Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.

Similar presentations


Presentation on theme: "Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer."— Presentation transcript:

1 Chapter 13 Understanding E-Security

2 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer Enemy #1 threat How to prevent and protect?

3 3 SECURITY CONCERNS: examples Uncover confidentiality (bank account) Leak Authentication and Access Control (user name, password of your Web, email) Conduct ID theft (over 50% is credit card fraud) Hack or Intrude Web sites

4 4 CLIENT SECURITY THREATS Happens to client computers examples –Deliberate Corruption of Files (e.g., rename files) –Delete Stored Information –Use Virus (bring down system)

5 5 SERVER SECURIY THREATS Web server with active ports (e.g., 80, 8080) can be misused (scalability or deny of service attack) Web server directories (folders) can be accessed and corrupted

6 6 Server Threats: DENIAL OF SERVICE Hackers … Break into less-secured computers Installs stealth program which duplicates itself (congest network traffic) Target network from a remote location (RPC) and activates the planted program Victim’s network is overwhelmed and other users are denied access to Web and Email

7 7 VIRUS – eCommerce Threat #1 A malicious code replicating itself to cause disruption of the information infrastructure Attacks system integrity (cause inconsistent data) Target at computer networks, files and other executable objects

8 8 EXAMPLES OF VIRUSES Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware) Boot Virus –Attacks boot sectors of the hard drive “Trojan horses” –a bot planted in the systems being attacked, can be operated locally or remotely for malicious purposes

9 9 EXAMPLES OF VIRUSES (cont.): Trojan horse

10 10 VIRUS CHARACTERISTICS Fast to attack –Easily invade and infect computer hard disk Slow to defend –Less likely to detect and destroy Hard to find (Stealth) –Memory resident (registry) –Able to manipulate its execution to disguise its presence

11 11 BASIC INTERNET SECURITY TIPS Use Password –Alphanumeric –Mix with upper and lower cases –Change frequently –No dictionary names Use Encryption –Coding of messages in traffic between the customer placing an order and the merchant’s network processing the order

12 12 FIREWALL & SECURITY Firewall: frequently used for Internet security - prevent –Enforces an access control policy between two networks –Detects intruders, blocks them from entry, keeps track what they did and notifies the system administrator

13 13 Other security approach - repair, e.g. AntiSpyware to clean virus

14 14 Summary and Exercises Name a few security concerns What are the two types of threats? (client/server) Explain Trojan Horse Virus How to prevent and repair?


Download ppt "Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer."

Similar presentations


Ads by Google