Electronic Commerce Semester 1 Term 1 Lecture 14.

Slides:



Advertisements
Similar presentations
Magister Manajemen Sistem Informasi Transactions Security Non Technical Slides prepared by Tb. Maulana Kusuma, Universitas Gunadarma Communications Server.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Security+ Guide to Network Security Fundamentals
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Dimensions of E – Commerce Security
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
ACM 511 Introduction to Computer Networks. Computer Networks.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Network Security Introduction
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Security Issues in Information Technology
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Security
COMPUTER SECURITY CONCEPTS
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Electronic Commerce Systems
Cryptographic Hash Function
Lecture 5. Security Threats
Cryptography And Network Security
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
BY GAWARE S.R. DEPT.OF COMP.SCI
Information and Network Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
COMPUTER PRIVACY.
The introduction and the essential elements of E- Commerce.
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Digital Signatures and Forms
Chapter 27: System Security
Chapter 5 Electronic Commerce | Security
Pooja programmer,cse department
INFORMATION SYSTEMS SECURITY and CONTROL
DATABASE SECURITY For CSCL (BIM).
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chinese wall model in the internet Environment
ONLINE SECURE DATA SERVICE
Electronic Payment Security Technologies
Dark Web Domain Status Report
A Model For Network Security
Message Authentication
Chapter 5 Computer Security
Presentation transcript:

Electronic Commerce Semester 1 Term 1 Lecture 14

Firewalls & Transaction Security While corporate presence on the Internet has soared, many companies are simply providing information about themselves and have not yet begun to provide full scale transactions for buying and selling online This restraint is primarily the result of concern about network and transaction security Likewise, concern over transaction security has made many consumers averse to making payments over the Internet

Internet Security Terms Authentication: A way to verify that message senders are who they say they are Integrity: Ensuring that information will not be accidentally or maliciously altered or destroyed Reliability: Ensuring that systems will perform consistently and at an acceptable level of quality

Internet Security Terms (Continued) Encryption: A process of making information indecipherable except to those with a decoding key Firewall: A filter between a corporate network and the Internet that keeps the corporate network secure from intruders but allows authenticated corporate users uninhibited access to the Internet

Firewalls & Network Security Typically a firewall allows insiders to have full access to services on the outside while granting access from the outside on a selective basis, based on user names and passwords A firewall works by establishing a barrier between the corporate network (secure network) and the external Internet (untrusted network)

Transaction Security Transaction security has become a high profile concern because of the increasing number of merchants trying to spur commerce online Consumer confidence in the reliability and protection of business transactions against third-party threats must be enhanced before electronic commerce can succeed

Five Internet Security Requirements Privacy: the ability to control who sees (or cannot see) information and under what terms Authenticity: The ability to know the identities of communicating parties Integrity: The assurance that stored or transmitted information is unaltered Availability: The ability to know when information and communication services will (or will not be) available

Types of Online Transactions The type of transaction depends on the type of data (or content) being sent across the network The different categories of data are: –Public data –Copyright data –Confidential data –Secret data

Public Data This type of data has no security restrictions and may be read by anyone Such data should, however, be protected from unauthorised tampering or modification

Copyright Data This type of data is copyrighted but not secret The owner of the data is willing to provide it, but wishes to be paid for it In order to maximise revenue, security must be tight

Confidential Data This type of data contains content that is secret, but the existence of the data is not a secret Such data include bank account statements and personal files

Secret Data The very existence of this type of data is a secret and must be kept confidential at all times It is necessary to monitor and log all access and attempted access to secret data