SlideShare una empresa de Scribd logo
1 de 13
Eamonn O’Raghallaigh MSc
E-Commerce ,[object Object],[object Object],[object Object]
Fundamental Maxims of E-Commerce Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy ,[object Object],[object Object],[object Object]
JOBS.IE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Integrity, Authentication & Non-Repudiation ,[object Object],[object Object],[object Object],[object Object]
Public / Private Key Cryptology (Asymmetric) ,[object Object],[object Object],[object Object],Adapted from http://www.softdesignz.com/encryption.asp
Technical Attacks – Denial of Service (DoS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Brute Force Attack ,[object Object],[object Object],[object Object]
Distributed Denial of Service (DDoS) Attack ,[object Object],[object Object],[object Object],Adapted from http://www.cisco.com
Non-Technical Attacks - Phishing ,[object Object],[object Object],[object Object],Adapted from www.met.police.uk
Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
NetstarterSL
 
Security environment
Security environmentSecurity environment
Security environment
Jay Choudhary
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 

La actualidad más candente (20)

Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
Security environment
Security environmentSecurity environment
Security environment
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 

Destacado

Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
ILAKIA
 
Browser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeBrowser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google Chrome
Kenneth Auchenberg
 

Destacado (20)

Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Browser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeBrowser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google Chrome
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
 
Security on Windows Azure
Security on Windows AzureSecurity on Windows Azure
Security on Windows Azure
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Window Security Solutions Presentation
Window Security Solutions PresentationWindow Security Solutions Presentation
Window Security Solutions Presentation
 
Open Source Security
Open Source SecurityOpen Source Security
Open Source Security
 
Report of Advance car security system major project
Report of Advance car security system major projectReport of Advance car security system major project
Report of Advance car security system major project
 
Mobile in Banking and Finance - What Make Sense and What Not
Mobile in Banking and Finance - What Make Sense and What NotMobile in Banking and Finance - What Make Sense and What Not
Mobile in Banking and Finance - What Make Sense and What Not
 
Google ppt. mis
Google ppt. misGoogle ppt. mis
Google ppt. mis
 
DSP architecture
DSP architectureDSP architecture
DSP architecture
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 

Similar a Eamonn O Raghallaigh The Major Security Issues In E Commerce

The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
ismaelhaider
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 

Similar a Eamonn O Raghallaigh The Major Security Issues In E Commerce (20)

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Task 3
Task 3Task 3
Task 3
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
C018131821
C018131821C018131821
C018131821
 
Information security
Information securityInformation security
Information security
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Steven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 AssignmentSteven Leahy_IT 543_Unit 1 Assignment
Steven Leahy_IT 543_Unit 1 Assignment
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 

Eamonn O Raghallaigh The Major Security Issues In E Commerce