Download presentation
Presentation is loading. Please wait.
Published byPrimrose Freeman Modified over 9 years ago
2
1 'According to the 2007 Internet Crime Report, Internet Crime Complaint Center (IC3) received 206,884 complaints of Internet crimes More than 90,000 referred to law enforcement around the nation Nearly $240 million in reported losses. FBI 2007 INTERNET FRAUD
3
2 world relies on physical security - Ecommerce world - reliance on electronic means to protect data, communications & transactions. 1.Infrastructure security (hard/software 2.Transactions security (web/moving) 3.Data/information security (message itself)
4
Most Common Security Threats in the E-commerce Environment Malicious code (viruses, worms, Trojans) Unwanted programs (spyware, browser parasites) Phishing/identity theft Hacking and cybervandalism Hacking Credit card fraud/theft Spoofing (pharming)/spam (junk) Web sites Sniffing Insider attacks Poorly designed server and client software DoS and dDoS attacks
5
4 yAuthentication: y A way to verify uyer’s identity before payments are made yIntegrity: yEnsuring that information will not be accidentally or maliciously altered or destroyed, usually during transmission SECURTY NEEDS:
6
5 Encryption: y making messages indecipherable except by those who have an authorized decryption key yNon-repudiation: yMerchants protection - customer’s unjustifiable denial of placed orders customers protection -against merchants’ unjustifiable denial of payments SECURTY NEEDS:
7
6 Securing Channels of Communication zSecure Sockets Layer (SSL): Most common form of securing channels of communication; used to establish a secure negotiated session (client-server session in which URL of requested document, along with contents, is encrypted) zS-HTTP: Alternative method; provides a secure message-oriented communications protocol designed for use in conjunction with HTTP zVirtual Private Networks (VPNs): Allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocols
8
7 ENCRYPTON ENCRYPTON WHAT ARE THE 2 TYPES 1. PRIVATE/SECRET KEY Some believe penetrable. Maybe secure “enough” 2. PUBLIC KEY Most popular algorithm is RSA (Rivest, Shamir and Adelman) Various key sizes (e.g. 1,024 bits) Most secure - Never known to be broken (to date)
9
8 E-SECURITYEND
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.