E-Commerce: Security LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

POSSIBLE THREATS TO DATA
SSL AND E- COMMERCE S ECURITY gz2155 Guangwei Zhang.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Risks for an E-Commerce site and how to protect against them.
Unit 28- Website Development Assignment 1- THEORY P3
1 Integrating ISA Server and Exchange Server. 2 How works.
Threats to I.T Internet security By Cameron Mundy.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
3.3 Internet Services. Overview Demonstrate knowledge and understanding of the following internet services and describe the advantages and disadvantages.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Mr C Johnston ICT Teacher
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Policies and Security for Internet Access
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
BTEC ICT Level 3 Unit 8 E-Commerce
Chapter 40 Internet Security.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Lesson 3 Safe Computing.
How to Check if a site's connection is secure ?
Topic 1: Data, information, knowledge and processing
Lesson 2- Protecting Yourself Online
Encryption and Hacking
Unit 8 Network Security.
Lesson 2- Protecting Yourself Online
BTEC ICT Level 3 Unit 8 E-Commerce
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

E-Commerce: Security LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

Guess the key terms…….. A malicious piece of code The act of stealing someone’s personal details. Software that protects workstations or servers from unauthorised access LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

Guess the key terms…….. The act of stealing someone’s personal details. Software that protects workstations or servers from unauthorised access A malicious piece of code LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

Guess the key terms…….. The act of stealing someone’s personal details. Software that protects workstations or servers from unauthorised access A malicious piece of code LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

Guess the key terms…….. The act of stealing someone’s personal details. Software that protects workstations or servers from unauthorised access A malicious piece of code LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

How are they linked? LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

How are they linked? Can cause LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

How are they linked? Can cause Which can be prevented by LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

Knowledge means merits! To begin progression towards M2 you need to be able to give examples of security issues and then describe them. Using the three examples, describe each in a paragraph Viruses Identity theft Firewall You have 10 minutes to complete this task LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

How confident are you? Give yourself a mark out of ten for how well you feel you understand each of the three terms 10 – “This is easy, let me at the assignment” 5 – “I’m not quite ready to do the assignment” 1 – “Yeah a virus…..the doctor said I had one of them once” LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

Prevention Using the key terms explain how viruses and identity theft can be prevented. What role does a firewall play? Does it stop viruses? Find some examples in the news where viruses have caused major problems, what happened? How was the problem solved? Find some examples of identity theft. Which companies were involved? What effect did it have on the companies? LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2 If you rated any of your confidence in any of the terms lower than 7, move to the area towards the back of the room 25 minutes to work on this

Testing your knowledge! Think of a question about one of today’s key terms. LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

Define the following terms: Secure sockets layer HTTPS RSA Certificates Strong password Digital Signatures LO: To explain methods of security used in e-commerce Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2

LO: To explain methods of security used in e-commerce Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2 Key Terms: Secure sockets layer – a cryptographic layer which provides secure communication over the internet. HTTPS – A protocol used by websites to identify an encrypted connection. RSA Certificates – A method of coding information which can be used to confirm the identity of the sender or recipient. Strong password – A password combining letters, numbers, upper case, lower case, symbols and containing more than eight characters. Digital Signatures – The process of authenticating something over the internet (similar to a traditional signature)

automobile aut0m0bile aUt0m0bile aUt0m0b!le

Tick next to any terms which you are not able to explain. Virus Hacking Identity Theft Secure sockets layer (SSL) HTTPS RSA Certificates Strong password Digital Signatures LO: To explain methods of security used in e-commerce Give examples of security issues Illustrate how businesses/individuals can protect themselves from security issues BTEC Criteria: M2