1 'According to the 2007 Internet Crime Report, Internet Crime Complaint Center (IC3) received 206,884 complaints of Internet crimes More than 90,000.

Slides:



Advertisements
Similar presentations
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright © 2013 Pearson Education, Inc.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
E-commerce business. technology. society. Kenneth C. Laudon
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
E-commerce: business. technology. society.
Chapter 5 Security and Encryption
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2010 Pearson Education, Inc. E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Sixth Edition.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
PART THREE E-commerce in Action Norton University E-commerce in Action.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Online Security and Payment Systems
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Types of Electronic Infection
E-commerceEssentials Kenneth C. Laudon Carol Guercio Traver first edition Copyright © 2014 Pearson Education, Inc.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
Public Key Encryption.
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Copyright © 2010 Pearson Education, Inc. E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Sixth Edition.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Securing Information Systems
Securing Information Systems
Security and Encryption
E-commerce business. technology. society. Kenneth C. Laudon
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Securing Information Systems
Chapter 5 Online Security and Payment Systems
Electronic Payment Security Technologies
Presentation transcript:

1 'According to the 2007 Internet Crime Report, Internet Crime Complaint Center (IC3) received 206,884 complaints of Internet crimes More than 90,000 referred to law enforcement around the nation Nearly $240 million in reported losses. FBI 2007 INTERNET FRAUD

2 world relies on physical security - Ecommerce world - reliance on electronic means to protect data, communications & transactions. 1.Infrastructure security (hard/software 2.Transactions security (web/moving) 3.Data/information security (message itself)

Most Common Security Threats in the E-commerce Environment Malicious code (viruses, worms, Trojans) Unwanted programs (spyware, browser parasites) Phishing/identity theft Hacking and cybervandalism Hacking Credit card fraud/theft Spoofing (pharming)/spam (junk) Web sites Sniffing Insider attacks Poorly designed server and client software DoS and dDoS attacks

4 yAuthentication: y A way to verify uyer’s identity before payments are made yIntegrity: yEnsuring that information will not be accidentally or maliciously altered or destroyed, usually during transmission SECURTY NEEDS:

5 Encryption: y making messages indecipherable except by those who have an authorized decryption key yNon-repudiation: yMerchants protection - customer’s unjustifiable denial of placed orders customers protection -against merchants’ unjustifiable denial of payments SECURTY NEEDS:

6 Securing Channels of Communication zSecure Sockets Layer (SSL): Most common form of securing channels of communication; used to establish a secure negotiated session (client-server session in which URL of requested document, along with contents, is encrypted) zS-HTTP: Alternative method; provides a secure message-oriented communications protocol designed for use in conjunction with HTTP zVirtual Private Networks (VPNs): Allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocols

7 ENCRYPTON ENCRYPTON WHAT ARE THE 2 TYPES 1. PRIVATE/SECRET KEY Some believe penetrable. Maybe secure “enough” 2. PUBLIC KEY Most popular algorithm is RSA (Rivest, Shamir and Adelman) Various key sizes (e.g. 1,024 bits) Most secure - Never known to be broken (to date)

8 E-SECURITYEND