Cryptography is an algorithm used for secure communication in the presence of third parties through encryption and decryption. It is a common method which enables users to store private or sensitive information transmits across an insecure network, like internet. In this case, it is suggested to use for protecting and guarding the UPS official website information transaction of the between UPS and its customers.
In encryption process, the original or ordinary information (Plaintext) is converted into an unintelligible text (Ciphertext) that only the authorized parties with the key are able to read. The authorized parties perform decryption by reversing the process of encryption which converts the Ciphertext back into Plaintext with the key that given by the originator.
As both UPS and its customers can take part in being information sender or receiver, the public key and private key holder can be interchanged. Symmetric Cryptography is ...view middle of the document...
The above cryptography techniques can be used at the point where UPS sends out the invoice note or updates order details and customers modify or track the order reference. To ensure a secure state of Confidentiality, Integrity and Availability.
Firewall and Intrusion Detection
UPS security breaches were found that a malware installed by hackers, which cannot be detected by UPS anti-virus system, on its in-store cash register systems. Under this circumstance, people with bad intent are able to steal the credit and debit card data of customers easily.
Firewall is a technological barrier preventing any unauthorized or malice communication between networks. On the session level protection, Stateful Firewall is suggested to use in this case as keeps track of the state of network connections travelling across, like TCP streams, UDP communication. For instance, firewall intercepts the SYN from an external host and send back a SYN/ACK without passing the segment onto the target host. Stateful inspection also monitors the incoming and outgoing packets over time, blocking viruses like the malware installed by hackers to protect internal network from outside attack, as well as the state of the connection, and stores the data in dynamic state tables. It examine the packet header and control fields with a large protocol and application coverage protecting both “Client-to-Server” and “Server-to-Client” communication.
Intrusion Detection System
Intrusion detection system can be a device or a software application which serves the three essential security functions including monitor, detect and respond to unauthorized activities. It examines the operation of firewalls, key management servers and files for sorting out any malicious activities or policy violations and produces reports to a management station.
We imply anomaly-based IDS for UPS as to detect attacks and search for any unusual activities. Through threshold detection, the system counts the number of occurrences of a specific event over an interval of time. With the consecutive commands and advanced statistical discrimination, UPS is then capable to detect unknown attacks and do further solution seeking.