear on web site being visited
cookie.txt
User Surfing the Web (Client)
27Step 1 SYN messages
Receiver (Target of Attack)
Sender
Ports are half-open memory buffers are filled
Step 2 SYN/ACK
Meanwhile, ports become clogged and memory
buffers fill up
Step 3 ACK packet code should be sent, but is
intentionally not