28.02.2014 Views

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A typical e-commerce ëpractice', as encouraged by ISPANZ, is to inform customers about the<br />

availability of secure transactions mechanisms whenever they intend to purchase goods via the<br />

<strong>Internet</strong>. Another practice advises ISPs to provide customers with a schedule of all planned service<br />

outages in advance.<br />

<strong>Security</strong> <strong>Solutions</strong><br />

There is a common belief that lack of security is the major barrier to successful commercial use of the<br />

<strong>Internet</strong>. Businesses detest the kind of exposure provoked by attacks on the <strong>Internet</strong>. In 1996 Xtra, the<br />

largest <strong>Internet</strong> Service Provider in New Zealand, was forced to restrict access to their users to patch a<br />

security problem (Dias, 1996). It was a very simple problem. New passwords to users accounts were<br />

created disregarding normal precautions in those cases. However, users suffered from ''Denial of<br />

Service" while the problem was fixed. Recent <strong>Internet</strong>-related security attacks have also taken the<br />

form of malicious code transported as e-mail attachments. Notorious among those were the Melissa<br />

virus and the Happy99 worm (Malcolm and Fusaro, 1999). Obviously, an organisation planning to<br />

base an important part of their business on the <strong>Internet</strong> would think twice about doing so given that<br />

sort of media attention.<br />

The advent of e-commerce as an important element of the business environment adds another<br />

dimension: the web server as the weakest link in the security chain. <strong>Security</strong> holes in freely available<br />

web-server software creates a window of opportunity for hackers to get into the rest of an<br />

organisation's network before the IT department has a chance to extend the security blanket in order to<br />

include the new system.<br />

Although a basic <strong>Internet</strong> link may be a security risk, there are several ways of addressing the<br />

potential problems discussed above. The following is a summary of the main issues:<br />

Encryption<br />

Using encryption can protect sensitive data travelling over the <strong>Internet</strong>. Encryption is the<br />

transformation of readable text (also called clear or plain text) into an unintelligible form called<br />

cipher text, using mathematical algorithms. Only users with a digital key, and a program based on the<br />

encrypting algorithm, can decode an encrypted message.<br />

These are the basics of symmetric or single-key cryptography. Most commercial solutions also use<br />

asymmetric or public-key cryptography in which encryption is accomplished by using key pairs, one<br />

private, and one public. Users with private keys made available their corresponding public keys to<br />

communicating partners. Each public key will decode only those messages sent by the holder of the<br />

corresponding private key. Users maintain the confidentiality of their private keys.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!