SlideShare a Scribd company logo
1 of 30
SECURITY ENVIRONMENT
BY :
JAYPAL SINGH CHOUDHARY
ANUPMA TRIPATHI
SGSITS MBA
INTRODUCTION:
E-commerce security is the protection of e-commerce assets from
unauthorized access, use of it.
The importance of securing e-commerce
– Secrecy: protection against unauthorized data disclosure and
authentication of data source.
– Integrity: prevention against unauthorized data modification.
– Necessity: prevention against data delays or removal.
– Non-repudiation: prevention against any one party from
reneging on an agreement after the fact protect corporation's
image and reputation.
 Unauthorized access
 Loss of message confidentiality or integrity
 User Identification
 Access Control
 Players:
◦ User community
◦ Network Administration
◦ Introducers
“$$”The Internet:
open
virus
Hackers and crackers
 Data being stolen
 Electronic mail can be intercepted and read
 Customer’s credit card numbers may be read
 Login/password and other access information
stolen
 Operating system shutdown
 Filesystem corruption
 User login information can be captured
 E-mail is the most widely used application in
the Internet.
 Who wants to read your mail ?
 Business competitors
 Reporters,Criminals
 Friends and Family
 Two approaches are used:
 PGP: Pretty Good Privacy
 PEM: Privacy-Enhanced Mail
 Authentication problems
 Impersonation attacks
 Privacy problems
 Hacking and similar attacks
 Integrity problems
 Repudiation problems
 How to communicate securely:
 SSL – “the web security protocols”
 IPSEC – “the IP layer security protocol”
 SMIME – “the email security protocol”
 SET – “credit card transaction security protocol”
 Secured HTTP (S-HTTP)
 Security on application layer
 Protection mechanism:
 Digital Signature
 Message authentication
 Message encryption
 Support private & public key cryptograph
 Enhanced HTTP data exchange
Non-repudiation
Authenticity
Confidentiality
Privacy
Availability
- Increased Data Access
- Much more valuable Data
- Scalability with Large User Communities
- Manageability
- Assurance
•Active Content
•Malicious Code
Client threats
• Confidentiality Threats
• Integrity Threats
• Availability Threats
Communication
channels
Threats
•Web-Server ,Commerce Server
Threats
•Password Hacking,Data base
Threats
Server Threats
 Applications that run on computers
 Rely on servers for
 Files
 Devices
 Processing power
 Example: E-mail client
 An application that enables you to send
and receive e-mail
Clients
Clients are Applications
Servers
 Computers or processes that manage
network resources
 Disk drives (file servers)
 Printers (print servers)
 Network traffic (network servers)
 Example: Database Server
 A computer system that processes database
queries
Servers Manage
Resources
Communication
Networks
Networks Connect
Clients and Servers
ELEMENTS OF A COMPREHENSIVE
SECURITY PROGRAM
Have Good Passwords
Use Good Antiviral Products
Use Good Cryptography
Have Good Firewalls
Have a Backup System
Audit and Monitor Systems and Networks
Have Training and Awareness Programs
Test Your Security Frequently
Certification authority
 Malicious code
◦ Viruses
◦ Worms
◦ Trojan horses
◦ Bots, botnets
 Unwanted programs
◦ Browser parasites
◦ Adware
◦ Spyware
Copyright © 2010 Pearson
Education, Inc.
Sli
de
5-
19
 Phishing
◦ Deceptive online attempt to obtain confidential information
◦ Social engineering, e-mail scams, spoofing legitimate Web
sites
◦ Use information to commit fraudulent acts (access checking
accounts), steal identity
 Hacking and cybervandalism
◦ Hackers vs. crackers
◦ Cybervandalism: intentionally disrupting, defacing,
destroying Web site
◦ Types of hackers: white hats, black hats, grey hats
Copyright © 2010 Pearson
Education, Inc.
Sli
de
5-
20
 Credit card fraud/theft
◦ Fear of stolen credit card information deters online
purchases
◦ Hackers target merchant servers; use data to establish
credit under false identity
◦ Online companies at higher risk than offline
 Spoofing: misrepresenting self by using fake e-
mail address
 Pharming: spoofing a Web site
◦ Redirecting a Web link to a new, fake Web site
۩ Electronic data security is important at a time
when people are considering banking and
other financial transaction by PCs.
۩ One major threat to data security is
unauthorized network monitoring also called
packet sniffing.
Messaging Security is a program that
provides protection for companies messaging
infrastructure.
It protects all the personal message of the
company which are related to company’s
vision and mission.
Message Confidentiality
Message and
System Integrity
Message
Authentication
It is use to protect the systems from
unauthorized
access, disclosure, disruption, modification, p
erusal, inspection, recording or destruction.
Cryptographically
singed certificates
E-commerce
authentication
Third-party
authentication
Encryption is the mutation of information
in any form (text, video, and graphics) into
a representation unreadable by anyone
without a decryption key.
 No can figure out the private key from the
corresponding public key. Hence, the key
management problems is mostly confined to
the management of private keys
 The need for sender and receiver to share
secret information over public channels is
completely eliminated.
Security environment

More Related Content

What's hot

What's hot (20)

1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
E-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, LocalE-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, Local
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Frame work of e commerce
Frame work of e commerceFrame work of e commerce
Frame work of e commerce
 
e-commerce
e-commercee-commerce
e-commerce
 
TYPES OF E-COMMERCE
TYPES OF E-COMMERCETYPES OF E-COMMERCE
TYPES OF E-COMMERCE
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
E tailing
E tailingE tailing
E tailing
 
Electronic Market
Electronic MarketElectronic Market
Electronic Market
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Chapter 8 / Electronic Payment
Chapter 8 / Electronic  PaymentChapter 8 / Electronic  Payment
Chapter 8 / Electronic Payment
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
E commerce
E commerceE commerce
E commerce
 
Security & Privacy of Information Technology
Security & Privacy of Information TechnologySecurity & Privacy of Information Technology
Security & Privacy of Information Technology
 

Viewers also liked

The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesQanita Ahmad
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Risk management in e banking
Risk management in e bankingRisk management in e banking
Risk management in e bankingAmer Mushtaq
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
A project report on e business
A project report on e businessA project report on e business
A project report on e businessVerma Pramod
 

Viewers also liked (8)

Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web Services
 
Brian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government PerspectiveBrian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government Perspective
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Risk management in e banking
Risk management in e bankingRisk management in e banking
Risk management in e banking
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
A project report on e business
A project report on e businessA project report on e business
A project report on e business
 

Similar to Security environment

securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptxrehamrere
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTCyberambessador
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...AwodiranOlumide
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commercenikitaTahilyani1
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 

Similar to Security environment (20)

securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPT
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Security in it
Security in it Security in it
Security in it
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 

More from Jay Choudhary

Separation processes
Separation processesSeparation processes
Separation processesJay Choudhary
 
National income and employement
National income and employementNational income and employement
National income and employementJay Choudhary
 
Effective communication
Effective communicationEffective communication
Effective communicationJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 

More from Jay Choudhary (9)

Separation processes
Separation processesSeparation processes
Separation processes
 
National income and employement
National income and employementNational income and employement
National income and employement
 
Markowitz model
Markowitz modelMarkowitz model
Markowitz model
 
Effective communication
Effective communicationEffective communication
Effective communication
 
Economic growth
Economic growthEconomic growth
Economic growth
 
Data comparation
Data comparationData comparation
Data comparation
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 

Recently uploaded

/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 

Recently uploaded (20)

/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 

Security environment

  • 1. SECURITY ENVIRONMENT BY : JAYPAL SINGH CHOUDHARY ANUPMA TRIPATHI SGSITS MBA
  • 2. INTRODUCTION: E-commerce security is the protection of e-commerce assets from unauthorized access, use of it. The importance of securing e-commerce – Secrecy: protection against unauthorized data disclosure and authentication of data source. – Integrity: prevention against unauthorized data modification. – Necessity: prevention against data delays or removal. – Non-repudiation: prevention against any one party from reneging on an agreement after the fact protect corporation's image and reputation.
  • 3.  Unauthorized access  Loss of message confidentiality or integrity  User Identification  Access Control  Players: ◦ User community ◦ Network Administration ◦ Introducers
  • 5.  Data being stolen  Electronic mail can be intercepted and read  Customer’s credit card numbers may be read  Login/password and other access information stolen  Operating system shutdown  Filesystem corruption  User login information can be captured
  • 6.  E-mail is the most widely used application in the Internet.  Who wants to read your mail ?  Business competitors  Reporters,Criminals  Friends and Family  Two approaches are used:  PGP: Pretty Good Privacy  PEM: Privacy-Enhanced Mail
  • 7.  Authentication problems  Impersonation attacks  Privacy problems  Hacking and similar attacks  Integrity problems  Repudiation problems
  • 8.  How to communicate securely:  SSL – “the web security protocols”  IPSEC – “the IP layer security protocol”  SMIME – “the email security protocol”  SET – “credit card transaction security protocol”
  • 9.  Secured HTTP (S-HTTP)  Security on application layer  Protection mechanism:  Digital Signature  Message authentication  Message encryption  Support private & public key cryptograph  Enhanced HTTP data exchange
  • 11. - Increased Data Access - Much more valuable Data - Scalability with Large User Communities - Manageability - Assurance
  • 12.
  • 13. •Active Content •Malicious Code Client threats • Confidentiality Threats • Integrity Threats • Availability Threats Communication channels Threats •Web-Server ,Commerce Server Threats •Password Hacking,Data base Threats Server Threats
  • 14.  Applications that run on computers  Rely on servers for  Files  Devices  Processing power  Example: E-mail client  An application that enables you to send and receive e-mail Clients Clients are Applications
  • 15. Servers  Computers or processes that manage network resources  Disk drives (file servers)  Printers (print servers)  Network traffic (network servers)  Example: Database Server  A computer system that processes database queries Servers Manage Resources
  • 17. ELEMENTS OF A COMPREHENSIVE SECURITY PROGRAM Have Good Passwords Use Good Antiviral Products Use Good Cryptography Have Good Firewalls Have a Backup System Audit and Monitor Systems and Networks Have Training and Awareness Programs Test Your Security Frequently
  • 19.  Malicious code ◦ Viruses ◦ Worms ◦ Trojan horses ◦ Bots, botnets  Unwanted programs ◦ Browser parasites ◦ Adware ◦ Spyware Copyright © 2010 Pearson Education, Inc. Sli de 5- 19
  • 20.  Phishing ◦ Deceptive online attempt to obtain confidential information ◦ Social engineering, e-mail scams, spoofing legitimate Web sites ◦ Use information to commit fraudulent acts (access checking accounts), steal identity  Hacking and cybervandalism ◦ Hackers vs. crackers ◦ Cybervandalism: intentionally disrupting, defacing, destroying Web site ◦ Types of hackers: white hats, black hats, grey hats Copyright © 2010 Pearson Education, Inc. Sli de 5- 20
  • 21.  Credit card fraud/theft ◦ Fear of stolen credit card information deters online purchases ◦ Hackers target merchant servers; use data to establish credit under false identity ◦ Online companies at higher risk than offline  Spoofing: misrepresenting self by using fake e- mail address  Pharming: spoofing a Web site ◦ Redirecting a Web link to a new, fake Web site
  • 22. ۩ Electronic data security is important at a time when people are considering banking and other financial transaction by PCs. ۩ One major threat to data security is unauthorized network monitoring also called packet sniffing.
  • 23. Messaging Security is a program that provides protection for companies messaging infrastructure. It protects all the personal message of the company which are related to company’s vision and mission.
  • 24. Message Confidentiality Message and System Integrity Message Authentication
  • 25. It is use to protect the systems from unauthorized access, disclosure, disruption, modification, p erusal, inspection, recording or destruction.
  • 27. Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.
  • 28.
  • 29.  No can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys  The need for sender and receiver to share secret information over public channels is completely eliminated.