SlideShare a Scribd company logo
1 of 23
E-COMMERCE 
Heema Kumari 
Priyanka Kumari 
Manisha Kumari 
Awanti Amrit
Digital certificate
SECURING E-COMMERCE 
NETWORKS 
The selection and operation of technologies that 
ensure network security should be based on: 
Defense in depth 
Need-to-access basis 
policy of least privilege (POLP) 
Policy of blocking access to network resources unless access is 
required to conduct business 
Role-specific security 
Monitoring 
Patch management 
Incident response team (IRT)
FIREWALLS 
firewall 
A single point between two or more networks where all traffic must pass 
(choke point); the device authenticates, controls, and logs all traffic 
packet 
Segment of data sent from one computer to another on a network 
application-level proxy 
A firewall that permits requests for Web pages to move from the public Internet 
to the private network 
bastion gateway 
A special hardware server that utilizes application-level proxy software to limit 
the types of requests that can be passed to an organization’s internal networks 
from the public Internet
intrusion detection systems (IDSs) 
A special category of software that can monitor activity 
across a network or on a host computer, watch for 
suspicious activity, and take automated action based 
on what it sees 
honeynet 
A network of honeypots 
honeypot 
Production system (e.g., firewalls, routers, Web 
servers, database servers) that looks like it does real 
work, but which acts as a decoy and is watched to 
study how network intrusions occur
personal firewall 
A network node designed to protect an individual user’s desktop system 
from the public network by monitoring all the traffic that passes through 
the computer’s network interface card 
virtual private network (VPN) 
A network that uses the public Internet to carry information but remains 
private by using encryption to scramble the communications, 
authentication to ensure that information has not been tampered with, 
and access control to verify the identity of anyone using the network. 
protocol tunneling 
Method used to ensure confidentiality and integrity of data transmitted 
over the Internet, by encrypting data packets, sending them in packets 
across the Internet, and decrypting them at the destination address
proxies 
Special software programs that run on the gateway server 
and pass repackaged packets from one network to the 
other 
demilitarized zone (DMZ) 
Network area that sits between an organization’s internal 
network and an external network (Internet), providing 
physical isolation between the two networks that is 
controlled by rules enforced by a firewall
SECURING ECOMMERCE NETWORKS DIAGRAM
SECURING PROTOCOLS 
HTTPS 
SSL 
VPN 
IDS 
FIREWALLS 
PUBLIC KEY INFRASTRUCTURE
Hyper Text transfer protocols 
HTTPS is the Hyper-Text Transfer Protocol with SSL Encryption. It is 
the most popular network protocol for establishiing secure connections 
for exchanging documents on the World-Wide Web. It is basically 
HTTP carried over a TCP socket, which has been secured using SSL 
Developed by CommerceNet Consortium 
Extension to HTTP that provides numerous security features 
Client and server authentication 
Spontaneous encryption 
Request/response nonrepudiation 
Provides symmetric and public-key encryption, and message digests 
(summaries of messages as integers) 
Whereas SSL is designed to establish a secure connection between two 
computers, S-HTTP is designed to send individual messages securely.
HTTP messages contain two parts: the header and the body of 
the message. The header contains instructions to the 
recipients (browser and server) on how to process the 
message’s body 
During the transfer transaction, both the client browser and 
the server, use the information contained in the HTTP header 
to negotiate formats they will use to transfer the requested 
information. 
The S-HTTP protocol extends this negotiation between the 
client browser and the server to include the negotiation for 
security matters. Hence S-HTTP uses additional headers for 
message encryption, digital certificates and authentication in 
the HTTP format which contains additional instructions on 
how to decrypt the message body.
Secure Sockets Layer 
SSL (Secure Sockets Layer) is a standard security technology 
for establishing an encrypted link between a server and a 
client—typically a web server (website) and a browser; or a mail 
server and a mail client (e.g., Outlook). 
It is used by the most companies to provide security and privacy 
and establishes a secure session between a browser and a server. 
A channel is the two way-way communication stream 
established between the browser and the server, and the 
definition of a channel security indicates three basic 
requirements: 
The channel is reliable. 
The channel is private. 
The channel is authenticated.
Secure Sockets Layer (cont.) 
This encryption is preceded by a ‘data handshake’ and has two major 
phases: 
The first phase is used to establish private communication, and uses 
the key-agreement algorithm. 
The second phase is used for client authentication. 
Limits of SSL: 
While the possibility is very slight, successful cryptographic attacks 
made against these technologies can render SSL insecure. 
A downside of both SSL and SET protocols is that they both require to 
use cryptographic algorithms that place significant load on the 
computer systems involved in commerce transactions. 
For the low and medium e-commerce applications, there is no 
additional server cost to support SET over SSL.
ROLES OF SSL IN E-COMMERCE 
To secure online credit card transactions. 
To secure system logins and any sensitive information exchanged 
online. 
To secure webmail and applications like Outlook Web Access, 
Exchange and Office Communications Server. 
To secure workflow and virtualisation applications like Citrix Delivery 
Platforms or cloud-based computing platforms. 
To secure the connection between an email client such as Microsoft 
Outlook and an email server such as Microsoft Exchange. 
To secure the transfer of files over https and FTP(s) services such as 
website owners updating new pages to their 
To secure intranet based traffic such as internal networks, file sharing, 
extranets, and database connections. 
To secure network logins and other network traffic with SSL VPNs such 
as VPN Access Servers or applications like the Citrix Access Gateway.
WHAT IS VPN ? 
Virtual Private Network is a type of private network that 
uses public telecommunication, such as the Internet, 
instead of leased lines to communicate. 
Became popular as more employees worked in remote 
locations . 
Terminologies to understand how VPNs work.
Advantages 
Flexibility of growth. 
Efficiency with broadband technology.
Disadvantages 
VPNs require an in-depth understanding of public network 
security issues and proper deployment of precautions . 
Availability and performance depends on factors largely 
outside of their control . 
Immature standards . 
VPNs need to accommodate protocols other than IP and 
existing internal network technology .
Roles of VPNs 
Large-scale encryption between multiple fixed sites 
such as remote offices and central offices 
Network traffic is sent over the branch office Internet 
connection 
This saves the company hardware and management 
expenses
Intrusion Detection Systems (IDS) 
IDS classification 
Host-based IDS: monitor single host activity 
Network-based IDS: monitor network traffic 
logical components: 
Sensors 
collect data from various sources such as log files, network packets 
sends them to the analyzer 
Analyzers 
process data from sensors and determine if intrusion has occurred 
may also provide guidance for the actions to take 
user interface 
view the output and manage the behavior
IDS REQUIREMENT 
o run continually with minimal human supervision 
o be fault tolerant 
o resist subversion 
o minimal overhead on system 
scalable, to serve a large numbe of users 
configured according to system security policies 
o allow dynamic reconfiguration
Fire wall 
A network node designed to protect an individual 
user’s desktop system from the public network by 
monitoring all the traffic that passes through the 
computer’s network interface card
Firewalls 
A firewall is a barrier placed between the private 
network and the outside world. 
All incoming and outgoing traffic must pass 
through it. 
Can be used to separate address domains. 
Control network traffic. 
Cost: ranges from no-cost (available on the 
Internet) to $ 100,000 hardware/software system. 
Types: 
Router-Based 
Host Based 
Circuit Gateways
PUBLIC KEY INFRASTRUCTURE 
A PKI (public key infrastructure) enables users of a 
basically unsecure public network such as the Internet 
to securely and privately exchange data and money 
through the use of a public and a private cryptographic 
key pair that is obtained and shared through a trusted 
authority.

More Related Content

What's hot (20)

Intranet and extranet
Intranet and extranetIntranet and extranet
Intranet and extranet
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
 
Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singh
 
Intranet 47
Intranet 47Intranet 47
Intranet 47
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Intranets and Extranets
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
The Internet, Intranet and Extranet
The Internet, Intranet and ExtranetThe Internet, Intranet and Extranet
The Internet, Intranet and Extranet
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?What is the organisational difference between Internet & Intranet?
What is the organisational difference between Internet & Intranet?
 
Chp7 intranet
Chp7 intranetChp7 intranet
Chp7 intranet
 
Intranet and extranet
Intranet and extranet Intranet and extranet
Intranet and extranet
 

Viewers also liked

E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructuresahilm87
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final pptreemalmarri
 
Final Pitch Document
Final Pitch DocumentFinal Pitch Document
Final Pitch DocumentShelby Lucier
 
Drama research
Drama researchDrama research
Drama researchrmaddox1
 
Nivel e Intensidad Horaria Didáctica para Media UPTC
Nivel e Intensidad Horaria Didáctica para Media UPTCNivel e Intensidad Horaria Didáctica para Media UPTC
Nivel e Intensidad Horaria Didáctica para Media UPTCYasmin Gama Acero
 
Pelatihan & Pengembangan
Pelatihan & PengembanganPelatihan & Pengembangan
Pelatihan & PengembanganLeonartMaruli
 
звіт директора 2011 2016 готовий
звіт директора 2011 2016 готовийзвіт директора 2011 2016 готовий
звіт директора 2011 2016 готовийOlga Poslovska
 
Looking back at your preliminary task
Looking back at your preliminary taskLooking back at your preliminary task
Looking back at your preliminary taskkennedypalmerr
 
Foto-impressie Cadenza Catering
Foto-impressie Cadenza CateringFoto-impressie Cadenza Catering
Foto-impressie Cadenza CateringWim Teeuw
 
Absolutely Everything - NEWER
Absolutely Everything - NEWERAbsolutely Everything - NEWER
Absolutely Everything - NEWERShelby Lucier
 
Articulo cientifico. aplicación casera
Articulo cientifico. aplicación caseraArticulo cientifico. aplicación casera
Articulo cientifico. aplicación caseramarlon_trumpet
 
Absolutely Everything. The real one.
Absolutely Everything. The real one.Absolutely Everything. The real one.
Absolutely Everything. The real one.Shelby Lucier
 
Summer Research Presentation
Summer Research Presentation Summer Research Presentation
Summer Research Presentation An Nguyen
 

Viewers also liked (20)

E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Musica
MusicaMusica
Musica
 
preliminary task
preliminary taskpreliminary task
preliminary task
 
Final Pitch Document
Final Pitch DocumentFinal Pitch Document
Final Pitch Document
 
áLbum de fotografías
áLbum de fotografíasáLbum de fotografías
áLbum de fotografías
 
Drama research
Drama researchDrama research
Drama research
 
Nivel e Intensidad Horaria Didáctica para Media UPTC
Nivel e Intensidad Horaria Didáctica para Media UPTCNivel e Intensidad Horaria Didáctica para Media UPTC
Nivel e Intensidad Horaria Didáctica para Media UPTC
 
Pelatihan & Pengembangan
Pelatihan & PengembanganPelatihan & Pengembangan
Pelatihan & Pengembangan
 
звіт директора 2011 2016 готовий
звіт директора 2011 2016 готовийзвіт директора 2011 2016 готовий
звіт директора 2011 2016 готовий
 
Looking back at your preliminary task
Looking back at your preliminary taskLooking back at your preliminary task
Looking back at your preliminary task
 
Bc77 core banking
Bc77 core bankingBc77 core banking
Bc77 core banking
 
Foto-impressie Cadenza Catering
Foto-impressie Cadenza CateringFoto-impressie Cadenza Catering
Foto-impressie Cadenza Catering
 
Absolutely Everything - NEWER
Absolutely Everything - NEWERAbsolutely Everything - NEWER
Absolutely Everything - NEWER
 
Conventions
ConventionsConventions
Conventions
 
Articulo cientifico. aplicación casera
Articulo cientifico. aplicación caseraArticulo cientifico. aplicación casera
Articulo cientifico. aplicación casera
 
звіт
звітзвіт
звіт
 
Absolutely Everything. The real one.
Absolutely Everything. The real one.Absolutely Everything. The real one.
Absolutely Everything. The real one.
 
Summer Research Presentation
Summer Research Presentation Summer Research Presentation
Summer Research Presentation
 

Similar to Ecommerce final ppt

IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptDimpyJindal4
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)ssusera07323
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.pptssusera1b6c7
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 

Similar to Ecommerce final ppt (20)

Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
SECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.pptSECURITY PROTOCOLS.ppt
SECURITY PROTOCOLS.ppt
 
Network security
Network securityNetwork security
Network security
 
Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Network security
Network securityNetwork security
Network security
 
vpn
vpnvpn
vpn
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)Fundamentals of Virtual Private Networks (VPNs)
Fundamentals of Virtual Private Networks (VPNs)
 
Vvirtualnet-basic.ppt
Vvirtualnet-basic.pptVvirtualnet-basic.ppt
Vvirtualnet-basic.ppt
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
VPN_ppt.ppt
VPN_ppt.pptVPN_ppt.ppt
VPN_ppt.ppt
 

Ecommerce final ppt

  • 1. E-COMMERCE Heema Kumari Priyanka Kumari Manisha Kumari Awanti Amrit
  • 3. SECURING E-COMMERCE NETWORKS The selection and operation of technologies that ensure network security should be based on: Defense in depth Need-to-access basis policy of least privilege (POLP) Policy of blocking access to network resources unless access is required to conduct business Role-specific security Monitoring Patch management Incident response team (IRT)
  • 4. FIREWALLS firewall A single point between two or more networks where all traffic must pass (choke point); the device authenticates, controls, and logs all traffic packet Segment of data sent from one computer to another on a network application-level proxy A firewall that permits requests for Web pages to move from the public Internet to the private network bastion gateway A special hardware server that utilizes application-level proxy software to limit the types of requests that can be passed to an organization’s internal networks from the public Internet
  • 5. intrusion detection systems (IDSs) A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees honeynet A network of honeypots honeypot Production system (e.g., firewalls, routers, Web servers, database servers) that looks like it does real work, but which acts as a decoy and is watched to study how network intrusions occur
  • 6. personal firewall A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card virtual private network (VPN) A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network. protocol tunneling Method used to ensure confidentiality and integrity of data transmitted over the Internet, by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address
  • 7. proxies Special software programs that run on the gateway server and pass repackaged packets from one network to the other demilitarized zone (DMZ) Network area that sits between an organization’s internal network and an external network (Internet), providing physical isolation between the two networks that is controlled by rules enforced by a firewall
  • 9. SECURING PROTOCOLS HTTPS SSL VPN IDS FIREWALLS PUBLIC KEY INFRASTRUCTURE
  • 10. Hyper Text transfer protocols HTTPS is the Hyper-Text Transfer Protocol with SSL Encryption. It is the most popular network protocol for establishiing secure connections for exchanging documents on the World-Wide Web. It is basically HTTP carried over a TCP socket, which has been secured using SSL Developed by CommerceNet Consortium Extension to HTTP that provides numerous security features Client and server authentication Spontaneous encryption Request/response nonrepudiation Provides symmetric and public-key encryption, and message digests (summaries of messages as integers) Whereas SSL is designed to establish a secure connection between two computers, S-HTTP is designed to send individual messages securely.
  • 11. HTTP messages contain two parts: the header and the body of the message. The header contains instructions to the recipients (browser and server) on how to process the message’s body During the transfer transaction, both the client browser and the server, use the information contained in the HTTP header to negotiate formats they will use to transfer the requested information. The S-HTTP protocol extends this negotiation between the client browser and the server to include the negotiation for security matters. Hence S-HTTP uses additional headers for message encryption, digital certificates and authentication in the HTTP format which contains additional instructions on how to decrypt the message body.
  • 12. Secure Sockets Layer SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a client—typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook). It is used by the most companies to provide security and privacy and establishes a secure session between a browser and a server. A channel is the two way-way communication stream established between the browser and the server, and the definition of a channel security indicates three basic requirements: The channel is reliable. The channel is private. The channel is authenticated.
  • 13. Secure Sockets Layer (cont.) This encryption is preceded by a ‘data handshake’ and has two major phases: The first phase is used to establish private communication, and uses the key-agreement algorithm. The second phase is used for client authentication. Limits of SSL: While the possibility is very slight, successful cryptographic attacks made against these technologies can render SSL insecure. A downside of both SSL and SET protocols is that they both require to use cryptographic algorithms that place significant load on the computer systems involved in commerce transactions. For the low and medium e-commerce applications, there is no additional server cost to support SET over SSL.
  • 14. ROLES OF SSL IN E-COMMERCE To secure online credit card transactions. To secure system logins and any sensitive information exchanged online. To secure webmail and applications like Outlook Web Access, Exchange and Office Communications Server. To secure workflow and virtualisation applications like Citrix Delivery Platforms or cloud-based computing platforms. To secure the connection between an email client such as Microsoft Outlook and an email server such as Microsoft Exchange. To secure the transfer of files over https and FTP(s) services such as website owners updating new pages to their To secure intranet based traffic such as internal networks, file sharing, extranets, and database connections. To secure network logins and other network traffic with SSL VPNs such as VPN Access Servers or applications like the Citrix Access Gateway.
  • 15. WHAT IS VPN ? Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. Became popular as more employees worked in remote locations . Terminologies to understand how VPNs work.
  • 16. Advantages Flexibility of growth. Efficiency with broadband technology.
  • 17. Disadvantages VPNs require an in-depth understanding of public network security issues and proper deployment of precautions . Availability and performance depends on factors largely outside of their control . Immature standards . VPNs need to accommodate protocols other than IP and existing internal network technology .
  • 18. Roles of VPNs Large-scale encryption between multiple fixed sites such as remote offices and central offices Network traffic is sent over the branch office Internet connection This saves the company hardware and management expenses
  • 19. Intrusion Detection Systems (IDS) IDS classification Host-based IDS: monitor single host activity Network-based IDS: monitor network traffic logical components: Sensors collect data from various sources such as log files, network packets sends them to the analyzer Analyzers process data from sensors and determine if intrusion has occurred may also provide guidance for the actions to take user interface view the output and manage the behavior
  • 20. IDS REQUIREMENT o run continually with minimal human supervision o be fault tolerant o resist subversion o minimal overhead on system scalable, to serve a large numbe of users configured according to system security policies o allow dynamic reconfiguration
  • 21. Fire wall A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card
  • 22. Firewalls A firewall is a barrier placed between the private network and the outside world. All incoming and outgoing traffic must pass through it. Can be used to separate address domains. Control network traffic. Cost: ranges from no-cost (available on the Internet) to $ 100,000 hardware/software system. Types: Router-Based Host Based Circuit Gateways
  • 23. PUBLIC KEY INFRASTRUCTURE A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.