SlideShare una empresa de Scribd logo
1 de 30
E-Business Issues In Cyberspace
Presented By:-
Rahul Kumar
Preeti Sachdeva
Security
• To protect data from unauthorised access and virus
(malicious code & trojan horse).
Basic Security Issues
• Authentication
• Authorisation
• Confidentiality
• Integrity
• Non repudiation
Authentication
• The process by which one entity can verifies that
another entity is who.
Authorisation
• The process that ensures that the person has the right
to access certain resources.
Confidentiality
• Keeping private or sensitive information from being
disclosed to unauthorised individuals, entities or
processes.
Integrity
• The ability to protect data from being altered or
destroyed by unauthorised access or accidental
manner.
Non Repudiation
• The ability to limit parties from refusing that
legitimate transaction took place, usually by means
of a signature.
Types of Security Threats
• Denial of Service
• Unauthorized Access
• Theft and Fraud
Denial of Service
Two primary types of DOS attacks:
• Spamming
• Viruses
Spamming
• Sending unsolicited commercial emails to
individuals
• E-mail bombing caused by a hacker targeting one
computer or network, and sending thousands of
email messages to it.
• Surfing involves hackers placing software agents
onto a third-party system and setting it off to send
requests to an intended target.
• DDOS (distributed denial of service attacks)
involves hackers placing software agents onto a
number of third-party systems and setting them off
to simultaneously send requests to an intended target
Viruses
• Self-replicating computer programs designed to
perform unwanted events.
Unauthorized Access
• Illegal access to systems, applications or data
• Passive unauthorized access –listening to communications channel
for finding secrets. May use content for damaging purposes
• Active unauthorized access
 Modifying system or data
 Message stream modification
• Changes intent of messages, e.g., to abort or delay a negotiation on
a contract
• Masquerading or spoofing –sending a message that appears to be
from someone else.
• Impersonating another user at the ―name‖(changing the From
field) or IP levels (changing the source and/or destination IP
address of packets in the network)
• Sniffers–software that illegally access data traversing across the
network.
• Software and operating systems‘ security holes
Theft and Fraud
• Fraud occurs when the stolen data is used or modified.
• Theft of software via illegal copying from company‘s servers.
• Theft of hardware, specifically laptops.
Types Security
• Encryption
• Decryption
• Cryptography
• Virtual Private Network
• Gate
• Biometric Systems
• Digital Signature
• Digital Certificate
• Secure Socket Layer
• Transaction Layer Security
Encryption
• The process of scrambling a message in such a way
that it is difficult, expecting or time consuming for
an unauthorised person to unscramble (decrypt) it.
Decryption
• The process of unscrambling a message in such a
way that it is understand by authorised person.
Cryptography
• It is the process of encryption and decryption of
message or data by using different algorithms or
software's.
Virtual Private Network
• A network that uses the public internet to carry
information but remains private by using encryption
to scramble the communications, authentication to
ensure that information has not to been tampered
with, and access control to verify the identity of
anyone using the network.
Gateway
• Gateway provide a secure way to do online transactions i.e.
payment of various orders.
Biometric System
• Authentication systems that identify a person by
measurement of a biological characteristics.
• There are various types of biometrics systems:-
1. Physiological Biometrics
2. Behavioural Biometrics
3. Fingerprint Scanning
4. Iris Scanning
5. Voice Scanning
6. Keystroke Monitoring
Digital Signature
• An identifying code that can be used to authenticate
the identity of the sender of a document.
Digital Certificate
• A method for verification that the holder of a public
or a private key is who he or she claim to be.
Secure Socket Layer
• Protocol that utilizes standard certificate for
authentication and data encryption to ensyre privacy
or confidentiality.
Transaction Layer Security
• It work same as Secure Socket Layer (SSL) and it is
another name of SSL after 1996.
Security issues in e business
Security issues in e business
Security issues in e business

Más contenido relacionado

La actualidad más candente

EDI (electronic data interchange)
EDI (electronic data interchange)EDI (electronic data interchange)
EDI (electronic data interchange)Barkha Maheshwari
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)rahul kundu
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchangeAbhishek Nayak
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesInderjeet Singh
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system60ml
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems ShortenedRitesh Verma
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
E business application
E business applicationE business application
E business applicationnitinsoni02
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 

La actualidad más candente (20)

Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
EDI (electronic data interchange)
EDI (electronic data interchange)EDI (electronic data interchange)
EDI (electronic data interchange)
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
E payment
E paymentE payment
E payment
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchange
 
E marketing and Advertisement
E marketing and AdvertisementE marketing and Advertisement
E marketing and Advertisement
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems Shortened
 
E commerce security
E commerce securityE commerce security
E commerce security
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
E business application
E business applicationE business application
E business application
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
e-commerce
e-commercee-commerce
e-commerce
 

Similar a Security issues in e business

Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxRizwanBasha12
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.pptasm071149
 
E commerce security
E commerce securityE commerce security
E commerce securityRoha1234567
 
L4 internet security
L4   internet securityL4   internet security
L4 internet securitylistergc
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdfKIYALIBAN1
 

Similar a Security issues in e business (20)

Security problems.pptx
Security problems.pptxSecurity problems.pptx
Security problems.pptx
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Computer security
Computer securityComputer security
Computer security
 
Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Security
SecuritySecurity
Security
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
9. Computer Ethics.ppt
9. Computer Ethics.ppt9. Computer Ethics.ppt
9. Computer Ethics.ppt
 
E commerce security
E commerce securityE commerce security
E commerce security
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 

Más de Rahul Kumar

Technology acquisition
Technology acquisitionTechnology acquisition
Technology acquisitionRahul Kumar
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & ExtranetRahul Kumar
 
Technology Life Cycle With Mobile Generation Example
Technology Life Cycle With Mobile Generation ExampleTechnology Life Cycle With Mobile Generation Example
Technology Life Cycle With Mobile Generation ExampleRahul Kumar
 
Jet Airways 2013
Jet Airways 2013Jet Airways 2013
Jet Airways 2013Rahul Kumar
 

Más de Rahul Kumar (8)

Jet airways
Jet airwaysJet airways
Jet airways
 
Apple
AppleApple
Apple
 
Nokia
NokiaNokia
Nokia
 
Technology acquisition
Technology acquisitionTechnology acquisition
Technology acquisition
 
E governancee
E governanceeE governancee
E governancee
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
Technology Life Cycle With Mobile Generation Example
Technology Life Cycle With Mobile Generation ExampleTechnology Life Cycle With Mobile Generation Example
Technology Life Cycle With Mobile Generation Example
 
Jet Airways 2013
Jet Airways 2013Jet Airways 2013
Jet Airways 2013
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Último (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Security issues in e business

  • 1. E-Business Issues In Cyberspace Presented By:- Rahul Kumar Preeti Sachdeva
  • 2. Security • To protect data from unauthorised access and virus (malicious code & trojan horse).
  • 3. Basic Security Issues • Authentication • Authorisation • Confidentiality • Integrity • Non repudiation
  • 4. Authentication • The process by which one entity can verifies that another entity is who.
  • 5. Authorisation • The process that ensures that the person has the right to access certain resources.
  • 6. Confidentiality • Keeping private or sensitive information from being disclosed to unauthorised individuals, entities or processes.
  • 7. Integrity • The ability to protect data from being altered or destroyed by unauthorised access or accidental manner.
  • 8. Non Repudiation • The ability to limit parties from refusing that legitimate transaction took place, usually by means of a signature.
  • 9. Types of Security Threats • Denial of Service • Unauthorized Access • Theft and Fraud
  • 10. Denial of Service Two primary types of DOS attacks: • Spamming • Viruses
  • 11. Spamming • Sending unsolicited commercial emails to individuals • E-mail bombing caused by a hacker targeting one computer or network, and sending thousands of email messages to it. • Surfing involves hackers placing software agents onto a third-party system and setting it off to send requests to an intended target. • DDOS (distributed denial of service attacks) involves hackers placing software agents onto a number of third-party systems and setting them off to simultaneously send requests to an intended target
  • 12. Viruses • Self-replicating computer programs designed to perform unwanted events.
  • 13. Unauthorized Access • Illegal access to systems, applications or data • Passive unauthorized access –listening to communications channel for finding secrets. May use content for damaging purposes • Active unauthorized access  Modifying system or data  Message stream modification • Changes intent of messages, e.g., to abort or delay a negotiation on a contract • Masquerading or spoofing –sending a message that appears to be from someone else. • Impersonating another user at the ―name‖(changing the From field) or IP levels (changing the source and/or destination IP address of packets in the network) • Sniffers–software that illegally access data traversing across the network. • Software and operating systems‘ security holes
  • 14. Theft and Fraud • Fraud occurs when the stolen data is used or modified. • Theft of software via illegal copying from company‘s servers. • Theft of hardware, specifically laptops.
  • 15. Types Security • Encryption • Decryption • Cryptography • Virtual Private Network • Gate • Biometric Systems • Digital Signature • Digital Certificate • Secure Socket Layer • Transaction Layer Security
  • 16. Encryption • The process of scrambling a message in such a way that it is difficult, expecting or time consuming for an unauthorised person to unscramble (decrypt) it.
  • 17. Decryption • The process of unscrambling a message in such a way that it is understand by authorised person.
  • 18. Cryptography • It is the process of encryption and decryption of message or data by using different algorithms or software's.
  • 19.
  • 20. Virtual Private Network • A network that uses the public internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not to been tampered with, and access control to verify the identity of anyone using the network.
  • 21.
  • 22. Gateway • Gateway provide a secure way to do online transactions i.e. payment of various orders.
  • 23. Biometric System • Authentication systems that identify a person by measurement of a biological characteristics. • There are various types of biometrics systems:- 1. Physiological Biometrics 2. Behavioural Biometrics 3. Fingerprint Scanning 4. Iris Scanning 5. Voice Scanning 6. Keystroke Monitoring
  • 24. Digital Signature • An identifying code that can be used to authenticate the identity of the sender of a document.
  • 25. Digital Certificate • A method for verification that the holder of a public or a private key is who he or she claim to be.
  • 26. Secure Socket Layer • Protocol that utilizes standard certificate for authentication and data encryption to ensyre privacy or confidentiality.
  • 27. Transaction Layer Security • It work same as Secure Socket Layer (SSL) and it is another name of SSL after 1996.