E-cert (Digital Certificate)

Slides:



Advertisements
Similar presentations
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Advertisements

Trusting the Trust Budi Rahardjo Inixindo Security Day Seminar The Executive Club, Jakarta, 19 March 2009.
Summer School Certificates Diego Romano & Gilda Team.
MITP 458 Application Layer Security By Techjocks.
Anonymity and Security in Public Internet Forums Ho-fung LEUNG Senior Member, IEEE Dept. of Computer Science & Engineering The Chinese University of Hong.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
More to Learn Check digit –It is used to check whether a number is valid. –Both ISBN and Hong Kong Identity Card numbers contain a check digit for data.
1. 2 Data Extraction – Project Arrow Office Daily data of various fields of Project Arrow office is monitored at various level with the help of “Data.
Student Technology Use. 1. I can share passwords with my parents and teachers.
Encryption Objective 1: Explain data encryption procedures.
R ECOMMENDATION F OR SRI LANKAN ICT POLICY (T RUST A ND S ECURITY )
By Kovtunenko Inna. Payment risks Protection measures Safety rules.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
KeePass Open Source Software James Hadvabne Open Source Software James Hadvabne.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Demo of Account Activation Pg.0. Click here to activate the account E-Procurement Pilot Programme Pg.1.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Payment Systems Unit 34: E-commerce M2 - Compare two different payment systems used in e-commerce systems.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
By: Sambit Pulak XI-IB. Authenticity means establishing a user ’ s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios,
Internet Banking.
Chapter 1 – Introduction Part 4 1. Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message.
Encryption CS110: Computer Science and the Internet.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Digital Signatures and Digital Certificates Monil Adhikari.
Authenication for e- learning and extra- curriculum activities Secure WIFI access in school campus Digital signing of e- Cheque Secure .
Fundamental Digital Electronics
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Access Account Activation and Electronic Signature Web Application.
Information Systems Design and Development Security Precautions Computing Science.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
CAcert, a Security Community. The Problem Back in 2001: Sydney had WLAN network access everywhere (Sydney Wireless) People were running their own mailservers.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
how to prevent them from being successful
“Big Leap to Smarter City: Digital Signature Automation + Digital Certificate” 22 April 2016 (10: :00) Seminar and April 2016 (10:00 -
Unit 3 Section 6.4: Internet Security
Chapter 17 Risks, Security and Disaster Recovery
Module 8: Securing Network Traffic by Using IPSec and Certificates
BY GAWARE S.R. DEPT.OF COMP.SCI
The introduction and the essential elements of E- Commerce.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Who Uses Encryption? Module 7 Section 3.
Multifactor Authentication & First Time Login
Digital Rights Management (DRM)
Digital Signatures and Forms
E-cert (Digital Certificate)
E-cert (digital certificate)
COMP Student Account Activation
Two factor Authentication
Create and save your file in Office 365
Create and save your file in Office 365
Encryption and Hacking
Module 8: Securing Network Traffic by Using IPSec and Certificates
Electronic Payment Security Technologies
Google Drive Use personal google account IF you actually know the password. Log on with school credentials if not: User:
Student user guide for getting started with Microsoft
Presentation transcript:

E-cert (Digital Certificate) 电子证书 (電子證書)

On the Internet, nobody knows you’re a dog. Extracted from http://scienceblogs.com/effectmeasure/internet_dog.jpg

What is it? An electronic file Considered as “electronic passport” Issuing body in Hong Kong Hong Kong Post (香港邮政) HK$50/year

Functions Authentication Encryption Verify the identity of someone Convert ordinary data into unreadable code

E-banking two-factor authentication In addition to account name and password

Problems of account name and password Bad passwords Birthday Name of wife/husband/pets Etc. User wrote it down and stick it on the monitor User tells others Re-use passwords