[EMAIL PROTECTED] wrote:
> Also remember that we now, unfortunately, have to protect data from
> possible internal threats as well.  I read of one recent event where an
> ex-employee was attempting to extort money from his old employer by holding
> backup tapes with data on them and threatening to let it all go on the
> internet.   So building your encryption systems such that the keys are
> either hidden from or split amongst multiple employees is important.

for a long time, insiders have been considered the major source of
fraud. in the early 80s, sytems were evolving that required more than
one person for performing an operation ... and one of the constant
issues then involved countermeasures for collusion involving multiple
authorized parties.

the internet has somewhat defocused attention from the major source of
fraud (insiders) with the possibility that attacks might have originated
by outsiders.

however, within the last two years or so, there was a study published
finding at least 70percent of the data breache incidents (around
identity theft) involved insiders.

misc. collected posts on subject of fraud, risks, vulnerabilities, etc
http://www.garlic.com/~lynn/subpubkey.html#fraud

one of the issues that we faced in x9a10 working group ... that had been
given the requirement to preserve integrity of the financial
infrastructure for all retail transactions ... was how to address the issue.

one of the major issues with retail transactions is the account number
leakage resulting in fraudulent transactions
http://www.garlic.com/~lynn/subpubkey.html#harvest

the work on the original payment gateway for e-commerce involved hiding
account number transactions during transit on the internet using SSL
http://www.garlic.com/~lynn/aadsm5.htm#asrn2
http://www.garlic.com/~lynn/aadsm5.htm#asrn3

however, it was recognized that account numbers were required to be
available (and therefor exposed) in a sizeable number of business
processes (not just the original transaction). the conclusion was
soemwhat that even if you buried the planet under miles of cryptography,
it still wouldn't prevent account number leakage.

the resulting x9a10 standard work for x9.59 transactions
http://www.garlic.com/~lynn/index.html#x959
http://www.garlic.com/~lynn/subpubkey.html#x959

resulted in following standard specification:

1) x9.59 transactions are strongly authenticated (using dynamic data)
2) information (including account number) used in x9.59 transactions
could not be used in non-authenticated, non-x9.59 transactions.

a major threat in payment card retail transactions has been the account
numbere leakage/harvesting and then using the information in a form of
replay attack (using the same information to perform a fraudulent
transaction). the replay attack vulnerability effectively forces the
account number into being treated as a form of shared-secret (if it is
known than it is possible to perform a fraudulent operation, akin to
stealing passwords).

the x9.59 standard includes replay attack countermeasure ... none of the
information from an x9.59 transactions can be harvested and then turned
around to be used in fraudulent transaction. this eliminates knowledge
of the account number as a vulnerability. evesdropping, data breaches,
and/or havesting attacks involving (x9.59) account numbers no longer
result in fraudulent transactions.

this in turn gets back to the assertion about non-x9.59 account
transactions, that even burying the world under miles of crypto is not
sufficient to prevent account number leakage ... in part because of the
large number of different business processes requiring the account
number (as well as the insider vulnerability issue).

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to