SlideShare una empresa de Scribd logo
1 de 37
Q
Transacting or facilitating business on
internet is called e-commerce, and its
revolve around buying and selling
The use of internet and web to transit the
business.
Digitally refers to commercial transactions
between organization and individual.
Most serious losses involved theft of
proprietary information or financial fraud
40% reported attacks from outside the
organization
38% experienced denial of service attacks
94% detected virus attacks
is any illegal act committed using a computer
network especially the Internet.
Cybercrime is a subset of computer crime.

Stealing and using or selling of data:
Company data
Personal information in company files
ability to ensure that information being displayed on a
Web site or transmitted/received over the Internet has
not been altered in any way by an unauthorized party
ability to ensure that e-commerce participants do not
deny (repudiate) online actions
I
ability to identify the identity of a person or entity with whom
you are dealing on the Internet

ability to ensure that messages and data are available only to
those authorized to view them

ability to control use of information a customer provides about
himself or herself to merchant

:
ability to ensure that an e-commerce site continues to function
as intended
• Designed to breach system security and threaten digital information
 Viruses
 Worms
 Trojan horses
 Bots, botnets

 Browser parasites
 Adware
 Spyware
 computer program that has ability to replicate and spread to
other files; most also deliver a “payload” of some sort (may
be destructive or benign)
 designed to spread from computer to computer rather than
from file to file
 Program that actively reproduces itself across a network
 appears to be benign, but then does something other than
expected (i.e., games that steal sign-ons and passwords)
Is a malware used by unauthorized person to make a
computer zombie for having access on computer
Includes adware parasites spyware or any other
programme application which is installed on
computer through internet traffic without informed
consent of a particular user
Installed in a computer from social networking
Purpose is to just annoying you
Not perform criminal activity
 Installed through click on some link
 Captured your activities and then send to unauthorized
person
 Transmit your activities
 Change your home page
Small programs install themselves surreptitiously on computers to

monitor user Web surfing activity and serve up advertising

 Captured our key strokes
 Steal our confidential or financial information Like our
login & password
Deceptive online attempt to obtain confidential
information
Social engineering, e-mail scams, spoofing legitimate
Web sites
Use information to commit fraudulent acts (access
checking accounts), steal identity
 Hackers vs. crackers
 Cyber vandalism: intentionally disrupting, defacing, destroying
Web site
 Types of hackers: white hats, black hats, grey hats
hacker is not cyber
criminal
know all about the
operating system
they always do
constructive work

 A person who breaks
security onSystem
intrusion
 System damage
 Cybervandalism
 cracker is cyber
criminal
 crackers creates nothing
& destroy much
Individual who intends to gain unauthorized access to
computer systems Types of hackers include :
 White hats
 Black hats
 Grey hats
 Professional Security Experts not perform criminal activity

 lack hat hackers break into secure networks to destroy data
or make the network unusable for those who are authorized
to use the network
A grey hat hacker is a combination of a
black hat and a white hat hacker A grey hat hacker
may surf the internet and hack into a computer
system for the sole purpose of notifying the
administrator that their system has a security
defect, for example. Then they may offer to correct
the defect for a fee
Used to denote hacker with criminal intent (two
terms often used interchangeably)
Intentionally disrupting, defacing or destroying a
Web site
Fear that credit card information will be stolen
deters online purchases
Hackers target credit card files and other customer
information files on merchant servers; use stolen
data to establish credit under false identity
One solution: New identity verification mechanisms
Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else
Often redirects users to another Web site
Threatens integrity of site; authenticity
Hackers flood Web site with useless traffic to
inundate and overwhelm network
hackers use numerous computers to attack target
network from numerous launch points
•

A generic term for malicious software
A number of factors have contributed to the overall increase in
malicious code. Among these factors, the following are
paramount:
Mixing data and executable instructions
Increasingly homogenous computing environments
Unprecedented connectivity
Larger clueless user base
 Type of eavesdropping program that monitors information
traveling over a network; enables hackers to steal
proprietary information from anywhere on a network
 Single largest financial threat
 Poorly designed server and client software: Increase in
complexity of software programs has contributed to an
increase is vulnerabilities that hackers can exploit
 The process of transforming plain text or data into cipher
text that cannot be read by anyone other than the sender and
receiver
Purpose: Secure stored information and information
transmission Provides:

Message integrity
Nonrepudiation
Authentication
Confidentiality
Also known as secret key encryption
Both the sender and receiver use the same
digital key to encrypt and decrypt message
Requires a different set of keys for each
transaction
 solves symmetric key encryption problem of having to
exchange secret key
 Uses two mathematically related digital keys – public key
(widely disseminated) and private key (kept secret by
owner)
 Both keys are used to encrypt and decrypt message
 Once key is used to encrypt message, same key cannot be
used to decrypt message
 For example, sender uses recipient’s public key to encrypt
message; recipient uses his/her private key to decrypt it
A public key encryption system can be viewed as a series of public and
private keys that lock data when they are transmitted and unlock the data
when they are received. The sender locates the recipient’s public key in a
directory and uses it to encrypt a message. The message is sent in
encrypted form over the Internet or a private network. When the
encrypted message arrives, the recipient uses his or her private key to
decrypt the data and read the message.
• Addresses weaknesses of public key encryption
(computationally slow, decreases transmission
speed, increases processing time) and symmetric
key encryption (faster, but more secure)
• Uses symmetric key encryption to encrypt document
but public key encryption to encrypt and send
symmetric key
 Most common form of securing channels of
communication; used to establish a secure negotiated
session (client-server session in which URL of requested
document, along with contents, is encrypted)
 Alternative method; provides a secure message-oriented
communications protocol designed for use in conjunction
with HTTP
• Hardware or software filters communications
packets and prevents some packets from entering the
network based on a security policy
• Software servers that handle all communications
originating from or being sent to the Internet (act as
“spokesperson” or “bodyguard” for the
organization)
Authentication and access control
mechanisms

Easiest and least expensive way to prevent
threats to system integrity
References
KENNETH C LOUDEN

Más contenido relacionado

La actualidad más candente

Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
Ritesh Goyal
 

La actualidad más candente (20)

E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security training course ppt
Cyber security training course pptCyber security training course ppt
Cyber security training course ppt
 
Cia security model
Cia security modelCia security model
Cia security model
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 

Destacado

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Chap 8 ethical, social and political issues in e-commerce
Chap 8   ethical, social and political issues in e-commerceChap 8   ethical, social and political issues in e-commerce
Chap 8 ethical, social and political issues in e-commerce
Norisuwanah Jaffar
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
Mohsin Ahmad
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

Destacado (15)

Top countries to study english
Top countries to study englishTop countries to study english
Top countries to study english
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chap 8 ethical, social and political issues in e-commerce
Chap 8   ethical, social and political issues in e-commerceChap 8   ethical, social and political issues in e-commerce
Chap 8 ethical, social and political issues in e-commerce
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Database Security
Database SecurityDatabase Security
Database Security
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar a Online security and payment system

onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
jainutkarsh078
 
Security environment
Security environmentSecurity environment
Security environment
Jay Choudhary
 

Similar a Online security and payment system (20)

onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Security environment
Security environmentSecurity environment
Security environment
 

Más de Gc university faisalabad

Más de Gc university faisalabad (20)

Marketing
MarketingMarketing
Marketing
 
Communication
CommunicationCommunication
Communication
 
Entrepreneurship and business management
Entrepreneurship and business managementEntrepreneurship and business management
Entrepreneurship and business management
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
 
7 wonders of the world
7 wonders of  the world7 wonders of  the world
7 wonders of the world
 
Business law
Business lawBusiness law
Business law
 
Introduction to accounting
Introduction to accountingIntroduction to accounting
Introduction to accounting
 
Managing brands for competitive advantages
Managing brands for  competitive  advantagesManaging brands for  competitive  advantages
Managing brands for competitive advantages
 
Recording business transactions
Recording business transactionsRecording business transactions
Recording business transactions
 
Macro economics
Macro economicsMacro economics
Macro economics
 
Economics
EconomicsEconomics
Economics
 
Planning and recruiting
Planning and recruitingPlanning and recruiting
Planning and recruiting
 
New product development life cycel
New product development life cycelNew product development life cycel
New product development life cycel
 
Financial leverage
Financial leverageFinancial leverage
Financial leverage
 
Principles of management
Principles of managementPrinciples of management
Principles of management
 
accounting information system
accounting information systemaccounting information system
accounting information system
 
Basic concept
Basic conceptBasic concept
Basic concept
 
Data base
Data baseData base
Data base
 
Inveatment analysis and portfolio management
Inveatment analysis and portfolio managementInveatment analysis and portfolio management
Inveatment analysis and portfolio management
 

Último

Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Último (20)

Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 

Online security and payment system

  • 1.
  • 2. Q
  • 3. Transacting or facilitating business on internet is called e-commerce, and its revolve around buying and selling The use of internet and web to transit the business. Digitally refers to commercial transactions between organization and individual.
  • 4. Most serious losses involved theft of proprietary information or financial fraud 40% reported attacks from outside the organization 38% experienced denial of service attacks 94% detected virus attacks
  • 5. is any illegal act committed using a computer network especially the Internet. Cybercrime is a subset of computer crime. Stealing and using or selling of data: Company data Personal information in company files
  • 6.
  • 7. ability to ensure that information being displayed on a Web site or transmitted/received over the Internet has not been altered in any way by an unauthorized party ability to ensure that e-commerce participants do not deny (repudiate) online actions
  • 8. I ability to identify the identity of a person or entity with whom you are dealing on the Internet ability to ensure that messages and data are available only to those authorized to view them ability to control use of information a customer provides about himself or herself to merchant : ability to ensure that an e-commerce site continues to function as intended
  • 9. • Designed to breach system security and threaten digital information  Viruses  Worms  Trojan horses  Bots, botnets  Browser parasites  Adware  Spyware
  • 10.  computer program that has ability to replicate and spread to other files; most also deliver a “payload” of some sort (may be destructive or benign)  designed to spread from computer to computer rather than from file to file  Program that actively reproduces itself across a network  appears to be benign, but then does something other than expected (i.e., games that steal sign-ons and passwords)
  • 11. Is a malware used by unauthorized person to make a computer zombie for having access on computer Includes adware parasites spyware or any other programme application which is installed on computer through internet traffic without informed consent of a particular user Installed in a computer from social networking Purpose is to just annoying you Not perform criminal activity
  • 12.  Installed through click on some link  Captured your activities and then send to unauthorized person  Transmit your activities  Change your home page Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising  Captured our key strokes  Steal our confidential or financial information Like our login & password
  • 13. Deceptive online attempt to obtain confidential information Social engineering, e-mail scams, spoofing legitimate Web sites Use information to commit fraudulent acts (access checking accounts), steal identity  Hackers vs. crackers  Cyber vandalism: intentionally disrupting, defacing, destroying Web site  Types of hackers: white hats, black hats, grey hats
  • 14. hacker is not cyber criminal know all about the operating system they always do constructive work  A person who breaks security onSystem intrusion  System damage  Cybervandalism  cracker is cyber criminal  crackers creates nothing & destroy much
  • 15. Individual who intends to gain unauthorized access to computer systems Types of hackers include :  White hats  Black hats  Grey hats  Professional Security Experts not perform criminal activity  lack hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network
  • 16. A grey hat hacker is a combination of a black hat and a white hat hacker A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. Then they may offer to correct the defect for a fee
  • 17. Used to denote hacker with criminal intent (two terms often used interchangeably) Intentionally disrupting, defacing or destroying a Web site
  • 18. Fear that credit card information will be stolen deters online purchases Hackers target credit card files and other customer information files on merchant servers; use stolen data to establish credit under false identity One solution: New identity verification mechanisms
  • 19. Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else Often redirects users to another Web site Threatens integrity of site; authenticity
  • 20. Hackers flood Web site with useless traffic to inundate and overwhelm network hackers use numerous computers to attack target network from numerous launch points
  • 21.
  • 22. • A generic term for malicious software A number of factors have contributed to the overall increase in malicious code. Among these factors, the following are paramount: Mixing data and executable instructions Increasingly homogenous computing environments Unprecedented connectivity Larger clueless user base
  • 23.  Type of eavesdropping program that monitors information traveling over a network; enables hackers to steal proprietary information from anywhere on a network  Single largest financial threat  Poorly designed server and client software: Increase in complexity of software programs has contributed to an increase is vulnerabilities that hackers can exploit
  • 24.
  • 25.
  • 26.  The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and receiver Purpose: Secure stored information and information transmission Provides: Message integrity Nonrepudiation Authentication Confidentiality
  • 27. Also known as secret key encryption Both the sender and receiver use the same digital key to encrypt and decrypt message Requires a different set of keys for each transaction
  • 28.
  • 29.  solves symmetric key encryption problem of having to exchange secret key  Uses two mathematically related digital keys – public key (widely disseminated) and private key (kept secret by owner)  Both keys are used to encrypt and decrypt message  Once key is used to encrypt message, same key cannot be used to decrypt message  For example, sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it
  • 30. A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message.
  • 31. • Addresses weaknesses of public key encryption (computationally slow, decreases transmission speed, increases processing time) and symmetric key encryption (faster, but more secure) • Uses symmetric key encryption to encrypt document but public key encryption to encrypt and send symmetric key
  • 32.  Most common form of securing channels of communication; used to establish a secure negotiated session (client-server session in which URL of requested document, along with contents, is encrypted)  Alternative method; provides a secure message-oriented communications protocol designed for use in conjunction with HTTP
  • 33. • Hardware or software filters communications packets and prevents some packets from entering the network based on a security policy • Software servers that handle all communications originating from or being sent to the Internet (act as “spokesperson” or “bodyguard” for the organization)
  • 34. Authentication and access control mechanisms Easiest and least expensive way to prevent threats to system integrity
  • 35.
  • 36.