4/24/2009

Exercise 12



1. Find out about SET and the use of RSA 128-bit encrption for e-commerce.

SET, short for Secure Electronic Transaction, Webopedia(2009) states that is a standard that will enable secure credit card transactions on the Internet. SET has been endorsed by virtually all the major players in the electronic commerce arena, including Microsoft, Netscape, Visa, and Mastercard. By employing digital signatures, SET will enable merchants to verify that buyers are who they claim to be. And it will protect buyers by providing a mechanism for their credit card number to be transferred directly to the credit card issuer for verification and billing without the merchant being able to see the number.

RSA is stand for Rivest, Shamir, Adelman, Keen(1997) states that is a cryptographic system based on public keys for both encryption and authentication. Advantages of RSA over other public key cryptosystems include the fact that it can be used for both encryption and authentication. In the RSA public key cryptosystem used for securing electronic cash transactions; both encryption and decryption are done by raising the digital representation of a message by a power that is the appropriate key.

2. What can you find out about network and host-based intrusion detection system?

ISS(2007) tell me that Most traditional intrusion detection systems (IDS) take either a network or a host-based approach to recognizing and deflecting attacks. In either case, these products look for attack signatures, specific patterns that usually indicate malicious or suspicious intent. When an IDS looks for these patterns in network traffic, it's network-based. When an IDS looks for attack signatures in log files, it's host-based.

A next-generation IDS, therefore, must include tightly integrated host and network
components. Combining these two technologies will greatly improve network resistance to attacks and misuse, enhance the enforcement of security policy and introduce greater flexibility in deployment options.

The graphic below illustrates how network- and host-based intrusion detection techniques interact to create a more powerful network defense. Some events are detectable by network means only. Others that are detectable only at the host. Several require both types of intrusion detection to function properly.




















3. What is 'phishing'?

In the field of computer security, Wikipedia (2009) states that phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

References:

Webopedia (2009). “SET”. Received 20th April, 2009 from URL -
http://e-momm.webopedia.com/TERM/S/SET.html

Keen(1997), Harvard Business Press, “On-line profits”, RSA Encryption, pp. 234-235.


ISS (2007). “Network- vs. Host-based Intrusion Detection”. Received 20th April, 2009 from URL - http://documents.iss.net/whitepapers/nvh_ids.pdf

Wikipedia (2009). “Phishing”. Received 20th April, 2009 from URL -
http://en.wikipedia.org/wiki/Phishing

1 則留言:

  1. Is your 2fa factor not working in Hitbtc? If yes, this is the matter of concern as 2fa provides the extra shield to your account and protects it from unwanted activities that can damage your account as well as destroy your personal information. To fix 2fa issues as soon as possible, you can dial Hitbtc customer support number 1-888-764-0492 and avail the best possible solutions from the experienced professionals anytime from anywhere.

    回覆刪除