SlideShare une entreprise Scribd logo
1  sur  27
Security and International E-Commerce Jim Maloney [email_address] November 2000 SecurityPortal The focal point for security on the Net ™
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why is security important for E-Commerce? Increased Exposure, Threats, Vulnerabilities, Privacy Concerns Increased Bandwidth Expanded Access ASP Delivery Model Tech-Savvy Culture Mobile Society Increased E-Business Opportunities Sophisticated Applications Customer-Centric Business Models Ubiquitous Internet
Old economy view of security ,[object Object],[object Object]
New economy view of security ,[object Object],[object Object],[object Object]
A working definition of security ,[object Object],[object Object],[object Object],[object Object]
General security threats to e-commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resulting business impact ,[object Object],[object Object],[object Object],[object Object],[object Object]
International security issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Regulations and policies ,[object Object],[object Object],[object Object],[object Object]
Education and awareness ,[object Object],[object Object],[object Object]
Cultural norms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access modes ,[object Object],[object Object],[object Object]
Access modes – continued ,[object Object],[object Object],[object Object]
Access modes - continued ,[object Object],[object Object]
Local government stance on cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object]
Asia/Pacific perspective ,[object Object],[object Object],[object Object],[object Object]
Asia/Pacific perspective - continued ,[object Object],[object Object],[object Object]
Security is more than technology Process Technology Monitor Respond Anticipate Defend People
Security is an attribute, not a component System Management and Security Network & Networking Services Hardware & Operating System App App App App User Interface Application Development Environment Information Management Distribution Services
General security approach ,[object Object],[object Object],[object Object],[object Object],[object Object]
General security approach - continued ,[object Object],[object Object],[object Object]
Secure web site development tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure web site development references ,[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bibliography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bibliography - Continued ,[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Maloney slides
Maloney slidesMaloney slides
Maloney slides
Onkar Sule
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
IPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
IPPAI
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
Ali Sadhik Shaik
 

Tendances (20)

Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Information Security
Information SecurityInformation Security
Information Security
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 

Similaire à Maloney Slides

Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
Vincent Kwon
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
R_Yanus
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
 

Similaire à Maloney Slides (20)

Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Clifford wilke
Clifford wilkeClifford wilke
Clifford wilke
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 

Plus de ecommerce

E Commerce14a(2)
E Commerce14a(2)E Commerce14a(2)
E Commerce14a(2)
ecommerce
 
E Com Center Klagenfurt
E Com Center KlagenfurtE Com Center Klagenfurt
E Com Center Klagenfurt
ecommerce
 
E Commerce14a
E Commerce14aE Commerce14a
E Commerce14a
ecommerce
 
Am Cham Taipei Sept2004
Am Cham Taipei Sept2004Am Cham Taipei Sept2004
Am Cham Taipei Sept2004
ecommerce
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
ecommerce
 
Nordin Malaysia
Nordin MalaysiaNordin Malaysia
Nordin Malaysia
ecommerce
 
B4 Gusmeroli
B4 GusmeroliB4 Gusmeroli
B4 Gusmeroli
ecommerce
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
ecommerce
 
E Commerce052503
E Commerce052503E Commerce052503
E Commerce052503
ecommerce
 
Wsis Alf C7 Unctad
Wsis Alf C7 UnctadWsis Alf C7 Unctad
Wsis Alf C7 Unctad
ecommerce
 
Documentation Set Up
Documentation Set UpDocumentation Set Up
Documentation Set Up
ecommerce
 
Ecommerce Overview
Ecommerce OverviewEcommerce Overview
Ecommerce Overview
ecommerce
 

Plus de ecommerce (19)

E Commerce14a(2)
E Commerce14a(2)E Commerce14a(2)
E Commerce14a(2)
 
E Com Center Klagenfurt
E Com Center KlagenfurtE Com Center Klagenfurt
E Com Center Klagenfurt
 
Ecommerce1
Ecommerce1Ecommerce1
Ecommerce1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
E Commerce14a
E Commerce14aE Commerce14a
E Commerce14a
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Am Cham Taipei Sept2004
Am Cham Taipei Sept2004Am Cham Taipei Sept2004
Am Cham Taipei Sept2004
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
Nordin Malaysia
Nordin MalaysiaNordin Malaysia
Nordin Malaysia
 
B4 Gusmeroli
B4 GusmeroliB4 Gusmeroli
B4 Gusmeroli
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 
E Commerce052503
E Commerce052503E Commerce052503
E Commerce052503
 
Wsis Alf C7 Unctad
Wsis Alf C7 UnctadWsis Alf C7 Unctad
Wsis Alf C7 Unctad
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Documentation Set Up
Documentation Set UpDocumentation Set Up
Documentation Set Up
 
Ecommerce Overview
Ecommerce OverviewEcommerce Overview
Ecommerce Overview
 
Napier
NapierNapier
Napier
 
S719a
S719aS719a
S719a
 
Mea1
Mea1Mea1
Mea1
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

Maloney Slides

  • 1. Security and International E-Commerce Jim Maloney [email_address] November 2000 SecurityPortal The focal point for security on the Net ™
  • 2.
  • 3. Why is security important for E-Commerce? Increased Exposure, Threats, Vulnerabilities, Privacy Concerns Increased Bandwidth Expanded Access ASP Delivery Model Tech-Savvy Culture Mobile Society Increased E-Business Opportunities Sophisticated Applications Customer-Centric Business Models Ubiquitous Internet
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Security is more than technology Process Technology Monitor Respond Anticipate Defend People
  • 20. Security is an attribute, not a component System Management and Security Network & Networking Services Hardware & Operating System App App App App User Interface Application Development Environment Information Management Distribution Services
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.