Security in electronic business transactions
As in all transactions, whether using traditional postal mail, the telephone system, and even if they are carried out face to face, in Internet transactions, precautions must be taken to reduce risks to an acceptable level.
From the buyer's point of view, whether this is an
individual, or a company acquiring goods from an Internet provider, it is
necessary to have certainty about who is really behind the web pages that they see, if they are really who they
say they are and are not an identity theft. As the Internet is a public
network, not a private one, shoppers are still fearful and reluctant to send
their credit card number through it.
Threats to the security of payments.
In face-to-face transactions , in person, the seller and the
buyer use physical signs to ensure that they are negotiating with a reliable
counterpart: The seller can verify the signature, photo and identity documents
of the client, and for his part the client You can verify the use of rosettes
on employees, test merchandise and keep receipts for your purchase, etc.
On the Internet these methods are not applicable. Risks
appear due to the very nature of La Red:
1. Impersonation
: The low cost of entry, and the ease of copying documents in electronic form,
makes it possible for someone to, in principle, create a website that appears
to represent a real and established or recognized organization, and through
that electronic facade obtain illegally , for example, credit card numbers.
2. Unauthorized
Deployment and Action : Even during transactions between authentic sites and
legitimate customers, a vandal (known as a hacker) could intercept the
transmissions to capture a credit card number. Theoretically, there is also the
possibility that a competitor or an annoying customer creates problems for the
website so that it refuses to serve other customers or takes unauthorized
actions.
3. Data
Alteration : Sometimes a malicious or accidental action can alter the content
of a communication in transit, having an effect on customer names, credit card
numbers, or amounts that represent money.
4. Repudiation
: If there is no physical proof of a sale, one of the parties involved could deny
that a transaction actually took place. The customer could refuse to pay if
their purchase cannot be tracked or has physical proof. Given the security
risks involved in doing business on the web, consumers tend to remain fearful
to shop online.
There are several approaches to implementing secure payments
over the Internet:
1. Creation
of an account : in this case the client makes an agreement outside the Network
(by phone, mail, fax, etc.) to pay later with a credit card, or to establish a
line of credit. Then the orders can be made through the web.
2. The
purchase of virtual money . In this system, you buy encrypted tickets that are
transmitted over the network and are accepted by various providers (eg Paypal).
3. Form data
or encrypted mail : The buyer fills in data in a form on a web page, these are
encrypted and sent to the seller through the network, using the protocol called
Secure HTTP (S-HTTP), or the email protocol (SMTP) . The S-HTTP (Secure HTTP),
makes that when the buyer sends the data for the payment, the client program
(browser, navigator or explorer) generates a security key. There are variants
of security schemes that are under development. The fundamental schemes are:
1. SSL:
Security Layer at the socket level (Secure Sockets Layer)
2. S-HTTP:
Secure HTTP (Secure HTTP)
3. Certificates
To get an idea of the place that these security systems
occupy , we must know that communication between two systems , in this case
computers, is carried out at several levels: from the physical level (electrical
signals), to the application level (service or application used). At each level
a certain protocol must be agreed upon
so that one end understands the other.
The SSL security scheme executes a negotiation protocol to
establish a secure connection at the socket level (machine address plus port).
The security services SSL are transparent to the user and
the application, as they are below the application level, or that can be used
by any application.
At the application level, HTTP is the protocol used in web
application communications. S-HTTP protocols are integrated with HTTP. Here,
security services are negotiated via page headers and attributes. Therefore,
S-HTTP services are available only for web connections. Since SSL is integrated
into the socket layer, it can also be used by other protocols besides HTTP,
while S-HTTP is designed to be used exclusively in HTTP communications.
Secure Socket Layer (SSL).
The SSL is a system designed and proposed by Netscape
Communications Corporation . It falls between the levels of TCP / IP and
application protocols such as HTTP, FTP, and SMTP. It provides its security
services by encrypting or encrypting the data exchanged between the server and
the client, and encrypting the key for that session using a public key
algorithm. The session key is the one used to encrypt the data that comes from
and goes to the secure server . A different session key is generated for each transaction,
ensuring that even if it is discovered by a spy in a given transaction, it is
not used to decrypt future transactions.