Vous êtes sur la page 1sur 37

Secure E-Commerce

Architecture
Hassan Khawaja
201211275
Secure E-Commerce Course

E-commerce Process
Architecture & The Nine components
1)
2)
3)
4)
5)
6)
7)
8)
9)

Access control and security


Profiling and personalizing
Search management
Content management
Catalog management
Payment
Workflow management
Event notification
Collaboration and training

Security in E-commerce
E-commerce Security is a part
of the Information Security
framework and is specifically
applied to the components that
affect e-commerce that include
Computer Security, Data
security and other wider realms
of the Information Security
framework.
So each information & system
is given certain priority (high,
medium, low) just as in
Information Assurance.

Challenges In Security

Internet was never designed with security in mind.

Many companies fail to take adequate measures to protect


their internal systems from attacks.

Security precautions are expensive {firewalls, secure web


servers, encryption mechanisms}.

Security is difficult to achieve.

Introduction
Two Major Developments During the Past Decade:
1.Widespread Computerization
2.Growing Networking and Internetworking

The Internet

Need for Automated Tools for Protecting Files and Other


Information.
Network and Internetwork Security refer to measures
needed to protect data during its transmission from one
computer to another in a network or from one network to
another in an internetwork.

Introduction (Continued)
Network security is complex. Some reasons are:
Requirements for security services are:
x
x
x

Confidentiality
Authentication
Integrity

Key Management is difficult


Creation, Distribution, and Protection of Key
information calls for the need for secure services.

Security Threats
1)
2)
3)
4)

Unauthorized access
Loss of message confidentiality or integrity
User Identification
Access Control

Players:
User community
Network Administration
Introducers/Hackers
The bigger the system, the safer it is
MVS mainframe users (5%)
UNIX users (25%)
Desktop users (50%)

Introduction to
Security Risk

Hackers and crackers

The
Internet:
open

virus

$$

Your network:
data!

Main Security Risks


1)

Data being stolen


x Electronic mail can be intercepted and read
x Customers credit card numbers may be read

2)

Login/password and other access information stolen

3)

Operating system shutdown

4)

File system corruption

5)

User login information can be captured

Virus
1)

Unauthorized software being run


x Games

2)

Widely distributed software


x Shareware

x Freeware
x Distributed software

Security Strategies
Use a separate host
Permanently connected to the Internet, not to your
network.
Users dial in to a separate host and get onto the
Internet through it.
Passwords
Most important protection
Should be at least eight characters long
Use a mixture of alpha and numeric
Should not be able to be found in dictionary
should not be associated with you!
Change regularly

Security Strategies (Continued)


Every transaction generates record in a security log file
Might slow traffic and host computer
Keeps a permanent record on how your machine

is accessed
Tracks
Generates alarms when someone attempts to

access secure area


Separate the directories that anonymous users
can access
Enforce user account logon for internal users
Read web server logs regularly

Cryptography
The Science of Secret writing.

Encryption:

Data is transformed into unreadable form.

Decryption:

Transforming the encrypted data back into


its original form.
Encryption

Plaintext

Ciphertext
Decryption

Types of Cipher
1) Transposition
2) Substitution

Cryptography (Continued)
Types of Cipher
Transposition:
Transposition of the letters "GOOD DOG" can result in
"DGOGDOO".

Substitution:
For example "GOOD DOG" can be encrypted as "PLLX
XLP" where "L" substitutes for "O", "P" for "G", and "X" for
"D" in the message.
These simple ciphers and examples are easy to crack,
even without plaintext-ciphertext pairs.
More cryptography system has been developed to secure
these encryption in a modernized way such as DES, RSA,
etc,.. Which are efficient for encryption and decryption.

Cryptography (Continued)
PKI ( Public Key Infrastructure):
We need to provide some form of key administration to act as
an authority and guarantee the identity of each party. We need
to develop an authority that can manage the public and private
keys. Such an authority certifies the identity of the user by
actually requiring some physical proof of identity such as a
driver's license, passport, etc. This certificate authority (CA)
will then distribute the private key to the key owner and
manage the public key.
Philip Zimmermann created PGP (Pretty Good Privacy). In
a classic PGP-based PKI, each user issues and manages
his or her own digital certificates of authority. The use of
PGP is growing, as it is an excellent security structure for
use with fully distributed networks based on peer-to-peer
networking

Cryptography (Continued)
PKI ( Public Key Infrastructure) Handshake

Cryptography (Continued)
SSL ( Secure Socket Layer):
Transport Layer Security (TLS) and its predecessor,
Secure Sockets Layer (SSL), are cryptographic protocols
which are designed to provide communication security
over the Internet. They use certificates and hence
asymmetric cryptography to assure the counterparty
whom they are talking with, and to exchange a symmetric
key.
This session key is then used to encrypt data flowing between
the parties. This allows for data/message confidentiality, and
message authentication codes for message integrity and as a
by-product message authentication.
Several versions of the protocols are in widespread use in
applications such as web browsing, electronic mail, Internet
faxing, instant messaging and voice-over-IP (VoIP). An
important property in this context is forward secrecy, so the
short term session key cannot be derived from the long term
asymmetric secret key.

Cryptography (Continued)
SSL ( Secure Socket Layer) Handshake

Components In E-commerce
Network Architecture

CLIENT

WEB SERVER

APPLICATION
SERVER

FIREWALLS

DATABASE

LOAD
BALANCER

Client
A client can be an application, which uses a Graphical
User Interface (GUI) that sends request to a server for
certain services.

e.g (Personal Computer, Web Browser, Mobile, etc.,.)

Web Server
Main job of a Web server computer is to respond to requests
from Web client or client computers.
Three main elements of a Web server
1) Hardware
2) Operating system software
3) Web server software
Hardware
1) Web server computers
More memory, larger hard disk drives, and faster
processors than typical PCs
2) Blade servers
Placing small server computers on a single computer
board, then installing boards into a rack mounted frame
3) Virtual server (virtual host)
Maintains more than one server on one machine
Popular Operating Systems
Linux
Windows
Etc.,.

Web Server (Continued)


Popular Web Server Softwares
Apache HTTP Server
Microsoft Internet Information Server (IIS)
Sun Java System Web Server (JSWS)
Netcraft
Etc.,.

Application Server
The application server is the foundation for all other
applications the business will be running in its ecommerce site.
An application server is defined as a middleware server
program that allows front-end, browser-based clients to
retrieve data from back-end databases and legacy systems
such as large server computers or mainframes.
Oftentimes, an application server is combined with a Web
server, which makes retrieved data readable by client
browsers, to serve as the middle tier in a 3-tier application
structure. However, in large e-commerce operations where
load balancing is a concern, an n-tier or multiple tier
application may be distributed across a handful of application
servers and several separate Web servers.

Firewalls
A firewall is a barrier placed between the private network and
the outside world.
All incoming and outgoing traffic must pass through it.
Can be used to separate address domains.
Control network traffic.
Cost: ranges from no-cost (available on the Internet) to $
100,000 hardware/software system.
Types:
1) Router-Based
2) Host Based
3) Circuit Gateway

Firewalls (Continued)
Types:
1. Router-Based
Use programmable routers Control traffic based on IP
addresses or port information.
Examples:
Bastion Configuration
Diode Configuration
To improve security:
Never allow in-band programming via Telnet to a firewall
router.
Firewall routers should never advertise their presence to
outside users.

Firewalls (Continued)
2. Host Based

Use a computer instead of router.


More flexible (ability to log all activities)
Works at application level
Use specialized software applications and service
proxies.
Need specialized programs, only important services
will be supported.
Example: Proxies and Host-Based Firewalls

Firewalls (Continued)
3. Circuit Gateway

Database
A database is a data structure that stores organized
information.
Nearly all e-commerce sites uses databases to store
product inventory and customer information. These sites
use a database management system (or DBMS),
Some example of DBMS are:
MySQL
Microsoft SQL Server
Oracle
IBM DB2
Such DBMS serve as the "back end" to the website. By
storing website data in a database, the data can be easily
searched, sorted, and updated. This flexibility is
important for e-commerce sites and other types of
dynamic websites.

Load Balancer
A Load balancer is a device which distributes traffic load to a
number of servers.
A load balancer can achieve lots of clever things such as
if one of the servers failed and stopped functioning, the
load balancer will detect this problem and allocate the
entire load to the other server or servers that are
maintaining high availability.
It also has ability to provide persistence support which
allows a user to maintain their connection with the same
server. This feature is required when the servers are
hosting some type of ecommerce site. The load balancer
will ensure they are using the same server from when the
end user is purchasing goods via an online shopping cart
to the actual purchase of the goods or services.

Load Balancer (Continued)


Load balancers distribute traffic to a number of servers
depending on the algorithm used. Below are a few common
algorithms used to define how much traffic load is sent to a
group of servers;
1) Round Robin
The first connection would be sent to the first server, the second connection will
be sent to the next server, third to third server, and so on.

2) Server Weight
Each server is assigned a weight. The load balancer will send a percentage of
traffic to a particular server depending on the weight assigned. For example if
server A was assigned a weight of 5 and server B was assigned a weight of 1,
then the load balancer will send 5 times more traffic to server A.

3) Least connection
With least connections the load balancer will send traffic to the server with
currently the lowest number of open connections. This is a strategy and
technique is to ensure the least busiest server gets to handle the next request
and this is worked out by which server has the least open connections.

Ecommerce Architecture
E-commerce is based on the client-server architecture.
In E-commerce, a client refers to a customer who requests for
certain services and the server refers to the business
application through which the services are provided. The
business application that provides services is deployed on a
Web' server. The Web server is a computer program that
provides services to "other computer programs and serves
requested Hyper Text Mark-up Language (HTML) pages or
files.

In client-server architecture, a machine can be both a client


as well as a server. There are two types of client server
architecture that E-commerce follows: two-tier/layer and
three-tier/layer.

Ecommerce Architecture
Elements
Personal Systems
Desktops, PDAs, Phones, etc.
Network Components
Routers, Load Balancers, Switches, etc.
Security Elements
Firewalls, Encryption, VPNs, etc.
Servers
Web, App, DB, Directory, etc.
Application Components / Web Services
Packaged and/or Custom
Data
Local, Remote, Internal, External

Ecommerce Sample Secure Architecture

Web-Servers

App-Server

DB-Server &
Storage

Data Analysis Software on Web Server


Web servers can capture
1) Data about who is visiting a Web site
2) How long the visitors Web browser viewed site
3) Date and time of each visit
4) Which pages a visitor viewed
Data captured by Web servers are stored in a
log file

Best Practices
Secure E-commerce
Keep software patches up to date, especially on systems that
host public services and are accessible through your firewall,
e.g., HTTP, FTP and DNS.

Consider implementing network compliance solutions that will


keep infected mobile users out of the network.
Configure mail servers to block or remove e-mail that
contains attachments that are commonly used to spread
viruses, e.g., .VBS, .BAT and .EXE files.
Maintain strict discipline around user management for various
Internet services. Frequently monitor who has access, what
level access, etc.
Employ defense-in-depth strategies that emphasize multiple,
overlapping and mutually supportive systems that guard
against single point failures in any specific technology. These
should include implementing any regularly updated antivirus,
firewall, intrusion detection and intrusion protection solutions.

Questions and Comments

Thank you for your time!

Vous aimerez peut-être aussi