中央大學。范錚強 1 security issues and e-payment 中央大學. 資訊管理系 范錚強...
Post on 21-Dec-2015
241 views
TRANSCRIPT
中央大學。范錚強 1
Security Issues and e-Payment
中央大學 . 資訊管理系范錚強
mailto: [email protected]://www.mgt.ncu.edu.tw/~ckfarn
2007.05
11/12
中央大學。范錚強 3
Security Is Everyone’s Business
The DHS (Department of Homeland Security) strategy includes five national priorities:
A national cyberspace security response system
A national cyberspace security threat and vulnerability reduction program
A national cyberspace security awareness and training program
Securing governments’ cyberspace
National security and international security cooperation
中央大學。范錚強 4
安全威脅有多大?
2002 年電腦犯罪及安全調查來源: Computer Secrity Institute (CSI), Computer Crime and Security Survey 200
2
90% 電腦受過各種安全破壞40% 偵測到系統外部入侵 (2000 年為 25%)
85% 電腦偵測到病毒
環境惡劣,你如何自保?公司資產如何保障?
中央大學。范錚強 5
Security Is Everyone’s Business
Accomplishing these priorities requires concerted effort at five levels:
Level 1—The Home User/Small Business
Level 2—Large Enterprises
Level 3—Critical Sectors/Infrastructure
Level 4—National Issues and Vulnerabilities
Level 5—Global
中央大學。范錚強 6
What kinds of security questions arise?
From the user’s perspective:How can the user be sure that the Web server is owned and operated by a legitimate company?
How does the user know that the Web page and form do not contain some malicious or dangerous code or content?
How does the user know that the owner of the Web site will not distribute the information the user provides to some other party?
中央大學。范錚強 7
What kinds of security questions arise?
From the company’s perspective:How does the company know the user will not attempt to break into the Web server or alter the pages and content at the site?How does the company know that the user will not try to disrupt the server so that it is not available to others?
中央大學。范錚強 8
What kinds of security questions arise?
From both parties’ perspectives:How do both parties know that the network connection is free from eavesdropping by a third party “listening” on the line?
How do they know that the information sent back-and-forth between the server and the user’s browser has not been altered?
中央大學。范錚強 9
Basic Security Issues
Authentication 身份確認The process by which one entity verifies that another entity is who he, she, or it claims to be
Authorization 充分授權The process that ensures that a person has the right to access certain resources
Auditing 稽核軌跡The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions
中央大學。范錚強 13
Types of Threats and Attacks
nontechnical attackAn attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network
中央大學。范錚強 14
Nontechnical Attacks: Social Engineering
A type of nontechnical attack that uses social pressures to trick computer users into compromising computer networks to which those individuals have access
向屬下要帳號密碼A multiprong approach should be used to combat social engineering
Education and trainingPolicies and proceduresPenetration testing
中央大學。范錚強 15
technical attack
An attack perpetrated using software and systems knowledge or expertisecommon (security) vulnerabilities and exposures (CVEs)
Publicly known computer security risks, which are collected, listed, and shared by a board of security-related organizations (cve.mitre.org)National Infrastructure Protection Center (NIPC)A joint partnership under the auspices of the FBI between governmental and private industry; designed to prevent and protect the nation’s infrastructure
中央大學。范錚強 16
Types of Threats and Attacks
denial-of-service (DoS) attackAn attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources
distributed denial-ofservice (DDoS) attackA denial-of-service attack in which the attacker gains illegal administrative access to as many computers on the Internet as possible and uses the multiple computers to send a flood of data packets to the target computer
中央大學。范錚強 17
Types of Threats and Attacks
MalwareA generic term for malicious software
VirusA piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it requires that its host program be run to activate it
wormA software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine
中央大學。范錚強 18
Common mistakes in managing security risks:
Undervalued information
Narrowly defined security boundaries
Reactive security management
Dated security management processes
Lack of communication about security responsibilities
中央大學。范錚強 19
Security Risk Management
A systematic process for determining the likelihood of various security attacks and for identifying the actions needed to prevent or mitigate those attacks
Security risk management consists of three phases:Asset identificationRisk assessmentImplementation
中央大學。范錚強 20
Securing EC Communications
access controlMechanism that determines who can legitimately use a network resource
passive tokensStorage devices (e.g., magnetic strips) that contain a secret code used in a two-factor authentication system
active tokensSmall, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system
中央大學。范錚強 21
Securing EC Communications
biometric systemsAuthentication systems that identify a person by measurement of a biological characteristic, such as fingerprints, iris (eye) patterns, facial features, or voice
physiological biometricsMeasurements derived directly from different parts of the body (e.g., fingerprint, iris, hand, facial characteristics)
fingerprint scanning 指紋掃瞄iris scanning 視網膜掃瞄
behavioral biometricsMeasurements derived from various actions and indirectly from various body parts (e.g., voice scans or keystroke monitoring)
中央大學。范錚強 22
Securing EC Communications
public key infrastructure (PKI)A scheme for securing e-payments using public key encryption and various technical components
encryptionThe process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it
plaintextAn unencrypted message in human-readable form
中央大學。范錚強 23
Securing EC Communications
ciphertextA plaintext message after it has been encrypted into a machine-readable form
encryption algorithmThe mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa
keyThe secret code used to encrypt and decrypt a message
中央大學。范錚強 24
Securing EC Communications
symmetric (private) key systemAn encryption system that uses the same key to encrypt and decrypt the message
Data Encryption Standard (DES)The standard symmetric encryption algorithm supported the NIST and used by U.S. government agencies until October 2, 2000
中央大學。范錚強 26
Public (Asymmetric) Key Encryption
public key encryptionMethod of encryption that uses a pair of matched keys—a public key to encrypt a message and a private key to decrypt it, or vice versa
public keyEncryption code that is publicly available to anyone
中央大學。范錚強 27
Digital Signatures
digital signatureAn identifying code that can be used to authenticate the identity of the sender of a document
hashA mathematical computation that is applied to a message, using a private key, to encrypt the message
message digestA summary of a message, converted into a string of digits, after the hash has been applied
digital envelopeThe combination of the encrypted original message and the digital signature, using the recipient’s public key
中央大學。范錚強 28
非對稱金鑰
又稱 RSA 加密由 R/S/A 三位學者發明,由數學方式產生一對不相同的金鑰兩者之間無法經由任何數學運算獲得,必須同時產生其中之一由私人保存,另一個則公開經由私鑰加密者,只能由公鑰解密,反過來也一樣
中央大學。范錚強 31
PKI/CA
PKI – Public Key Infrastructure公開金鑰架構利用非對稱金鑰來進行的加解密機制
CA – Certificate Authority憑證中心:公鑰憑證發行單位需要有公信力有層級性的發行單位
中央大學。范錚強 32
事前向有公信力的憑證機構註冊,由其簽發公鑰憑證。
發證者名稱有效日期持有人姓名持有人公鑰
CA 簽章
公開供鑑別簽署者身分
范錚強
X509
XXXX 契約
電子文件
110111001數位簽章
( 類似印鑑登記 )
公鑰憑證
一對一配對關係
簽章私鑰 簽章公鑰
非對稱金鑰的發行
中央大學。范錚強 33
憑證中心
申請電子印鑑
電子證書
提供服務的企業
其他企業顧客
核發
0101010101
附上電子簽章
接受各界查詢並確認電子印鑑使用者的身分
電子文件
電子文件
0101010101
向認證中心查證電子印鑑之真偽
線上申請
線上處理
范錚強
15
網際服務網─提供線上申辦服務
1 2
3
4
5
電子認證
范錚強
范錚強
中央大學。范錚強 34
Secure Socket Layer (SSL)
Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality
在用戶不知覺的情況之下,交換資料的電腦間交換非對稱金鑰
Transport Layer Security (TLS)
As of 1996, another name for the SSL protocol
中央大學。范錚強 35
Securing EC Networks
firewallA network node consisting of both hardware and software that isolates a private network from a public network
application-level proxyA firewall that permits requests for Web pages to move from the public Internet to the private network
bastion gatewayA special hardware server that utilizes application-level proxy software to limit the types of requests that can be passed to an organization’s internal networks from the public Internet
proxiesSpecial software programs that run on the gateway server and pass repackaged packets from one network to the other
中央大學。范錚強 37
Securing EC Networks
demilitarized zone (DMZ)Network area that sits between an organization’s internal network and an external network (Internet), providing physical isolation between the two networks that is controlled by rules enforced by a firewall.
personal firewallA network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card.
中央大學。范錚強 39
virtual private network (VPN)
A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network
protocol tunnelingMethod used to ensure confidentiality and integrity of data transmitted over the Internet, by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address
中央大學。范錚強 40
資訊安全的威脅
惡意 非人為、無意硬體破壞 竊盜、搗毀 自然災害、儲存媒體
損毀
資料破壞 資料竄改、資料增刪、系統性更動資料
程式師無能、不小心、遺漏
資料外洩 資料複製、網路截取、詐騙
不小心
網路入侵 竊取資料、破壞、將受侵電腦作為犯罪工具
──
資料安全不只是 MIS 的事!
中央大學。范錚強 41
安全的基本基本觀念
安全不是絕對的安全和易用性的兩難
安全是有價的你願意付出什麼樣的代價?你的安全風險 exposure 有多高?
資訊安全有技術面和人性面破壞安全者,都是「人」
主要是內部的人人性!!
中央大學。范錚強 46
企業環境
法律環境
保險
安全方案
國際標準
企業體
流程管制
人事管制
文件管制
使用者管制復原計畫
安全政策
應用軟體
輸入輸出管制
程式管制
稽核軌跡
進出管控
隔離
操作管制
安全的「洋蔥」
硬體資料
通訊管制
中央大學。范錚強 49
BS7799 的安全十大項目
安全政策:提供管理面的指導性原則安全組織資產分類與管理
依風險和損害對資產採取分級分類人事管制
減少人為錯誤、偷竊、欺詐或濫用設施的風險 實體和環境安全
中央大學。范錚強 51
安全管理重點
Process life cycle control全程的管理和安全確保,而非侷限於技術面
SOP做你說你要做的事,但你要做什麼?為何?
Check and balance權責分離、制衡
Recovery萬一出事,如何處理?
中央大學。范錚強 54
押匯 letter of credit (LC)
交易履約保證機制A written agreement by a bank to pay the seller, on account of the buyer, a sum of money upon presentation of certain documents
PlayersBuyer
Buyer’s bank
Seller
Seller’s bank
中央大學。范錚強 56
1 ATM 跨行提款服務
2 ATM24 小時服務
3 ATM 跨行轉帳服務
4
5 金融 EDI 跨行付款
9 金融 XML 支付款 /融資系統
ATM Process
Financial EDI System
Interactive Financial Exchange 8 行動銀行
Network Banking
6 網路銀行
無人銀行、電話銀行
7 PC Banking
電子化金融作業
中央大學。范錚強 58
金流和融資
企業營運的命脈資金
支付的小問題、融資的大問題在無法改善 cash-to-cash 的條件之下,如何取得資金CCC: Cash-to-cash cycle = 應收帳款 + 存貨 - 應付帳款天數
全球佈局下的思考方向供應商如何取得融資?銀行如何降低融資風險?
創新的金融工具可能性訂單融資、出貨融資、應收帳款融資、應收帳款轉移
中央大學。范錚強 62
台灣支票的特性
期票:非即期支票例:三個月期票可以「貼現」
支付 + 融資並非簡單的支付電子化則必須配合融資的項目進行
電子支票必須解決融資問題才能有效中央銀行推動: 可以「背書轉讓」
成果有限、易用性不高應收帳款融資
Factoring傳統上有極高的手續費(折現利率)
中央大學。范錚強 65
C 計畫中的 eFinancing
中心廠 供應商1. Order
以交易為基礎的融資
銀行
4. OrderInfo
2.LoanRequest
3. OrderInquiry
5. Loan6. Payment
7. BalancePayment
中央大學。范錚強 66
eFinancing 和風險能見度
利率
風險
缺乏能見度,只能從歷史資料判斷風險。利率與實質風險無關
具交易能見度,能動態判斷風險。利率與風險掛勾
高風險:排拒
低風險:誘因
中央大學。范錚強 72
The Payment Revolution
Crucial FactorsIndependence
Interoperability and portability
Security
Anonymity
Divisibility
Ease of use
Transaction fees
Regulations
中央大學。范錚強 74
Using Payments Cards Online
payment cardElectronic card that contains information that can be used for payment purposes
Three forms of payment cards:Credit cards
VISA, MasterCard
Charge cardsAmerican Express
Debit cardsATM cards
中央大學。范錚強 75
Processing Credit Cards Online
authorizationDetermines whether a buyer’s card is active and whether the customer has sufficient funds
settlementTransferring money from the buyer’s to the merchant’s account
payment service provider (PSP)A third-party service connecting a merchant’s EC systems to the appropriate acquirers. PSPs must be registered with the various card associations they support
中央大學。范錚強 76
Using Payments Cards Online
Key participants in processing credit card payments online include the following:
Acquiring bank
Credit card association
Customer
Issuing bank
Merchant
Payment processing service
Processor
中央大學。范錚強 77
Smart Cards
An electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card
悠遊卡、 iCash
中央大學。范錚強 79
Types of Smart Cards
contact cardA smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip
contactless (proximity) cardA smart card with an embedded antenna, by means of which data and applications are passed to and from a card reader unit or other device without contact between the card and the card reader
中央大學。范錚強 80
Applications of Smart Cards
stored-value cardA card that has monetary value loaded onto it and that is usually rechargeable
Retail Purchasese-purse
Smart card application that loads money from a card holder’s bank account onto the smart card’s chip
Common Electronic Purse Specification (CEPS)Standards governing the operation and interoperability of e-purse offerings
中央大學。范錚強 81
Applications of Smart Cards
交通費To eliminate the inconvenience of multiple types of tickets used in public transportation, most major transit operators in the United States are implementing smart card fare-ticketing systems
小額支付:電子錢包身份辨識
Because they have the capability to store personal information, including pictures, biometric identifiers, digital signatures, and private security keys, smart cards are being used in a variety of identification, access control, and authentication applications
中央大學。范錚強 82
E-Micropayments
Small online payments, typically under US $10台灣便利商店平均每單低於 100元
用信用卡、金融卡,需支付手續費手續費比例過高
Companies with e-micropayment products:BitPass (bitpass.com)Paystone (paystone.com)PayLoadz (payloadz.com)Peppercoin (peppercoin.com)
中央大學。范錚強 85
Electronic Bill Presentment and Payment
electronic bill presentment and payment (EBPP)
Presenting and enabling payment of a bill online. Usually refers to a B2C transaction
中央大學。范錚強 87
Types of E-Billing
Online banking
Biller direct
Bill consolidator
可能應用:台電帳單全台 600 萬戶
請估算帳單成本、收費成本
中央大學。范錚強 88
Advantages of E-Billing
Reduction in expenses related to billing and processing payments
Electronic advertising inserts can be customized to the individual customer
Reduces customer’s expenses
中央大學。范錚強 91
Current B2B Payment Practices
Financial supply chains of most companies are characterized by inefficiencies created by a number of factors, including:
The time required to create, transfer, and process paper documentationThe cost and errors associated with manual creation and reconciliation of documentationThe lack of transparency in inventory and cash positions when goods are in the supply chainDisputes arising from inaccurate or missing dataFragmented point solutions that do not address the complete end-to-end processes of the trade cycle