You are on page 1of 7

Introduction

Security considerations Security is one of the most challenging topics


of doing business via the faced by companies which wish to go online.
When a user attaches to the Internet, anyone
Internet: cautions to be from anywhere around the world has access to
considered the information being sent. When a Web server
is opened, a window to the local network is
provided. The risk of data theft, theft of service,
Alicia Aldridge and corruption of data and viruses becomes a
Michele White and reality. The possibility of fraud also increases
Karen Forcht significantly with the Internet because of the
difficulty of accounting for use of the service.
Companies need to focus more on security;
however, 59 percent say they lack human
resources, and 55 percent state they do not have
a budget to support Internet security (Internet
Security Survey Results, 1996). “The risks of
The authors working and doing business in cyberspace are
Alicia Aldridge is an Associate Professor in the Department present because there is also a tremendous
of Marketing, Walker College of Business, Appalachian State potential for reward. As long as we keep our eyes
University, Boone, NC, USA. open, assess the risks realistically, and take
Michele White is a Researcher and Karen Forcht is a intelligent precautions, we can navigate cyber-
Professor, Department of Information and Decision Sciences, space knowing that our own networks are safe
both at the College of Business, James Madison University, from unwanted intrusion” (Russell, 1995).
Harrisonburg, VA, USA.

Abstract Importance of security


Looks at the growth and potential of the Internet in relation Built-in security is not provided by the Internet
to security issues. Presently, lack of security is perceived as a as messages and information sent via computer
major roadblock to doing business online. Risks of system may be routed through many different systems
corruption, fraud, theft and viruses point companies to the before reaching their destination. Each different
need for enhanced security. Investigates the importance of system introduces unwanted individuals who
securing a company’s systems, its individual users and its can access data; therefore, security is needed to
commercial transactions, and provides a checklist along with protect messages from unwanted damage, copy-
a brief discussion of available protection measures for these ing, or eavesdropping (Forcht and Fore, 1995).
three primary security concerns. RDI Computer Corporation recently con-
ducted a survey on how people feel about Inter-
net security. The majority (57 percent) of
people surveyed felt security was important.
Forty-six percent stated that they have experi-
enced some type of security break-in; however,
80 percent have not recently purchased any type
of security software. The top three main con-
cerns mentioned by the respondents were unau-
thorized data retrieval (system privacy), pass-
word security (user privacy), and security of
commerce transactions (Internet Security Survey
Results, 1996).

System privacy
Internet Research: Electronic Networking Applications and Policy
Volume 7 · Number 1 · 1997 · pp. 9–15 Unauthorized data retrieval is the most common
© MCB University Press · ISSN 1066-2243 reason for wanting a good security system.
9
Security considerations of doing business via the Internet Internet Research: Electronic Networking Applications and Policy
Alicia Aldridge, Michele White and Karen Forcht Volume 7 · Number 1 · 1997 · 9–15

Companies do not want private or confidential software, but they are just an example of soft-
documents falling into the wrong hands. Unau- ware compromised by someone on the outside.
thorized persons may also break into systems
just to destroy data stored there. This may prove User privacy
very costly to the company, even if they have Just as the Internet does not provide its own
made backups, as it takes time to restore the system privacy, it does not have built-in individ-
data and make additional backup copies. ual user protection. “The danger of the Internet
During reinstallation, the company may be now is the illusion of anonymity that is com-
paralyzed and unable to attend to their cus- pletely false. People think they’re invisible”
tomers’ needs and these consumers may (Miller, 1996). In reality servers log every
become dissatisfied and give their business to access, IP address, time of download, user’s
someone else. name, URL requested, status of request, size of
To compound the problem, a secure network data transmitted, client the reader is using and
is critical to keep unwanted users from using sometimes the user’s real name and e-mail
company resources. Some unauthorized users address. If the client is using a single-user
may break into networks just to borrow machine the download can be attributed to an
resources and these additional users may cause individual. This information could be very
organizations to lose valuable system adminis- damaging. It could signal corporate takeover, or
tration time. If there is a large number of addi- show who is interested in a job change by read-
tional users on a system, it will slow down, ing who looks at job listings. In addition, record-
ing the time a cartoon is downloaded could
possibly to a stop. The slow or down system may
show an employee who is misusing company
keep employees and customers from doing their
time. Users expect privacy; therefore, compa-
business and will further their frustrations.
nies need to respect that and refrain from post-
Intruders may also execute commands that
ing usage statistics that can be attributed to an
modify or damage the system or cause corrupt-
individual.
ed or damaged products to be sent to
Government sites are required by law to
customers.
protect the privacy of their readers. It will not be
Companies must consider the threat of per-
surprising if a law is passed in the near future
sonal or financial information being altered,
that makes it illegal to sell or distribute records
damaged or destroyed as personnel records or
that have been collected on individual usage.
customer records are greatly at risk of losing
Presently, protected sites summarize raw data
their confidentiality and secrecy – i.e. credit and practice moral server administration by not
card numbers being intercepted. using statistics that can be traced to an individ-
An important security issue to consider is ual.
that information about the Web server’s host
machine may leak through, giving outsiders Commerce transaction privacy
data that will allow them to break into the host The third and fastest growing security concern
machine. Allowing a security hole to the host is the protection of commercial transactions
machine would make a host vulnerable to the over the Internet. With wide, inexpensive and
outside. convenient access to the Internet, one would
Netscape is an example of software in which think electronic commerce would be the new
security holes were found and used to alter way of doing business. However, the concept is
information. Netscape was broken into by two off to a slow start owing to the problems associ-
graduate students who said they found security ated with insuring security, as new security
gaps in some of the software used at many dif- holes keep appearing. The issue of security is a
ferent Internet sites. These gaps were used to major roadblock to the realization of the Web’s
intercept and alter copies of software. Once the recognized potential as a vehicle for commerce.
security routine was altered in the software, then Even as buying and selling are now possible
any program it touched was also put at risk of through the Internet, so have credit card num-
being compromised (Verity, 1995). Netscape bers and other sensitive information been stolen
quickly corrected the problem found in its online. “If consumers and merchants don’t have
10
Security considerations of doing business via the Internet Internet Research: Electronic Networking Applications and Policy
Alicia Aldridge, Michele White and Karen Forcht Volume 7 · Number 1 · 1997 · 9–15

a certain degree of confidence, electronic com- themselves and their businesses against the
merce is not going to work” (Verity, 1995). possibility of systems being invaded, users
The lack of security, reliability and account- identified and commercial transactions compro-
ability make Internet transactions too risky for mised. Some protective options available today
many users. One major fear of merchants is to are very easy and inexpensive, while others are
shield their computers from hackers. If a hacker more complicated and expensive. One inexpen-
would break into their system, they could steal sive option is awareness; simply being more
thousands of credit card numbers. One large aware of the dangers out there and how to avoid
study found that 66 percent of respondents them. More expensive and complicated mea-
cited credit card fraud as a major concern about sures include choosing more secure operating
shopping online. Other concerns included systems, imposing access restrictions and
unsolicited mailing lists (65 percent), merchant enforcing authentication procedures.
legitimacy (59 percent), and lack of data privacy
(57 percent) (Stores, 1996). The Internet allows Systems protection
stockpiling of thousands of credit card numbers Operating systems security
untraceably. Thieves use each number once, Some operating systems are more secure as
reducing the probability of investigation platforms for Web servers than others. The
(Matsumoto, 1995). For example, one master more powerful and flexible the operating
hacker stole more than 20,000 credit card num- system, the more open it is for attack through its
bers. Total intrusions into government, business Web servers. Unix systems are a good example
and university computers on the Internet of an insecure, open system. Servers that offer
increased by 344 percent between 1993 and many features often contain more security holes
1995 (Keating, 1996). than simple servers that only make static files
Additionally, technology companies and available. Some servers can restrict browser
cyber businesses have yet to agree on which access to documents or portions of documents
protocols to use in sending payments over the by using IP addresses or passwords or providing
Net. A battle has erupted over which format to data encryption.
use since these protocols are so important to the Unix systems are more vulnerable to attack
future of the network and digital economy. The because of the large numbers of portals of entry
major players in developing acceptable proto- for hackers to try; whereas, Macintoshes and
cols are banks, software makers (i.e. Microsoft, MS-Windows machines are more difficult to
Netscape) and credit-card companies (Verity, exploit because they are much smaller. Howev-
1995). er, it depends on the experience of the adminis-
Security requirements are very different for trator. As an example, a Macintosh set up by a
different types of businesses. Security require- novice is more susceptible to attack than a Unix
ments in a business-to-business relationship are system run by very experienced administrators.
easy because the people doing business together Two general security precautions should be
know each other. They know who they will be taken by Web servers running on Unix
getting messages from and what types of mes- machines:
sages they will be receiving. If one company
(1) limit the number of log-in accounts, and
receives a message from someone other than the
(2) delete any inactive users.
usual sender, it will be “checked out” before it is
processed. Retailers, on the other hand, have Users should use good passwords and turn off
very little protection when open to the Internet any unused services on the machine. A system
because they are not designed to help people administrator should check the system and Web
share information. Adding security to retail logs regularly for any suspicious activity and
transactions is becoming a big challenge. make sure permissions are set correctly on the
system files (a user can make changes to the
configuration file or document tree that could
Methods of protection
open up security holes).
Now that the dangers of Internet use are Automatic directory listing is an optional
known, users need to take measures to protect feature that is a potential security risk. The
11
Security considerations of doing business via the Internet Internet Research: Electronic Networking Applications and Policy
Alicia Aldridge, Michele White and Karen Forcht Volume 7 · Number 1 · 1997 · 9–15

more a hacker knows about a system, the more between a company and the Internet. Firewalls
likely he/she is to find loopholes. Symbolic Link are designed to be a gateway through which all
following is also dangerous because someone connections are made and offers a secure solu-
can accidentally create a link to a sensitive area tion against intruders getting into and employ-
of the system, opening a hole for a hacker to ees sending out information they should not
enter. (Russell, 1995). The three main principles of a
Administrators should carefully consider to firewall are to:
whom permission has been given for saving (1) defend against known forms of attack,
HTML files for the Web. Adopting a “need to (2) provide protection against breaches,
know policy” for the document root (where (3) detect any unusual events within the fire-
HTML documents are stored) and the server wall.
root (where log and configuration files are kept)
is as critical as it is important for these to be Netscape has developed a secure sockets layer
correct because CGI scripts and contents of the (SSL) to help increase security while using
log and configuration files are stored there. Netscape. SSL is an open protocol designed to
Writers of HTML documents should have secure data communications across computer
access only to their own files. networks and was designed with three layers of
security:
Protecting files and data
(1) server authentication,
Regardless of the operating system used, one of
(2) privacy using encryption, and
the first things a company can do is avoid down-
(3) data integrity.
loading from unknown sources such as bulletin
board systems. The files and software from Another software tool that can be used by
these sources may contain damaging bugs or system administrators is the security adminis-
viruses. Even when downloading files from trator tool for analyzing networks (SATAN),
familiar sources, the program should be run whose main intent is to scan networked com-
through some type of virus-protection software. puters and identify their weaknesses. SATAN
Another easy and inexpensive way to protect was developed to make network administrators
systems is to generate backup copies of critical pay more attention to computer security.
files and store them in a different location, thus
protecting from both physical failure and attack. User, information and message protection
With backup files, lost or compromised data can Users, their personal information, communica-
be destroyed, followed by a reinstallation of the
tions and messages are protected by educating
backup files since restoring backup data is much
users, by imposing restrictions on accessing
faster and more inexpensive than trying to
individual files and accounts, and by authenti-
recreate lost data.
cating sender identity and message integrity.
Many organizations are now designating a
staff member to serve as an information security User education
officer (ISO) whose main responsibility is to There are several steps a company can take to
monitor the environment and watch for any- help protect its clients. The easiest way is to
thing unusual. This person watches for any have a clear site policy on Web usage and edu-
suspicious activities in-house or from someone cate users on the risks associated with using the
on the outside trying to get into the system by Web. Another way to help protect users is by
monitoring how many times a user is logged on summarizing logs and keeping only summarized
and which files are being used. An ISO can also, usage statistics and delete any information that
by careful monitoring, tell how many times a can be attributed to an individual.
password has been hit unsuccessfully, indicating
that someone is trying to break into the system. Access restrictions
There are presently a number of hardware There are three types of access restrictions
and software items that can be purchased to available:
help protect systems. A firewall is one of the (1) IP address, subnet, domain,
most widely used options and is a combination (2) user name and password,
of hardware and software which is placed (3) encryption using public key cryptography.
12
Security considerations of doing business via the Internet Internet Research: Electronic Networking Applications and Policy
Alicia Aldridge, Michele White and Karen Forcht Volume 7 · Number 1 · 1997 · 9–15

IP Address and domain name secure against information, and associated regulation and policy
casual nosiness but not against a determined (National Academy Press, 1994).
hacker. IP address and domain name should be
paired with something that checks the identity Commercial transaction protection
of the user. To strengthen the security of business on the
User name and password protection is only as Internet, two levels of security checks can be
good as the password being used. Users should used:
not use pet names, phone numbers or share user (1) perimeter security can be achieved by using
names and passwords with other users. If the firewalls,
password is not encrypted, a hacker can capture (2) transaction security provides authentica-
it as it passes over the network, as passwords are tion, message integrity, helps protect
passed every time the user requests a secure against eavesdropping, and provides a
document. Generally, users are on the system record of each transaction (“Security
for a significant amount of time which makes it Truce?”, 1995).
easy for a hacker to intercept them.
Encryption – “Data encryption scrambles To achieve transaction security, channel-based
data to prevent it from being read or tampered security and document-based security can be
with during transit. Only those with the right used. Channel-based security secures the chan-
key can read it” (Verity, 1995). Encryption nel being used. SSL (Secure Sockets Layer) is
encodes the text of a message with a key. The the current leader in this field. Document-based
keys come in pairs with one to encode and the security secures the documents that make up
other to decode. In a public system, the encod- the transaction being sent (SHTTP – Secure
ing key (public key) is widely distributed while Hypertext Transport Protocol is the current
the decoding key (private key) is closely held leader). Merchants would like to see a toolkit
and used to decrypt incoming messages. developed to merge these two; however, they
Encryption is only as good as the protection of will support whatever consumers want (Byte,
the key, and if stored on the computer, it is then 1995a, b, c).
vulnerable to hackers. If stored on a piece of Cryptographic software can be used for
paper, it can also be compromised owing to the transaction security. A scrambled message is
extreme visibility. The key must be protected in sent and the receiver must have a key to
order for encryption to work, and the stored unscramble it. As an example, a buyer encrypts
data on a computer should also be encrypted a credit card number; the merchant passes it on
adding an additional level of security. to a bank to be unscrambled and read. The
Authentication of data bank will then tell the merchant if they should
Authentication in a digital setting is a process continue with the sale. This method has been
whereby the receiver of a digital message can be proposed by Visa, Microsoft and Netscape. By
confident of the identity of the sender and/or the using this method, the bank’s exposure to risk is
integrity of the message. Authentication in actually less than purchases made in person or
public-key systems uses recent technology by phone because they can verify the sale before
called digital signatures, which play a function it is made.
for digital documents similar to that played by There are a few security systems already on
handwritten signatures for printed documents. the market to improve security for electronic
A certificate is attached at the end of each docu- commerce. First Virtual allows users to sign up
ment being sent, thus creating a trail that the for a First Virtual account by telephone and
receiver can trace back. This method will only provides their credit card number and contact
work if the user has agreed not to accept any- information before they receive a First Virtual
thing unless it has certificate attached: account number. When users are online and
The progress in the area of trustworthy and con- want to buy something, they simply give their
trolled dissemination of information does not account number instead of their credit card
depend primarily on technology but rather on the
development of an overall model, or architecture, number. First Virtual then contacts the user by
for control, as well as education and public atti- e-mail which gives them the chance to approve
tudes that promote responsible, ethical use of or disapprove the transaction before the credit
13
Security considerations of doing business via the Internet Internet Research: Electronic Networking Applications and Policy
Alicia Aldridge, Michele White and Karen Forcht Volume 7 · Number 1 · 1997 · 9–15

card is billed. First Virtual needs no special reasonable degree of confidence (National
hardware or software. Academy Press, 1994).
Digicash is another security system being This way the publisher can be sure informa-
developed. With digicash, a user makes advance tion the users get is what they intended and
lump-sum payments to a bank that is part of the users can be sure of what they are getting.
digicash system and receives e-cash in return. E- (3) The network must be reliable.
cash is then debited from the checking account
as it is used. Special client software is needed at Handling Internet requirements
both the user’s and merchant’s computers. BBN Internet Services identifies the four Ps of
Cybercash, yet another security system, is Internet Security:
both a debit and credit card system. For the (1) Paranoid – everything forbidden – no con-
credit card user, special software is installed on nection.
the computer. When the credit card number is (2) Prudent – everything forbidden except what
needed, a window pops up and the number is
is explicitly allowed.
entered and encrypted then sent to the mer-
(3) Permissive – opposite of prudent – every-
chant’s software. In debit mode, the connection
thing allowed except what is explicitly
is established at a participating bank.
forbidden.
Vendors have an incentive to reach a better
level of security because they include a dis- (4) Promiscuous – everything allowed (Byte,
claimer on their software which disallows any 1995).
liability to them if the system is broken into An organization must determine which range is
(Verity, 1995). As time passes, better security most appropriate at all levels as needs may vary
methods will be developed and hackers will also between departments. Once a determination
become more skilled. “We will never reach
has been made as to what will and will not be
perfect security in this world of ever-increasing
permitted, degrees of security can be estab-
technology. However, we can reach a level of
lished. Revisions will be necessary as security
security we can live with. The risk that remains
system needs change. The right fix today may not
is a cost of doing business” (Verity, 1995).
be the right fix for tomorrow.
Involvement of governmental agencies To handle Internet requirements, several
To improve security vastly, some governmental steps/measures can be taken:
involvement is necessary: • Use an in-house staff. By relying on an in-
The architecture should provide for mechanisms house staff, the company will have to hire
that protect against classic security threats (to someone with extensive experience in Inter-
confidentiality, integrity, and availability of data net security administration. If they do not
and systems) as small as violations of intellectual
property rights and personal privacy. This security wish to hire someone they will need to pro-
architecture must include technical facilities, vide training for their employees to make
recommended operational procedures, and a them aware of all the possible security dan-
means for recourse within the legal system gers of not enforcing good security and the
(National Academy Press, 1994).
methods available to achieve avoiding them.
Three elements must be present to make securi- • Hire consultants to the in-house staff. The
ty successful: consultants can determine the best method
(1) “Walls” will be used to separate network of security for the firm. The in-house staff
functions and services that are accessible can then be trained only on the method
from those which are not (National Acade- which is best for the firm. This approach will
my Press, 1994). The information providers save the firm time and money because it will
will be able to determine who will have not take as long to get the security method in
access to certain files. place and working.
(2) Data integrity will be protected by technol- • Outsourcing. With outsourcing someone is
ogy:
hired from the outside to come in, view the
A technological means is needed for “certify-
ing” the authenticity of data, so that users are system and install the best security system. It
able to choose sources of information with a will still be necessary to train internal staff so
14
Security considerations of doing business via the Internet Internet Research: Electronic Networking Applications and Policy
Alicia Aldridge, Michele White and Karen Forcht Volume 7 · Number 1 · 1997 · 9–15

that they will be able to maintain the system Byte (1995c), “Network security starts with a workable
once the group leaves. policy” April, p. 93.
Forcht, K.A. and Fore, R.E. III (1995), “Security issues and
concerns with the Internet,” Internet Research, Vol. 5
Conclusion
No. 3, pp. 23-31.
The Internet beckons us in some alluring ways. It
Internet Security Survey Results (1996), http://guide p.infos-
promises a great deal in the way of rewards and
benefits – connections with a multitude of individ- eek.com/www/ns/tables/BTitles?qt=
uals and organizations and access to information Internet+security+col=WWWS st=10
and resources on a scale heretofore unparalleled. Keating, P. (1996), “Protect your money from cybertheft,”
And yet hooking up to the Internet can also be the Money, February, p. 20.
source of significant dangers and risks (Bryan,
Luse, E. (1995), “The devil of the internet,” US News and
1995).
World Report, April 17 p. 14.
Most users today feel they will suffer a greater Matsumoto, C. (1995), “Security issues continue to dog
loss by not connecting to the Internet than they commerce on Internet,” San Jose and Silicon Valley
will face with security issues. “Ensuring security Business Journal, 2-8 October, p. 25.
requires attention to operating procedures, user Miller, L. (1996), “On the internet, virtually no privacy”, USA
attitudes and values, policy and legislative con- Today, May 30, 6D.
text, and a range of other issues” (National
National Academy Press (1994), Realizing the Information
Academy Press, 1994).
Future.
Perfect security will never be reached; howev-
Ratzan, L. (1995), “The Internet cafe-exchange and connec-
er, organizations and users will, hopefully, reach
tion on the Internet: an information outlet for
a level everyone can live with in this age of
romance,” Wilson Library Bulletin, May, pp. 66-7.
cyberspace.
Russell, K. (1995), “Barricading the Net,” Byte, April, p. 89.
Stein, L.D. (1996), “World Wide Web Security FAQ,” <lstein@
References and further reading genome.wi.mit.edu, Version 1.1.7, February 16.
Bryan, J. (1995), “Build a firewall,” Byte, pp. 91-6. Stores (1996), “Internet shopping: new competitor or new
Byte (1995a), “Safe Network Services: FTP, DNS, & XII” April, frontier?”, Special Research Report, April, mc16.
pp. 91-6. Verity, J.W. (1995), “Bullet-proofing the net”, Business Week,
Byte, (1995b), “Security truce?,” July, p. 80. November 13, pp. 98-9.

15

You might also like