Vous êtes sur la page 1sur 5

Security Issues for the E-Business Economy

RAVI KUMAR (EC 7th Sem,ASCT) SAQUIB ARSHAD (EC 7th Sem,ASCT)
ravi.asctec@gmail.com saquibsecure@gmail.com

Abstract Key words: Network, Hackers,


Viruses, Spam, Trojans, Anti-virus,
With the explosion of the public Firewalls, Security Policies.
Internet and e-commerce or e-business,
private computers, and computer Introduction
networks, the Internet has undoubtedly
E-business is the transformation of an
become the largest public data
organization’s processes to deliver
network, enabling and facilitating both
additional customer value through the
personal and business communications
application of technologies,
worldwide. The volume of traffic
philosophies and computing paradigm
moving over the Internet, as well as
of the new economy.
corporate networks, is expanding
Three primary processes are enhanced
exponentially every day. More and
in e-business:
more communication is taking place
via e-mail; mobile workers,
1. Production processes, which
telecommuters, and branch offices are
include procurement, ordering and
using the Internet to remotely connect
replenishment of stocks; processing of
to their corporate networks; and
payments; electronic links with
commercial transactions completed
suppliers; and production control
over the Internet, via the World Wide
processes, among others.
Web, now account for large portions of
corporate revenue. While the Internet
2. Customer-focused processes,
has transformed and greatly improved
which include promotional and
the way we do business, this vast
marketing efforts, selling over the
network and its associated technologies
Internet, processing of customers’
have opened the door to an increasing
purchase orders and payments, and
number of security threats from which
customer support, among others.
corporations must protect themselves,
if not adequately secured, are
3. Internal management processes,
increasingly vulnerable to damaging
which include employee services,
attacks. Hackers, Viruses, Spam,
training, internal information-sharing,
Trojans, vindictive employees and
video-conferencing, and recruiting.
even human error all represent clear
Electronic applications enhance
and present dangers to networks. And
information flow between production
all computer users, from the most
and sales forces to improve sales force
casual Internet surfers to large
productivity. Workgroup
enterprises, could be affected by
communications and electronic
network security breaches. However,
publishing of internal business
security breaches can often be easily
information are likewise made more
prevented using security tools like
efficient.
Anti-virus packages, Firewalls, and
implementing strong Security Policies.
E-business has undoubtedly become 1. Connection model: connection-
the largest public data network, oriented and connectionless comm
enabling and facilitating both personal unication.
and business communications
worldwide to connect to their corporate 2. Host addressing.
networks; and commercial transactions
completed over the Internet. This vast 3. Message forwarding
network and its associated technologies
have opened the door to an increasing 4. INTENTIONAL ATTACK FOR
number of security threats. There are FUN AND PROFIT
different kinds of threats like Viruses, Hackers or the Man in Middle are one
Trojan Horse Programs, Spam, Social such personnel. This generic and often
Engineering, Data Interception which over-romanticized term applies to
may arise due to physical breakdown, computer enthusiasts who take
operating mistakes, planning mistakes, pleasure in gaining access to other
intentional attack for fun and profit. people’s computers or networks
Own personnel like snoops, leaving their “footprints,” which are
disgruntled staff pose biggest threat to joke applications or messages on
the e-business. computer desktops. Other hackers,
often referred to as “crackers” are more
DIFFERENT TYPES OF malicious, crashing entire computer
THREATS systems, stealing or damaging
confidential data, defacing Web pages,
1.OPERATING MISTAKES and ultimately disrupting business.
As employees focus on their specific
job duties, they often overlook
standard network security rules. For
example, they might choose passwords
that are very simple, such passwords
might be easy to guess or crack.
Employees who transport data via
floppy disks
can unwittingly infect their corporate These Hackers attack a network
networks with viruses they picked up through different types which has been
from computers in copy centers or documented, and they are commonly
libraries. classified in three general categories:
reconnaissance attacks, access attacks,
2. PLANNING MISTAKE and denial of service (DoS) attacks.
a. The absence of security policies
grants access to a second party to use •Reconnaissance attacks are
the restricted areas of network. essentially information gathering
b. Absence of firewall and anti-virus activities by which hackers collect data
packages. that is used to later compromise
networks. Usually, software tools, such
3. PHYSICAL BREAKDOWN as sniffers and scanners, are used to
Error in physical network can cause map out network resources and exploit
breakdown in the following system. potential weaknesses in the targeted
networks, hosts, and applications. For
example, software exists that is
specifically designed to crack
passwords. Such software was created Organizations have an extensive
for network administrators to assist choice of technologies, ranging from
employees who have forgotten their anti-virus software packages to
passwords or to determine the dedicated network security hardware,
passwords of employees who have left such as firewalls and intrusion
the company without telling anyone detection systems, to provide
what their passwords were. Placed in protection for all areas of the network.
the wrong hands, however, this
software can become a very dangerous 1. Anti-virus Packages
weapon. Virus protection software is packaged
with most computers and can counter
•Access attacks are conducted to most virus threats if the software is
exploit vulnerabilities in such network regularly updated and correctly
areas as authentication services and maintained. The virus database is the
File Transfer Protocol (FTP) record held by the anti-virus package
functionality in order to gain entry to that helps it to identify known viruses
e-mail accounts, databases, and other when they attempt to strike.
confidential information.
2. Firewalls
• DoS attacks prevent access to part or A firewall is a hardware or software
all of a computer system. They are solution implemented within the
usually achieved by sending large network infrastructure to enforce an
amounts of jumbled or otherwise organization’s security policies by
unmanageable data to a machine that is restricting access to specific network
connected to a corporate network or resources. The firewall creates a
the Internet, blocking legitimate traffic protective layer between the network
from getting through. Even more and the outside world. In effect, the
malicious is a Distributed Denial of firewall replicates the network at the
Service attack (DDoS) in which the point of entry so that it can receive and
attacker compromises multiple transmit authorized data without
machines or hosts. significant delay.

Types of firewalls
a. Filtering firewalls
Security Tools b. Application level firewall
After the potential sources of threats
and the types of damage that can occur 3. Intrusion Detection
have been identified, putting the proper A network-based intrusion detection
security policies and safeguards in system (IDS) provides around-the-
place becomes much easier. clock network surveillance. An IDS
analyzes packet data streams within a policies that are implemented should
network, searching for unauthorized control who has access to which areas
activity, such as attacks by hackers, of the network and how unauthorized
and enabling users to respond to users are going to be prevented from
security breaches before systems are entering restricted areas. Therefore the
compromised. When unauthorized security policies management function
activity is detected, the IDS can send should be assigned to people who are
alarms to a management console with extremely trustworthy and have the
details of the activity and can often technical competence require. Security
order other systems, such as routers, to policies includes following asserts.
cut off the unauthorized sessions.
1. Identity
4. Encryption Once your policies are set, identity
Encryption technology ensures that methods and technologies must be
messages cannot be intercepted or read employed to help positively
by anyone other than the authorized authenticate and verify users and their
recipient. Encryption is usually access privileges.
deployed to protect data that is
transported over a public network and 2. Passwords
uses advanced mathematical Making sure that certain areas of the
algorithms to “scramble” messages and network are “password protected” only
their attachments Encryption provides accessible by those with particular
the security necessary to sustain the passwords—is the simplest and most
increasingly popular VPN technology. common way to ensure that only those
They are deployed to connect who have permission can enter a
telecommuters, mobile workers, particular part of the network.
branch offices, and business partners to
corporate networks or each other. The golden rules, or policies, for
passwords are:
5. Network Scanning • Change passwords regularly
Network scanners conduct detailed • Make passwords as meaningless as
analyses of networked systems to possible
compile an electronic inventory of the • Never divulge passwords to anyone
assets and detect vulnerabilities that until leaving the company work.
could result in a security compromise.
This technology allows network 3. Access Control
managers to identify and fix security Before a user gains access to the
weaknesses before intruders can network with his password, the
exploit them. network must evaluate if the password
is valid. Access control servers
validate the user’s identity and
Security Policies determine which areas or information
When setting up a network, whether it
the user can access based on stored
is a local area network (LAN), virtual
user profiles.
LAN (VLAN), or wide area network
(WAN), it is important to initially set
4. Digital Certificates
the fundamental security policies.
Digital certificates or public key
Security policies are rules that are
certificates are the electronic
electronically programmed and stored
equivalents of driver’s licenses or
within security equipment to control
passports, and are issued by designated
such areas as access privileges. The
Certificate Authorities (CAs).Digital
certificates are most often used for The Result
identification when establishing secure
tunnels through the Internet, such as in As time goes on, more and more new
virtual private networking (VPN). technology will be developed to further
improve the efficiency of business and
Top Ten Security Tips communications. At the same time,
breakthroughs in technology will
1. Encourage or require provide even greater network security,
employees to choose passwords therefore, greater piece of mind to
that are not obvious. operate in cutting edge business
environments. Provided that
2. Require employees to change enterprises stay on top of this emerging
passwords every 90 days. technology, as well as the latest
security threats and dangers, the
3. Make sure your virus benefits of networks will most
protection subscription is current. certainly outweigh the risks.
4. Educate employees about the
security risks of e-mail Bibliography
attachments.
Web site: http://www.cisco.com
5. Implement a complete and Reference books: - Cisco certified
comprehensive network security network associates by TODD
solution. LAMMLE.
E-Commerce and e-Business by Z.R.
6. Asses your security posture Andam
regularly Network Security by Arun Kahate
7. When an employee leaves a
company, remove that employee’s
network access immediately.
8. Update your Web server
software regularly.
9. Do not run any unnecessary
network services.
10. If you allow people to work
from home, provide a secure,
centrally managed server for
remote traffic.

Vous aimerez peut-être aussi