Download presentation
Presentation is loading. Please wait.
Published byEdwina O’Neal’ Modified over 8 years ago
1
Lesson 20
2
E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002
3
Back Doors And Trojan Horses
4
Virus Protection Install anti-virus software – McAfee, Norton, Dr. Solomon, Symantec Downloading of plug-ins from the internet be avoided Downloading of plug-ins should be done from the vendor’s official website Newly obtained disks, programs or files should be scanned for viruses before use Installation of a firewall may also reduce the risk of virus infiltration
5
Outside Attacks On A Network Eavesdropping/Sniffing/Snooping – ability to monitor network traffic using some kind of network-monitoring software Password Attacks – attacker is able to gain access to the network and gather information such as valid users, computer names, resources – can lead to modification, deletion or rerouting of network data IP Address Spoofing – attacker assumes a legal IP address and gain access to the network Man-in-the–middle attacks – attacker is able to monitor, capture and control data between sending and receiving devices
6
Firewalls A combination of hardware and software that sits between the internet and the internal network Protects a network from outside attack A firewall examines data leaving and entering the internal network and is able to filter the data according to the specified rules
7
Internet Organization network Fire wall
8
Types of Firewalls Packet Filter Firewall Circuit-Level Firewall Application-Gateway Firewall
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.