SlideShare une entreprise Scribd logo
1  sur  11
TO ALL
E-COMMERCE
SECURITY MEASURES
LIMITATIONS OF
LIMITATIONS OF
E-COMMERCE SECURITY MEASURES
• Software for Security Fault & Hardware
• Firewall and Network Configurations
• Human Elements and Company’sThreats
• Weakness of Cryptographic Designs
• Weakness and Limitation on Implementations
• Limitations againstTrust Models
• Weakness on Failure Recovery
SOFTWARE FOR
SECURITY FAULT & HARDWARE
• Complex software code may probably have loopholes
that an attacker can exploit.
• Tamper – Resistant hardware systems assume that public
terminals never fall into the wrong hands, but it is rarely seen the
tools for breaking tamper-resistance are also existing.
• Sometimes cryptographic processors may fail to read or process
the secret keys used.
FIREWALL &
NETWORK CONFIGURATIONS
• Network Security is designed to cover the problems
identified with host security.
• A Firewall security can be very simple or complex depending on the
particular requirements of the enterprise.
• Today Private, internal networks are connected to the Internet to get
access to external resources, so security measures like building firewalls
should be well planned to avoid possible risk of exposure of internal
network to outside world.
HUMAN ELEMENTS &
COMPANY’S THREATS
• Password is the weak link in any encryption method, so a
password is only good if it is chosen carefully.
• As complex password are hard to remember, majority chooses
simple passwords like middle names, birthday, mobile no. etc.
which could be guessed or break by brute force.
WEAKNESS OF
CRYPTOGRAPHIC DESIGNS
• Cracking any of the element of Cryptographic System may break entire
system.
• The value of cryptography lost due to the failure to check the size of
values, reusing parameters that never be reused, and so on.
• It is possible to build strong & weak cryptographic system using strong
algorithms and protocols, so a strong cryptographic system should be
created integrating all power elements.
WEAKNESS & LIMITATION ON
IMPLEMENTATION
• Not ensuring that plain text is destroyed after it is encrypted.
• To protect from data loss, systems use temporary files which
accidentally leaves plain text on the Hard Drive.
• In extreme cases OS leaves the security keys on the Hard
Drive.
LIMITATIONS AGAINST
TRUST MODELS
• We cannot be sure or declare that our system is fully secured,
it should be ensured by certified trusted source who will
stand as our Trust Model.
• That is there should be a Standard Trust Model which certifies
the security of the system as powerful.
WEAKNESS ON
FAILURE RECOVERY
• Strong Systems protect small security breaks from getting
bigger.
• Breaking the key to one file should not allow the attacker to
read every file, that is every files should be separated by any
means.
• A good system design considers methods to recover suddenly
from attacks before it gets bigger.
…ALL

Contenu connexe

En vedette

Interactive Web Site Limitations
Interactive Web Site LimitationsInteractive Web Site Limitations
Interactive Web Site Limitations
webhostingguy
 
Jh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db IntroJh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db Intro
bruce nightingale
 
Chap 8 ethical, social and political issues in e-commerce
Chap 8   ethical, social and political issues in e-commerceChap 8   ethical, social and political issues in e-commerce
Chap 8 ethical, social and political issues in e-commerce
Norisuwanah Jaffar
 

En vedette (11)

Interactive Web Site Limitations
Interactive Web Site LimitationsInteractive Web Site Limitations
Interactive Web Site Limitations
 
Technology Trends in eCommerce 2010 2013
Technology Trends in eCommerce 2010   2013Technology Trends in eCommerce 2010   2013
Technology Trends in eCommerce 2010 2013
 
Jh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db IntroJh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db Intro
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
eCommerce Case Studies - numbers inside!
eCommerce Case Studies - numbers inside!eCommerce Case Studies - numbers inside!
eCommerce Case Studies - numbers inside!
 
e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce Technology
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Chap 8 ethical, social and political issues in e-commerce
Chap 8   ethical, social and political issues in e-commerceChap 8   ethical, social and political issues in e-commerce
Chap 8 ethical, social and political issues in e-commerce
 
Traditional Versus Online Marketing
Traditional Versus Online MarketingTraditional Versus Online Marketing
Traditional Versus Online Marketing
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
 

Similaire à Limitations E - Commerce Security measures

Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
Imran Khan
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
NCC Group
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 

Similaire à Limitations E - Commerce Security measures (20)

201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Data security
Data securityData security
Data security
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
Unit4
Unit4Unit4
Unit4
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 

Plus de Jeril Peter

Plus de Jeril Peter (17)

SDG - Sustainable Development Goals
SDG - Sustainable Development GoalsSDG - Sustainable Development Goals
SDG - Sustainable Development Goals
 
Nestle Industrial analysis
Nestle Industrial analysisNestle Industrial analysis
Nestle Industrial analysis
 
Samsung Industry and Firm Analysis
Samsung Industry and Firm AnalysisSamsung Industry and Firm Analysis
Samsung Industry and Firm Analysis
 
Amul
Amul Amul
Amul
 
Big Bazaar
Big BazaarBig Bazaar
Big Bazaar
 
Amazon Industrial analysis
Amazon Industrial analysisAmazon Industrial analysis
Amazon Industrial analysis
 
Airtel Industrial analysis
Airtel Industrial analysisAirtel Industrial analysis
Airtel Industrial analysis
 
Industrial analysis of TATA Motors
Industrial analysis of TATA MotorsIndustrial analysis of TATA Motors
Industrial analysis of TATA Motors
 
Industrial Analysis of OLA
Industrial Analysis of OLAIndustrial Analysis of OLA
Industrial Analysis of OLA
 
Internet Regulatory Framework
Internet Regulatory FrameworkInternet Regulatory Framework
Internet Regulatory Framework
 
E - Marketing
E - Marketing E - Marketing
E - Marketing
 
Website
WebsiteWebsite
Website
 
Mobile Apps
Mobile AppsMobile Apps
Mobile Apps
 
Business Life Cycle
Business Life CycleBusiness Life Cycle
Business Life Cycle
 
Performance Management
Performance ManagementPerformance Management
Performance Management
 
Business Ethics
Business EthicsBusiness Ethics
Business Ethics
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 

Dernier

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Dernier (20)

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 

Limitations E - Commerce Security measures

  • 3. LIMITATIONS OF E-COMMERCE SECURITY MEASURES • Software for Security Fault & Hardware • Firewall and Network Configurations • Human Elements and Company’sThreats • Weakness of Cryptographic Designs • Weakness and Limitation on Implementations • Limitations againstTrust Models • Weakness on Failure Recovery
  • 4. SOFTWARE FOR SECURITY FAULT & HARDWARE • Complex software code may probably have loopholes that an attacker can exploit. • Tamper – Resistant hardware systems assume that public terminals never fall into the wrong hands, but it is rarely seen the tools for breaking tamper-resistance are also existing. • Sometimes cryptographic processors may fail to read or process the secret keys used.
  • 5. FIREWALL & NETWORK CONFIGURATIONS • Network Security is designed to cover the problems identified with host security. • A Firewall security can be very simple or complex depending on the particular requirements of the enterprise. • Today Private, internal networks are connected to the Internet to get access to external resources, so security measures like building firewalls should be well planned to avoid possible risk of exposure of internal network to outside world.
  • 6. HUMAN ELEMENTS & COMPANY’S THREATS • Password is the weak link in any encryption method, so a password is only good if it is chosen carefully. • As complex password are hard to remember, majority chooses simple passwords like middle names, birthday, mobile no. etc. which could be guessed or break by brute force.
  • 7. WEAKNESS OF CRYPTOGRAPHIC DESIGNS • Cracking any of the element of Cryptographic System may break entire system. • The value of cryptography lost due to the failure to check the size of values, reusing parameters that never be reused, and so on. • It is possible to build strong & weak cryptographic system using strong algorithms and protocols, so a strong cryptographic system should be created integrating all power elements.
  • 8. WEAKNESS & LIMITATION ON IMPLEMENTATION • Not ensuring that plain text is destroyed after it is encrypted. • To protect from data loss, systems use temporary files which accidentally leaves plain text on the Hard Drive. • In extreme cases OS leaves the security keys on the Hard Drive.
  • 9. LIMITATIONS AGAINST TRUST MODELS • We cannot be sure or declare that our system is fully secured, it should be ensured by certified trusted source who will stand as our Trust Model. • That is there should be a Standard Trust Model which certifies the security of the system as powerful.
  • 10. WEAKNESS ON FAILURE RECOVERY • Strong Systems protect small security breaks from getting bigger. • Breaking the key to one file should not allow the attacker to read every file, that is every files should be separated by any means. • A good system design considers methods to recover suddenly from attacks before it gets bigger.