• Advanced Threat Detection and Mitigation • Data Loss Protection • Malware and Botnet Security • Threat & Event Reporting

Total Page:16

File Type:pdf, Size:1020Kb

• Advanced Threat Detection and Mitigation • Data Loss Protection • Malware and Botnet Security • Threat & Event Reporting Product Brochure iboss SWG IPDS/DLP/Threat System • Advanced Threat Detection and Mitigation • Data Loss Protection • Malware and Botnet Security • Threat & Event Reporting www.iboss.com Phantom Technologies, Inc. DBA iboss SWG Web Filter (P) 877.742.6832 [email protected] U.S. HQ 9950 Summers Ridge Rd., Bldg. 160 San Diego, CA 92121 © 2013 All rights reserved. Phantom Technologies, Inc. DBA iboss SWG Web Filter. iboss and Phantom Technologies are trademarks of Phantom Technologies, Inc. All other trademarks are the property of their respective owners. Condential – for intended recipients only. Distribution to third party is prohibited without prior written authorization. iboss SWG IPDS/DLP/Threat System The iboss SWG Suite Choose an all-in-one solution, or custo- iboss Network Security mize the suite to your network’s needs. There’s no doubt that cyber threats are more sophisticated • Web Filter than ever, and they’re getting more complex and covert • Malware/DLP/Threat every day. Those threats, in addition to malware, data loss • Next-Generation Firewall and the new potential for network peripherals “phoning • Threat & Event Console • MDM & EMM home,” have eroded the eectiveness of current log-based • Mobile Security threat detection and reporting. The iboss SWG IDPS/Threat/ • Email Spam Boss DLP System changes how we approach threat identication • Email Archiver and mitigation by identifying with whom and where your network is communicating on a global map to identify About iboss Network Security, a division of Phantom Technologies, Inc. threats proactively and prevent data loss. Founded in 2003, Phantom Technologies, Inc. is a global provider of network The SWG IPDS/DLP/Threat System is a key component to security solutions. Its iboss Network Security line of products deliver network providing a secure web gateway for the organization. With trac insight and threat mitigation. Proprietary engineering powerfully iboss SWG products centrally reporting to the SWG Threat secures high-demand networks for web and Event Reporter, networks gain exclusive features such content management, intrusion, mobile device security and management, and as threat GeoMapping and heat map technology. iboss SWG email security. provides end-to-end security across all aspects of network To learn more about our services: www.iboss.com trac and presents a 360-degree view across all user activ- Main: 1-877-742-6832 ext. 1 ity. From web access to malware and threat mitigation, iboss Support: 1-858-568-7051 ext. 3 SWG products provide regulatory and auditing compliance, iboss Network Security is recognized by reducing the total cost of ownership (TCO). Gartner, the world’s leading information technology research and advisory company. In addition to Gartner, iboss has received numerous awards related to web ltering and Internet security. OVERALL RATING Features Ease of Use Performance Documentation Support Value for Money www.iboss.com Phantom Technologies, Inc. DBA iboss SWG Web Filter (P) 877.742.6832 [email protected] U.S. HQ 9950 Summers Ridge Rd., Bldg. 160 San Diego, CA 92121 © 2013 All rights reserved. Phantom Technologies, Inc. DBA iboss SWG Web Filter. iboss and Phantom Technologies are trademarks of Phantom Technologies, Inc. All other trademarks are the property of their respective owners. Condential – for intended recipients only. Distribution to third party is prohibited without prior written authorization. SWG IDPS/DLP/Threat System Intrusion Detection/Protection, Data Loss, & Malware FEATURES Issue: New cyber threats are emerging every second, and your network resources are under Intrusion Detection and Prevention constant attack. Threats such as Trojans, botnets, malware and exposed data like unen- • Stateful signature and heuristic-based crypted SSN and credit card information can hide among the millions of packets owing detection scan for attack patterns and through your network. These threats expose the network and communicate sensitive network anomalies. information to hosts around the world. You need a method to identify and prevent these • Thwart attacks such as network probes threats immediately and eectively. and port scans. • Application aware-enforce Solution: iboss SWG Intrusion Detection, Prevention (IDPS) and Data Loss Prevention System policies based on applications. (DLP) actively scans your network through Layer 7 and across all 65,535 ports, utilizing Malware/Botnets/Threats signatures and heuristics to identify and prevent threats and sensitive data loss. Eortlessly • Zero-day blended malware/botnet sorting through the millions of packets owing through your network, the iboss SWG Threat signature databases. and& Event Reporter dynamically tracks threats through its exclusive GeoMapping technol- • Detect and mitigate threats at the ogy. The iboss SWG GeoMapping technology maps with whom your network is communicat- gateway. ing, allowing you to identify potential threats by viewing them on dynamic world maps. This • Instantly identify at–risk users and technology provides unmatched network insight, shortening threat responses while reduc- machines on the network. ing the time spent reviewing logs. • Deep HTML analysis prevents hidden threats embedded deep within web pages. Mobile IPS Malware DLP Security IDS Data Loss Prevention and Compliance • Scan user-generated content on key Firewall web protocols. • Prevent condential and suspect Mobile Devices information from leaking out of the organization. • Secure data leaks on blogs, wikis and Networks application sites. Virus • Mitigate data loss by blocking Internet transmission. • Detailed reports of condential and suspect information including originating user identied. iboss SWG IDPS Secure Mobile and BYOD Users • Protect against botnet, malware, DLP, Beyond Port-Based Security: Intrusion Detection, Prevention, and threats introduced by BYOD users. and Data Loss Protection • Secure mobile devices on or o premise against data loss, malware, The ever-growing need to access more of the web for essential operational functions is and threats. eroding the eectiveness of port-based rewalls. To guarantee uninterrupted operations, SWG Threat and Event Reporter we need make sure access to “mission critical” web and applications remains uninterrupted • Integration with SWG Threat & Event while simultaneously identifying and eectively mitigating hidden threats. The integrated Reporter. Intrusion Detection, Prevention System (IDPS), Data Loss Protection (DLP) and malware • Provide reporting based on directory. security actively combine to scan all 65,535 ports, detecting threats such as anomalies, denial • Exclusive GeoMapping technology of service attacks, botnets and data loss from the unencrypted transfer of personal informa- identies threat’s physical location. tion. In addition, the SWG Web Filter module extends HTTP/S ltering, application rewall, • Comprehensive user-based reporting bandwidth management (QoS) while the SWG Threat and Event Reporter provides packet across all network trac including level insight across all network trac and insight. web, IDPS, DLP, and Bandwidth. www.iboss.com Phantom Technologies, Inc. DBA iboss SWG Web Filter (P) 877.742.6832 [email protected] U.S. HQ 9950 Summers Ridge Rd., Bldg. 160 San Diego, CA 92121 © 2013 All rights reserved. Phantom Technologies, Inc. DBA iboss SWG Web Filter. iboss and Phantom Technologies are trademarks of Phantom Technologies, Inc. All other trademarks are the property of their respective owners. Condential – for intended recipients only. Distribution to third party is prohibited without prior written authorization. SWG IDPS/DLP/Threat System Intrusion Detection/Protection, Data Loss, & Malware Advanced Threat Detection and Mitigation Data Loss Protections Utilizing a signature- and heuristic-based scanning to track With increased compliances across industries, along with the known and unknown threats, iboss SWG IDPS/Threat/DLP ongoing need to protect sensitive information such as credit provides intrusion detection and prevention across all 65,535 cards and social security numbers, the need to scan trac to ports, identifying network anomalies. In addition, the blended identify potential data loss is essential. iboss SWG IDPS/Threat/ signature database uncovers malware, botnets, and emerging DLP transparently scans network trac, identifying potential threats at the gateway, optimizing network resources and inbound and outbound data loss. When the potential data loss reducing infections. Threats are identied, mapped, and is identied, it’s quarantined and reported through automation. mitigated, reducing management overhead and securing network resources. Threat GeoMapping We’ve shift our approach in how we identify threat — it’s no Malware and Botnet Security longer about what’s on your network but rather to whom and By blending best-of-breed Bitdefender’s malware signatures where your network is connecting. This shift in threat identi- and heuristic database with Phantom Technologies database cation provides a new approach on threat mitigation. iboss at the gateway, organizations achieve a layered security SWG IDPS/Threat/DLP System’s real-time GeoMapping tracks approach to an already existing structure. Packets are scanned threats and connections globally and dynamically with a at the gateway, utilizing zero-day signatures that clears trac reverse map IP. This quickly discloses the organization owing to the workstations of potential threats and simultan- information along with its physical location. eously protects network
Recommended publications
  • 3/16/2020 Testout Labsim
    3/16/2020 TestOut LabSim 8.4 Web Application Attacks As you study this section, answer the following questions: What are two ways that drive-by download attacks occur? Which countermeasures can be used to eliminate buffer overflow attacks? How can cross-site scripting (XSS) be used to breach the security of a web user? What is the best method for preventing SQL injection attacks? What are some types of header manipulation? Which mitigation practices help to protect internet-based activities from web application attacks? In this section, you will learn to: Prevent cross-site scripting Key terms for this section include the following: Term Definition Drive-By Download An attack where software or malware is downloaded and installed without explicit consent from the user. Typosquatting/URL Hijacking An attack that occurs when an attacker registers domain names that correlate to common typographical errors made by users when trying to access a legitimate website. Buffer Overflow An attack that exploits an operating system or an application that does not properly enforce boundaries for how much and what type of data can be inputted. An attack that exploits a computational operation by a running process that results in a numeric value that exceeds the maximum size of the integer type used to store it in Integer Overflow memory. Cross-Site Scripting (XSS) An attack that injects scripts into webpages. Cross-Site Request Forgery A type of malicious exploit whereby unauthorized commands are transmitted from the user to a website that currently trusts the user by way of authentication, cookies, etc. (CSRF/XSRF) LDAP Injection An attack that uses LDAP statements with arbitrary commands to exploit web-based applications with access to a directory service.
    [Show full text]
  • Opentext Product Security Assurance Program
    The Information Company ™ Product Security Assurance Program Contents Objective 03 Scope 03 Sources 03 Introduction 03 Concept and design 04 Development 05 Testing and quality assurance 07 Maintain and support 09 Partnership and responsibility 10 Privavy and Security Policy 11 Product Security Assurance Program 2/11 Objective The goals of the OpenText Product Security Assurance Program (PSAP) are to help ensure that all products, solutions, and services are designed, developed, and maintained with security in mind, and to provide OpenText customers with the assurance that their important assets and information are protected at all times. This document provides a general, public overview of the key aspects and components of the PSAP program. Scope The scope of the PSAP includes all software solutions designed and developed by OpenText and its subsidiaries. All OpenText employees are responsible to uphold and participate in this program. Sources The source of this overview document is the PSAP Standard Operating Procedure (SOP). This SOP is highly confidential in nature, for internal OpenText consumption only. This overview document represents the aspects that are able to be shared with OpenText customers and partners. Introduction OpenText is committed to the confidentiality, integrity, and availability of its customer information. OpenText believes that the foundation of a highly secure system is that the security is built in to the software from the initial stages of its concept, design, development, deployment, and beyond. In this respect,
    [Show full text]
  • Lakeridge Health Uses Trend Micro™ Messaging and Web Security for Comprehensive Gateway Web Threat Protection
    Securing Your Web World Lakeridge Health Uses Trend Micro™ Messaging and Web Security for Comprehensive Gateway Web Threat Protection Lakeridge Health (LH) serves a community of more than 500,000 residents within an area of 19,000 square kilometers in Ontario. IT must build in security to protect the mission-critical infrastructure that spans the 25 hospitals, clinics, and administrative sites. A recent escalation in web threats, including web-based phishing and malware as well as the spam emails that deliver links to these threats, called for a combination of Trend Micro messaging and web solutions supported by the Trend Micro Smart Protection Network. ESCALATING WEB THREATS “ Trend Micro messaging and Over the years, LH has tried many web security builds up our alternatives in its search for the best possible security. When web threats began defenses where they can to increase, LH’s user help desk was flooded do the most good—right at with complaints about spyware and other the edge of our network. infections. Unsatisfied with its previously These solutions have proven deployed products and lack of support from the vendor, LH evaluated four other security invaluable for fighting the vendors including Trend Micro. constantly evolving web After identifying Trend Micro as the winner of its security “bake off,” LH deployed multiple threats.” layers of Trend Micro protection. Trend Micro gateway protection blocks web-based threats by introducing messaging and web defense right at the network perimeter: — Peter Hastie, IT Systems Consultant • Trend Micro InterScan™ Messaging Security blocks emails threats, including spam, Lakeridge Health (LH), phishing, and malware, and offers content filtering to enforce compliance and prevent Ontario, Canada data leaks.
    [Show full text]
  • Search Engines and Cyber Hygiene Exercise - 11
    IT WORKSHOP LAB MANUAL Search Engines and Cyber Hygiene Exercise - 11 Aim: Working of search engine, Awareness of various threats on Internet, types of attacks and how to overcome. Installation of antivirus software, configuration of personal firewall and Windows update on computers. 11.1 Introduction Search Engine refers to a huge database of internet resources such as web pages, newsgroups, programs, images etc. It helps to locate information on World Wide Web. User can search for any information by passing query in form of keywords or phrase. It then searches for relevant information in its database and return to the user. Fig. 1. Windows explorer 198 Prepared by: APPROVED BY : Ms.K.NIRMALA Dr.K.RAMANI Mr.V.S.V.S.S.S.M.CHAKRADHAR HOD, IT IT WORKSHOP LAB MANUAL Search Engine Components Generally there are three basic components of a search engine as listed below: 1. Web Crawler 2. Database 3. Search Interfaces Web crawler It is also known as spider or bots. It is a software component that traverses the web to gather information. Database All the information on the web is stored in database. It consists of huge web resources. Search Interfaces This component is an interface between user and the database. It helps the user to search through the database. Search Engine Working Web crawler, database and the search interface are the major component of a search engine that actually makes search engine to work. Search engines make use of Boolean expression AND, OR, NOT to restrict and widen the results of a search. Following are the steps that are performed by the search engine: The search engine looks for the keyword in the index for predefined database instead of going directly to the web to search for the keyword.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • FANS: Fuzzing Android Native System Services Via Automated Interface Analysis
    FANS: Fuzzing Android Native System Services via Automated Interface Analysis Baozheng Liu1;2,∗ Chao Zhang1;2 , Guang Gong3, Yishun Zeng1;2, Haifeng Ruan4, Jianwei Zhuge1;2 1Institute of Network Science and Cyberspace, Tsinghua University [email protected] 2Beijing National Research Center for Information Science and Technology [email protected] 3Alpha Lab, 360 Internet Security Center 4Department of Computer Science and Technology, Tsinghua University Abstract 1 Introduction Android has become the most popular mobile operating sys- Android native system services provide essential supports and tem, taking over 85% markets according to International Data fundamental functionalities for user apps. Finding vulnerabil- Corporation1. The most fundamental functions of Android ities in them is crucial for Android security. Fuzzing is one of are provided by Android system services, e.g., the camera the most popular vulnerability discovery solutions, yet faces service. Until October 2019, hundreds of vulnerabilities re- several challenges when applied to Android native system lated to Android system services had been reported to Google, services. First, such services are invoked via a special inter- revealing that Android system services are still vulnerable and process communication (IPC) mechanism, namely binder, attractive for attackers. A large portion of these vulnerabilities via service-specific interfaces. Thus, the fuzzer has to recog- reside in native system services, i.e., those mainly written in nize all interfaces and generate interface-specific test cases C++. Vulnerabilities in Android native system services could automatically. Second, effective test cases should satisfy the allow remote attackers to compromise the Android system, interface model of each interface. Third, the test cases should e.g., performing privilege escalation, by means of launching also satisfy the semantic requirements, including variable IPC requests with crafted inputs from third-party applications.
    [Show full text]
  • A United States Perspective on the Ethical and Legal Issues of Spyware Janice C
    A United States Perspective on the Ethical and Legal Issues of Spyware Janice C. Sipior Burke T. Ward Georgina R. Roselli College of Commerce & Finance College of Commerce & Finance College of Commerce & Finance Villanova University Villanova University Villanova University Villanova, PA 19085 USA Villanova, PA 19085 USA Villanova, PA 19085 USA +1-610-519-4347 +1-610-519-4375 +1-610-519-4347 [email protected] [email protected] [email protected] ABSTRACT While information concerning user characteristics and Spyware is regarded as the largest threat to internet users since preferences may be used beneficially to improve product and spam, yet most users do not even know spyware is on their service offerings, the surreptitious nature of its acquisition personal computers. Ethical and legal concerns associated with coupled with no indication of its intended use may raise ethical spyware call for a response. A balance must be found between and legal issues regarding its acceptability. Ethically, spyware legitimate interests of spyware installers, who have obtained installers have an obligation to users to obtain informed consent informed consent of users who accept advertisements or other for the collection and use of personal information. However, in marketing devices, and users who are unwitting targets. the commercially competitive environment of electronic Currently, there is not widespread awareness or understanding commerce, information gathering may be undertaken without of the existence of spyware, its effects, and what remedies are users’ knowledge or permission. available to defend against it. For industry sectors subject to For industry sectors which are subject to data collection laws, data collection and protection laws, spyware results in “spyware can be an unwitting avenue to noncompliance” [9].
    [Show full text]
  • The Four Rules of Complete Web Protection
    The four rules of complete web protection By Chris McCormack, Product Marketing Manager As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money. The four rules of complete web protection Why the web is a scary place Your users are working on the web more than ever, reaping its benefits for increased mobility and easy access to the tools they need. But the web is also a dangerous place. Cybercriminals constantly launch attacks designed to penetrate your digital defenses and steal sensitive data. During the first half of 2011, we saw an average of 19,000 new malicious URLs every day at SophosLabs—that's one every 4.5 seconds. In a recent study of 50 organizations, 64% of those companies were victim to a web-based attack during a four week period.1 And web-based attacks are the second most costly type of attack, topped only by denial of service attacks.2 This type of cybercrime exposes you to enormous risks, including financial losses, regulatory and compliance issues, data breach liabilities, damage to brand and reputation, and loss of customer confidence. In this whitepaper we’ll discuss the types of threats and explain how these four rules can help you build a better web protection strategy.
    [Show full text]
  • Authentication and Authorization for Mobile Devices
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Göteborgs universitets publikationer - e-publicering och e-arkiv Authentication and Authorization for Mobile Devices Bachelor of Science Thesis in Software Engineering and Management NAVID RANJBAR MAHDI ABDINEJADI The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Authentication and Authorization for Mobile Devices NAVID RANJBAR MAHDI ABDINEJADI © NAVID RANJBAR, June 2012. © MAHDI ABDINEJADI, June 2012. Examiner: HELENA HOLMSTRÖM OLSSON University of Gothenburg Chalmers University of Technology Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 Department of Computer Science and Engineering Göteborg, Sweden June 2012 2 Authentication and Authorization for Mobile Devices Navid Ranjbar Mahdi Abdinejadi Department of Computer Science and Engineering Department of Computer Science and Engineering University of Gothenburg University of Gothenburg Gothenburg, Sweden Gothenburg, Sweden [email protected] [email protected] Abstract— Nowadays market demand forces companies to adapt to mobile technology.
    [Show full text]
  • ESET THREAT REPORT Q3 2020 | 2 ESET Researchers Reveal That Bugs Similar to Krøøk Affect More Chip Brands Than Previously Thought
    THREAT REPORT Q3 2020 WeLiveSecurity.com @ESETresearch ESET GitHub Contents Foreword Welcome to the Q3 2020 issue of the ESET Threat Report! 3 FEATURED STORY As the world braces for a pandemic-ridden winter, COVID-19 appears to be losing steam at least in the cybercrime arena. With coronavirus-related lures played out, crooks seem to 5 NEWS FROM THE LAB have gone “back to basics” in Q3 2020. An area where the effects of the pandemic persist, however, is remote work with its many security challenges. 9 APT GROUP ACTIVITY This is especially true for attacks targeting Remote Desktop Protocol (RDP), which grew throughout all H1. In Q3, RDP attack attempts climbed by a further 37% in terms of unique 13 STATISTICS & TRENDS clients targeted — likely a result of the growing number of poorly secured systems connected to the internet during the pandemic, and possibly other criminals taking inspiration from 14 Top 10 malware detections ransomware gangs in targeting RDP. 15 Downloaders The ransomware scene, closely tracked by ESET specialists, saw a first this quarter — an attack investigated as a homicide after the death of a patient at a ransomware-struck 17 Banking malware hospital. Another surprising twist was the revival of cryptominers, which had been declining for seven consecutive quarters. There was a lot more happening in Q3: Emotet returning 18 Ransomware to the scene, Android banking malware surging, new waves of emails impersonating major delivery and logistics companies…. 20 Cryptominers This quarter’s research findings were equally as rich, with ESET researchers: uncovering 21 Spyware & backdoors more Wi-Fi chips vulnerable to KrØØk-like bugs, exposing Mac malware bundled with a cryptocurrency trading application, discovering CDRThief targeting Linux VoIP softswitches, 22 Exploits and delving into KryptoCibule, a triple threat in regard to cryptocurrencies.
    [Show full text]
  • Rsa® Web Threat Detection Identifying Even the Most Sophisticated Fraud Data Sheet
    DATA SHEET RSA® WEB THREAT DETECTION IDENTIFYING EVEN THE MOST SOPHISTICATED FRAUD DATA SHEET WTD – DETECTING The ever evolving fraud landscape makes it difficult for organizations to identify EVEN THE MOST and respond to fraud until account takeover or other loss occurs. New and SOPHISTICATED increasingly sophisticated ways to perpetrate fraud are constantly being developed FRAUD and deployed, making it extremely difficult to keep pace with the individual fraud attempts targeting an organization’s website. In addition, these malicious activities Web Threat Detection is an incredibly versatile platform are occurring right alongside legitimate web traffic, making it easy for fraudsters that can identify even the most to mask their activities. Adding to this burden is the fact that site users have little sophisticated fraud and other forms of disruptive online behavior. tolerance for any security measure that negatively impacts their online experience. Online frauds that our customers FRAUD DETECTION THROUGH have used WTD to detect include: BEHAVIORAL INTELLIGENCE • Account takeover • Fraudulent money movement Web Threat Detection (WTD) is an fraud detection platform that helps • Password guessing – horizontal organizations identify in real time and respond on the fly to even the most • Password guessing – vertical • Fraudulent account set up sophisticated (and newest) fraud – without discouraging legitimate users from • Credential harvesting using your site. WTD’s Behavioral Intelligence drives a feedback loop that • Credential testing • Mobile and web session hijacking continuously improves threat detection capabilities. • Account used to accept proceeds • Detect: Web Threat Detection includes out of the box fraud detection from fraudulent rewards scheme • Money order fraud – malware capabilities that deliver immediate time to value.
    [Show full text]
  • Identification, Authentication and Authorization on the World Wide Web1
    Identification, Authentication and Authorization 1 on the World Wide Web An ICSA White Paper M. E. Kabay, PhD [,CISSP-ISSMP] [formerly] Director of Education, 2 International Computer Security Association Executive summary The buying public are leery of engaging in electronic commerce largely because they worry that their electronic transactions will be insecure. Observers of the growing field of e-commerce concur that lack of consumer confidence is the key stumbling block to continued growth of business on the World Wide Web. Both merchants and clients need to be confident of the identity of the people and institutions with which they are doing business. At a technical level, these concerns focus on identification, authentication and authorization. Identification consists of providing a unique identifier for automated systems; authentication consists of correlating this electronic identity to a real-world, legally-binding identity; and authorization consists of assigning rights to the authenticated identifier. Encryption technologies play a crucial role in protecting confidentiality, integrity and authenticity in cyberspace. Standards for labeling Web sites' compliance with privacy policies help consumers judge where to do business. Digital certificates and electronic cash of various kinds allow authorization for purchases with varying degrees of assurance for customer privacy. Single sign-on systems allow clients to establish and prove their identity once and then shop at several electronic locations without further inconvenience. Systems for extending the content and flexibility of digital certificates allow Web sites to tailor their services more closely to the needs and demands of their clientele. 1 This paper was published in 1997. Ten years later, colleagues asked me to ensure that it would be available on my Web site, so I dug it out of my archives and reformatted it and converted the end-notes to footnotes.
    [Show full text]