SlideShare a Scribd company logo
1 of 30
SECURITY ENVIRONMENT
BY :
JAYPAL SINGH CHOUDHARY
ANUPMA TRIPATHI
SGSITS MBA
INTRODUCTION:
E-commerce security is the protection of e-commerce assets from
unauthorized access, use of it.
The importance of securing e-commerce
– Secrecy: protection against unauthorized data disclosure and
authentication of data source.
– Integrity: prevention against unauthorized data modification.
– Necessity: prevention against data delays or removal.
– Non-repudiation: prevention against any one party from
reneging on an agreement after the fact protect corporation's
image and reputation.
 Unauthorized access
 Loss of message confidentiality or integrity
 User Identification
 Access Control
 Players:
◦ User community
◦ Network Administration
◦ Introducers
“$$”The Internet:
open
virus
Hackers and crackers
 Data being stolen
 Electronic mail can be intercepted and read
 Customer’s credit card numbers may be read
 Login/password and other access information
stolen
 Operating system shutdown
 Filesystem corruption
 User login information can be captured
 E-mail is the most widely used application in
the Internet.
 Who wants to read your mail ?
 Business competitors
 Reporters,Criminals
 Friends and Family
 Two approaches are used:
 PGP: Pretty Good Privacy
 PEM: Privacy-Enhanced Mail
 Authentication problems
 Impersonation attacks
 Privacy problems
 Hacking and similar attacks
 Integrity problems
 Repudiation problems
 How to communicate securely:
 SSL – “the web security protocols”
 IPSEC – “the IP layer security protocol”
 SMIME – “the email security protocol”
 SET – “credit card transaction security protocol”
 Secured HTTP (S-HTTP)
 Security on application layer
 Protection mechanism:
 Digital Signature
 Message authentication
 Message encryption
 Support private & public key cryptograph
 Enhanced HTTP data exchange
Non-repudiation
Authenticity
Confidentiality
Privacy
Availability
- Increased Data Access
- Much more valuable Data
- Scalability with Large User Communities
- Manageability
- Assurance
•Active Content
•Malicious Code
Client threats
• Confidentiality Threats
• Integrity Threats
• Availability Threats
Communication
channels
Threats
•Web-Server ,Commerce Server
Threats
•Password Hacking,Data base
Threats
Server Threats
 Applications that run on computers
 Rely on servers for
 Files
 Devices
 Processing power
 Example: E-mail client
 An application that enables you to send
and receive e-mail
Clients
Clients are Applications
Servers
 Computers or processes that manage
network resources
 Disk drives (file servers)
 Printers (print servers)
 Network traffic (network servers)
 Example: Database Server
 A computer system that processes database
queries
Servers Manage
Resources
Communication
Networks
Networks Connect
Clients and Servers
ELEMENTS OF A COMPREHENSIVE
SECURITY PROGRAM
Have Good Passwords
Use Good Antiviral Products
Use Good Cryptography
Have Good Firewalls
Have a Backup System
Audit and Monitor Systems and Networks
Have Training and Awareness Programs
Test Your Security Frequently
Certification authority
 Malicious code
◦ Viruses
◦ Worms
◦ Trojan horses
◦ Bots, botnets
 Unwanted programs
◦ Browser parasites
◦ Adware
◦ Spyware
Copyright © 2010 Pearson
Education, Inc.
Sli
de
5-
19
 Phishing
◦ Deceptive online attempt to obtain confidential information
◦ Social engineering, e-mail scams, spoofing legitimate Web
sites
◦ Use information to commit fraudulent acts (access checking
accounts), steal identity
 Hacking and cybervandalism
◦ Hackers vs. crackers
◦ Cybervandalism: intentionally disrupting, defacing,
destroying Web site
◦ Types of hackers: white hats, black hats, grey hats
Copyright © 2010 Pearson
Education, Inc.
Sli
de
5-
20
 Credit card fraud/theft
◦ Fear of stolen credit card information deters online
purchases
◦ Hackers target merchant servers; use data to establish
credit under false identity
◦ Online companies at higher risk than offline
 Spoofing: misrepresenting self by using fake e-
mail address
 Pharming: spoofing a Web site
◦ Redirecting a Web link to a new, fake Web site
۩ Electronic data security is important at a time
when people are considering banking and
other financial transaction by PCs.
۩ One major threat to data security is
unauthorized network monitoring also called
packet sniffing.
Messaging Security is a program that
provides protection for companies messaging
infrastructure.
It protects all the personal message of the
company which are related to company’s
vision and mission.
Message Confidentiality
Message and
System Integrity
Message
Authentication
It is use to protect the systems from
unauthorized
access, disclosure, disruption, modification, p
erusal, inspection, recording or destruction.
Cryptographically
singed certificates
E-commerce
authentication
Third-party
authentication
Encryption is the mutation of information
in any form (text, video, and graphics) into
a representation unreadable by anyone
without a decryption key.
 No can figure out the private key from the
corresponding public key. Hence, the key
management problems is mostly confined to
the management of private keys
 The need for sender and receiver to share
secret information over public channels is
completely eliminated.
Security environment

More Related Content

What's hot (20)

Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce
 
E business- EDI
E business- EDIE business- EDI
E business- EDI
 
Cyber contract
Cyber contractCyber contract
Cyber contract
 
E-Business & E-Commerce Basics
E-Business & E-Commerce BasicsE-Business & E-Commerce Basics
E-Business & E-Commerce Basics
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
 
e-commerce
e-commercee-commerce
e-commerce
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
EDI
 EDI EDI
EDI
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basics
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Mis Edi
Mis EdiMis Edi
Mis Edi
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data Interchange
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 

Viewers also liked

The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesQanita Ahmad
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Risk management in e banking
Risk management in e bankingRisk management in e banking
Risk management in e bankingAmer Mushtaq
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
A project report on e business
A project report on e businessA project report on e business
A project report on e businessVerma Pramod
 

Viewers also liked (9)

Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web Services
 
Brian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government PerspectiveBrian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government Perspective
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Risk management in e banking
Risk management in e bankingRisk management in e banking
Risk management in e banking
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
A project report on e business
A project report on e businessA project report on e business
A project report on e business
 

Similar to Security environment

securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptxrehamrere
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTCyberambessador
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...AwodiranOlumide
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 

Similar to Security environment (20)

securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPT
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Security in it
Security in it Security in it
Security in it
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 

More from Jay Choudhary

Separation processes
Separation processesSeparation processes
Separation processesJay Choudhary
 
National income and employement
National income and employementNational income and employement
National income and employementJay Choudhary
 
Effective communication
Effective communicationEffective communication
Effective communicationJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 

More from Jay Choudhary (9)

Separation processes
Separation processesSeparation processes
Separation processes
 
National income and employement
National income and employementNational income and employement
National income and employement
 
Markowitz model
Markowitz modelMarkowitz model
Markowitz model
 
Effective communication
Effective communicationEffective communication
Effective communication
 
Economic growth
Economic growthEconomic growth
Economic growth
 
Data comparation
Data comparationData comparation
Data comparation
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 

Recently uploaded

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 

Recently uploaded (20)

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 

Security environment

  • 1. SECURITY ENVIRONMENT BY : JAYPAL SINGH CHOUDHARY ANUPMA TRIPATHI SGSITS MBA
  • 2. INTRODUCTION: E-commerce security is the protection of e-commerce assets from unauthorized access, use of it. The importance of securing e-commerce – Secrecy: protection against unauthorized data disclosure and authentication of data source. – Integrity: prevention against unauthorized data modification. – Necessity: prevention against data delays or removal. – Non-repudiation: prevention against any one party from reneging on an agreement after the fact protect corporation's image and reputation.
  • 3.  Unauthorized access  Loss of message confidentiality or integrity  User Identification  Access Control  Players: ◦ User community ◦ Network Administration ◦ Introducers
  • 5.  Data being stolen  Electronic mail can be intercepted and read  Customer’s credit card numbers may be read  Login/password and other access information stolen  Operating system shutdown  Filesystem corruption  User login information can be captured
  • 6.  E-mail is the most widely used application in the Internet.  Who wants to read your mail ?  Business competitors  Reporters,Criminals  Friends and Family  Two approaches are used:  PGP: Pretty Good Privacy  PEM: Privacy-Enhanced Mail
  • 7.  Authentication problems  Impersonation attacks  Privacy problems  Hacking and similar attacks  Integrity problems  Repudiation problems
  • 8.  How to communicate securely:  SSL – “the web security protocols”  IPSEC – “the IP layer security protocol”  SMIME – “the email security protocol”  SET – “credit card transaction security protocol”
  • 9.  Secured HTTP (S-HTTP)  Security on application layer  Protection mechanism:  Digital Signature  Message authentication  Message encryption  Support private & public key cryptograph  Enhanced HTTP data exchange
  • 11. - Increased Data Access - Much more valuable Data - Scalability with Large User Communities - Manageability - Assurance
  • 12.
  • 13. •Active Content •Malicious Code Client threats • Confidentiality Threats • Integrity Threats • Availability Threats Communication channels Threats •Web-Server ,Commerce Server Threats •Password Hacking,Data base Threats Server Threats
  • 14.  Applications that run on computers  Rely on servers for  Files  Devices  Processing power  Example: E-mail client  An application that enables you to send and receive e-mail Clients Clients are Applications
  • 15. Servers  Computers or processes that manage network resources  Disk drives (file servers)  Printers (print servers)  Network traffic (network servers)  Example: Database Server  A computer system that processes database queries Servers Manage Resources
  • 17. ELEMENTS OF A COMPREHENSIVE SECURITY PROGRAM Have Good Passwords Use Good Antiviral Products Use Good Cryptography Have Good Firewalls Have a Backup System Audit and Monitor Systems and Networks Have Training and Awareness Programs Test Your Security Frequently
  • 19.  Malicious code ◦ Viruses ◦ Worms ◦ Trojan horses ◦ Bots, botnets  Unwanted programs ◦ Browser parasites ◦ Adware ◦ Spyware Copyright © 2010 Pearson Education, Inc. Sli de 5- 19
  • 20.  Phishing ◦ Deceptive online attempt to obtain confidential information ◦ Social engineering, e-mail scams, spoofing legitimate Web sites ◦ Use information to commit fraudulent acts (access checking accounts), steal identity  Hacking and cybervandalism ◦ Hackers vs. crackers ◦ Cybervandalism: intentionally disrupting, defacing, destroying Web site ◦ Types of hackers: white hats, black hats, grey hats Copyright © 2010 Pearson Education, Inc. Sli de 5- 20
  • 21.  Credit card fraud/theft ◦ Fear of stolen credit card information deters online purchases ◦ Hackers target merchant servers; use data to establish credit under false identity ◦ Online companies at higher risk than offline  Spoofing: misrepresenting self by using fake e- mail address  Pharming: spoofing a Web site ◦ Redirecting a Web link to a new, fake Web site
  • 22. ۩ Electronic data security is important at a time when people are considering banking and other financial transaction by PCs. ۩ One major threat to data security is unauthorized network monitoring also called packet sniffing.
  • 23. Messaging Security is a program that provides protection for companies messaging infrastructure. It protects all the personal message of the company which are related to company’s vision and mission.
  • 24. Message Confidentiality Message and System Integrity Message Authentication
  • 25. It is use to protect the systems from unauthorized access, disclosure, disruption, modification, p erusal, inspection, recording or destruction.
  • 27. Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.
  • 28.
  • 29.  No can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys  The need for sender and receiver to share secret information over public channels is completely eliminated.