E-commerce security: weak links, best defenses
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York u.a.
Wiley
1998
|
Schriftenreihe: | Wiley computer publishing
|
Schlagworte: | |
Online-Zugang: | Publisher description Table of Contents Inhaltsverzeichnis |
Beschreibung: | XV, 288 S. graph. Darst. |
ISBN: | 0471192236 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV011822965 | ||
003 | DE-604 | ||
005 | 20020226 | ||
007 | t | ||
008 | 980311s1998 xxud||| |||| 00||| eng d | ||
020 | |a 0471192236 |9 0-471-19223-6 | ||
035 | |a (OCoLC)263871017 | ||
035 | |a (DE-599)BVBBV011822965 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-739 |a DE-20 |a DE-M347 |a DE-521 |a DE-522 | ||
050 | 0 | |a HF5548.32.G48 1998 | |
082 | 0 | |a 658.4/78 21 | |
082 | 0 | |a 658.4/78 |2 21 | |
084 | |a QR 700 |0 (DE-625)142074: |2 rvk | ||
084 | |a QR 760 |0 (DE-625)142080: |2 rvk | ||
100 | 1 | |a Ghosh, Anup K. |e Verfasser |4 aut | |
245 | 1 | 0 | |a E-commerce security |b weak links, best defenses |c Anup K. Ghosh |
264 | 1 | |a New York u.a. |b Wiley |c 1998 | |
300 | |a XV, 288 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Wiley computer publishing | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Electronic commerce -- Security measures | |
650 | 4 | |a Business enterprises -- Computer networks -- Security measures | |
650 | 4 | |a Internet -- Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/description/wiley031/97038328.html |3 Publisher description | |
856 | 4 | |u http://www.loc.gov/catdir/toc/onix01/97038328.html |3 Table of Contents | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007982810&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-007982810 |
Datensatz im Suchindex
_version_ | 1804126366391599104 |
---|---|
adam_text | Contents
Preface xi
Acknowledgments xv
Chapter 1 Dangers in a Changing Paradigm of
Business 1
Banking on the Internet 3
Investing on the Internet 4
Doing Business on the Internet 6
Threats to E Commerce 9
Vandalism and Sabotage on the Internet 11
Breach of Privacy or Confidentiality 12
Theft and Fraud on the Internet 17
Violations of Data Integrity 19
Denial of Service 20
E Commerce Security:A System Wide Problem 21
Client Security 22
Secure Transport 23
Web Server Security 23
Operating System Security 25
The Future of E Commerce Security 25
References 26
Referenced Web Sites 28
Chapter 2 Deadly Content: The Client Side
Vulnerabilities 31
Executing Malware 35
ActiveX (Insecurity 38
• •
VII
viii/Contents
ActiveX Containers 38
ActiveX Scripting 39
Authenticode: Establishing Trust for ActiveX 41
Deadly Controls 63
Java Security 66
The Java Sandbox 68
Holes in the Sandbox 72
Signing Applets 72
Desktop Integration Problems 78
The Cybersnot Problem 79
The UMD Security Hole 81
The MIT Bug 82
The Other Dirty Dozen 82
JavaScript 84
Plug Ins and Graphic Files 87
Attachments 88
Push Technology and Active Channels 89
References 92
Referenced Web Sites 94
Chapter 3 Securing the Data Transaction 97
Secure Channels 101
Using SSL to Establish Secure Sessions 103
The Role of Certification Authorities 106
Web Spoofing 109
How SSL Works 114
Securing Web Sessions Using S HTTP 119
Stored Account Payment Systems 124
First Virtual 126
CyberCash 127
Secure Electronic Transaction 131
Stored Value Payment Systems 135
Pros and Cons 136
How E Cash Works 137
Securing E Cash 138
Representing Electronic Cash 140
E cash 142
CyberCoin 146
Contents/ix
Smart Cards 147
Applications of Smart Cards 148
Storing Value on Smart Cards 150
CAFE 151
Mondex 152
Visa Cash 153
Summary 154
References 155
Referenced Web Sites 156
Chapter 4 Securing the Commerce Server 157
The Web Server 159
The Databases 160
The Server Side Scripts 161
Web Server Security 162
Installing the Web Server Securely 163
File Access Permissions 164
Escalating Client Privilege 165
Accept These Options at Your Own Risk 166
Controlling Access to Sensitive Documents 168
Dangerous CGI Scripts 119
Mitigating the Dangers of CGI Scripts 179
Database Vulnerabilities 185
Designing More Secure Software 189
Buffer Overflows 191
Analyzing the Security of Software 191
Summary 202
References 202
Chapter 5 Cracks in the Foundation 205
Securing the Operating System 205
Minding the Operating System 206
Name Your Poison: Unix or Windows NT 208
Firewall Insecurity 210
Locking Down the Firewall 213
Data Driven Attacks 214
x/Contents
The Network Server Vulnerabilities 216
Caveat Emptor 218
Burying the Deadly Defaults 219
Flaws in the Web Server 226
Flaws in CGI Scripts 229
Networking Software Insecurity 232
Denial of Service 236
Weak Authentication 240
Operating System Holes 244
Defending the Server 247
References 249
Referenced Web Sites 250
Chapter 6 Securing the Future of E Commerce 253
Certifying Components for Security 253
What Is a Software Component? 254
The Status Quo 251
Penetrate and Patch 257
Certifying Identity 260
Certifying Software 261
To Be Stamped 262
Java Components 262
ActiveX Components 264
The Rest of the Bunch 265
Certifying Technologies 265
How Safe Is It? 270
References 273
Referenced Web Sites 274
Index 275
|
any_adam_object | 1 |
author | Ghosh, Anup K. |
author_facet | Ghosh, Anup K. |
author_role | aut |
author_sort | Ghosh, Anup K. |
author_variant | a k g ak akg |
building | Verbundindex |
bvnumber | BV011822965 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.32.G48 1998 |
callnumber-search | HF5548.32.G48 1998 |
callnumber-sort | HF 45548.32 G48 41998 |
callnumber-subject | HF - Commerce |
classification_rvk | QR 700 QR 760 |
ctrlnum | (OCoLC)263871017 (DE-599)BVBBV011822965 |
dewey-full | 658.4/7821 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 21 658.4/78 |
dewey-search | 658.4/78 21 658.4/78 |
dewey-sort | 3658.4 278 221 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01904nam a2200481 c 4500</leader><controlfield tag="001">BV011822965</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20020226 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">980311s1998 xxud||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471192236</subfield><subfield code="9">0-471-19223-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)263871017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV011822965</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.32.G48 1998</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78 21</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QR 700</subfield><subfield code="0">(DE-625)142074:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QR 760</subfield><subfield code="0">(DE-625)142080:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ghosh, Anup K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-commerce security</subfield><subfield code="b">weak links, best defenses</subfield><subfield code="c">Anup K. Ghosh</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York u.a.</subfield><subfield code="b">Wiley</subfield><subfield code="c">1998</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 288 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley computer publishing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises -- Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet -- Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/description/wiley031/97038328.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/onix01/97038328.html</subfield><subfield code="3">Table of Contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007982810&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007982810</subfield></datafield></record></collection> |
id | DE-604.BV011822965 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:16:19Z |
institution | BVB |
isbn | 0471192236 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007982810 |
oclc_num | 263871017 |
open_access_boolean | |
owner | DE-739 DE-20 DE-M347 DE-521 DE-522 |
owner_facet | DE-739 DE-20 DE-M347 DE-521 DE-522 |
physical | XV, 288 S. graph. Darst. |
publishDate | 1998 |
publishDateSearch | 1998 |
publishDateSort | 1998 |
publisher | Wiley |
record_format | marc |
series2 | Wiley computer publishing |
spelling | Ghosh, Anup K. Verfasser aut E-commerce security weak links, best defenses Anup K. Ghosh New York u.a. Wiley 1998 XV, 288 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Wiley computer publishing Unternehmen Electronic commerce -- Security measures Business enterprises -- Computer networks -- Security measures Internet -- Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 s Datensicherung (DE-588)4011144-1 s DE-604 http://www.loc.gov/catdir/description/wiley031/97038328.html Publisher description http://www.loc.gov/catdir/toc/onix01/97038328.html Table of Contents HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007982810&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ghosh, Anup K. E-commerce security weak links, best defenses Unternehmen Electronic commerce -- Security measures Business enterprises -- Computer networks -- Security measures Internet -- Security measures Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4592128-3 |
title | E-commerce security weak links, best defenses |
title_auth | E-commerce security weak links, best defenses |
title_exact_search | E-commerce security weak links, best defenses |
title_full | E-commerce security weak links, best defenses Anup K. Ghosh |
title_fullStr | E-commerce security weak links, best defenses Anup K. Ghosh |
title_full_unstemmed | E-commerce security weak links, best defenses Anup K. Ghosh |
title_short | E-commerce security |
title_sort | e commerce security weak links best defenses |
title_sub | weak links, best defenses |
topic | Unternehmen Electronic commerce -- Security measures Business enterprises -- Computer networks -- Security measures Internet -- Security measures Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd |
topic_facet | Unternehmen Electronic commerce -- Security measures Business enterprises -- Computer networks -- Security measures Internet -- Security measures Datensicherung Electronic Commerce |
url | http://www.loc.gov/catdir/description/wiley031/97038328.html http://www.loc.gov/catdir/toc/onix01/97038328.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007982810&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ghoshanupk ecommercesecurityweaklinksbestdefenses |