SlideShare a Scribd company logo
1 of 29
IT8005 – Electronic Commerce
IV Year / VIII Semester
UNIT III E-COMMERCE SECURITY AND
PAYMENT SYSTEMS
E-Commerce Security Environment – Security
threats in E-Commerce – Technology Solutions:
Encryption, Securing Channels of
Communication, Protecting Networks, Protecting
Servers and Clients – Management Policies,
Business Procedure and Public Laws - Payment
Systems
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer
Security (TLS):
 When you receive a message from a server on the
Web with which you will be communicating through a
secure channel, this means you will be using SSL/TLS
to establish a secure negotiated session.
 The URL changes from HTTP to HTTPS.
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport
Layer Security (TLS):
 A secure negotiated session is a client-server
session in which the URL of the requested
document, along with the contents, contents of
forms, and the cookies exchanged, are encrypted.
Securing Channels of Communication
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer Security
(TLS):
 For instance, your credit card number that you entered into a
form would be encrypted.
 Through a series of handshakes and communications, the
browser and the server establish one another’s identity by
exchanging digital certificates, decide on the strongest shared
form of encryption, and then proceed to communicate using an
agreed upon session key.
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer
Security (TLS):
 A session key is a unique symmetric encryption key
chosen just for this single secure session. Once used, it is
gone forever.
 SSL/TLS provides data encryption, server authentication,
optional client authentication, and message integrity for
TCP/IP connections.
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer
Security (TLS):
 SSL/TLS addresses the issue of authenticity by
allowing users to verify another user’s identity or the
identity of a server.
It also protects the integrity of the messages
exchanged.
Securing Channels of Communication
 Virtual Private Networks (VPNs):
 A virtual private network (VPN) allows remote users to
securely access a corporation’s local area network via the
Internet, using a variety of VPN protocols.
 VPNs use both authentication and encryption to secure
information from unauthorized persons.
 Authentication prevents spoofing and misrepresentation of
identities.
Securing Channels of Communication
 Virtual Private Networks (VPNs):
 A remote user can connect to a remote private local network using a
local ISP.
 The VPN protocols will establish the link from the client to the
corporate network as if the user had dialed into the corporate network
directly.
 The process of connecting one protocol through another (IP) is called
tunneling, because the VPN creates a private connection by adding an
invisible wrapper around a message to hide its content.
Securing Channels of Communication
 Virtual Private Networks (VPNs):
 The primary use of VPNs is to establish secure
communications among business partners—larger
suppliers or customers, and employees working
remotely.
 Using the Internet and VPN as the connection method
significantly reduces the cost of secure
communications.
Securing Channels of Communication
 Wireless (Wi-Fi) Networks:
 Early Wi-Fi networks used a security standard called
Wired Equivalent Privacy (WEP) to encrypt information.
 WEP was very weak, and easy for hackers to crack.
 A new standard, Wi-Fi Protected Access (WPA), was
developed that provided a higher standard of protection, but
this too soon became vulnerable to intrusion.
Protecting Networks
 Firewalls and proxy servers are intended to build
a wall around your network and the attached
servers and clients, just like physical-world
firewalls protect you from fires for a limited
period of time.
 Firewalls and proxy servers share some similar
functions, but they are quite different.
Protecting Networks
 Firewalls:
 A firewall refers to either hardware or software that filters
communication packets and prevents some packets from
entering or exiting the network based on a security policy.
 The firewall controls traffic to and from servers and
clients, forbidding communications from untrustworthy
sources, and allowing other communications from trusted
sources to proceed.
Protecting Networks
 Firewalls:
 Every message that is to be sent or received from the network is
processed by the firewall, which determines if the message
meets security guidelines established by the business.
 Firewalls can filter traffic based on packet attributes such as
source IP address, destination port or IP address, type of service
(such as WWW or HTTP), the domain name of the source, and
many other dimensions.
Protecting Networks
 Firewalls:
 The increasing use of firewalls by home and business
Internet users has greatly reduced the effectiveness of
attacks, and forced hackers to focus more on e-mail
attachments to distribute worms and viruses.
 There are two major methods firewalls use to validate
traffic: packet filters and application gateways
Protecting Networks
 Firewalls:
 Packet filters examine data packets to determine
whether they are destined for a prohibited port or
originate from a prohibited IP address.
 The filter specifically looks at the source and
destination information, as well as the port and packet
type, when determining whether the information may
be transmitted.
Protecting Networks
 Firewalls:
 Application gateways are a type of firewall that filters
communications based on the application being
requested, rather than the source or destination of the
message.
 Such firewalls also process requests at the application
level, farther away from the client computer than
packet filters.
Protecting Networks
 Firewalls:
 By providing a central filtering point, application gateways
provide greater security than packet filters but can compromise
system performance.
 Next-generation firewalls use an application-centric approach to
firewall control.
 They are able to identify applications regardless of the port,
protocol, or security evasion tools used; identify users regardless
of device or IP address
Protecting Networks
 Firewalls:
Protecting Networks
 Proxy Servers:
 Proxy servers (proxies) are software servers (often a dedicated
computer) that handle all communications originating from or
being sent to the Internet by local clients, acting as a
spokesperson or bodyguard for the organization.
 Proxies act primarily to limit access of internal clients to
external Internet servers, although some proxy servers act as
firewalls as well.
Protecting Networks
Proxy Servers:
 Proxy servers are sometimes called dual-home
systems because they have two network interfaces. To
internal computers, a proxy server is known as the
gateway, while to external computers it is known as a
mail server or numeric address.
 When a user on an internal network requests a web
page, the request is routed first to the proxy server.
Protecting Networks
 Proxy Servers:
 The proxy server validates the user and the nature of the request,
and then sends the request onto the Internet.
 A web page sent by an external Internet server first passes to the
proxy server. If acceptable, the web page passes onto the internal
network web server and then to the client desktop.
 By prohibiting users from communicating directly with the
Internet, companies can restrict access to certain types of sites,
such as pornographic, auction, or stock-trading sites.
Protecting Networks
 Intrusion Detection and Prevention Systems:
 An intrusion detection system (IDS) examines
network traffic, watching to see if it matches certain
patterns or preconfigured rules indicative of an attack.
 If it detects suspicious activity, the IDS will set off an
alarm alerting administrators and log the event in a
database.
Protecting Networks
 Intrusion Detection and Prevention Systems:
 An intrusion prevention system (IPS) has all the
functionality of an IDS, with the additional ability to
take steps to prevent and block suspicious activities.
 An IPS can terminate a session and reset a connection,
block traffic from a suspicious IP address, or
reconfigure firewall or router security controls.
Protecting Servers and Clients
 Operating System Security Enhancements:
 The most obvious way to protect servers and clients is
to take advantage of automatic computer security
upgrades.
 The Microsoft, Apple, and Linux/Unix operating
systems are continuously updated to patch
vulnerabilities discovered by hackers.
Protecting Servers and Clients
 Operating System Security Enhancements:
 These patches are autonomic; that is, when using these
operating systems on the Internet, you are prompted and
informed that operating system enhancements are available.
 Users can easily download these security patches for free.
The most common known worms and viruses can be
prevented by simply keeping your server and client
operating systems and applications up to date.
Protecting Servers and Clients
 Operating System Security Enhancements - Anti-Virus
Software:
 The easiest and least-expensive way to prevent threats to
system integrity is to install anti-virus software.
 Anti-virus programs can be set up so that e-mail
attachments are inspected before you click on them, and the
attachments are eliminated if they contain a known virus or
worm.
Protecting Servers and Clients
 Operating System Security Enhancements - Anti-Virus
Software:
 Anti-virus suite packages and stand-alone programs are
available to eliminate intruders such as bot programs,
adware, and other security risks.
 Such programs work much like anti-virus software in that
they look for recognized hacker tools or signature actions
of known intruders.

More Related Content

What's hot

Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Biniam Asnake
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Majid Hajibaba
 
CS8078-Green Computing Notes Unit-3
CS8078-Green Computing Notes Unit-3CS8078-Green Computing Notes Unit-3
CS8078-Green Computing Notes Unit-3Gobinath Subramaniam
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization Mahbub Noor Bappy
 
What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networkingpraison
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingIndicThreads
 
Ecommerce Management PowerPoint Presentation Slides
Ecommerce Management PowerPoint Presentation SlidesEcommerce Management PowerPoint Presentation Slides
Ecommerce Management PowerPoint Presentation SlidesSlideTeam
 
Personal information management (PIM)
Personal information management (PIM)Personal information management (PIM)
Personal information management (PIM)Helen Nneka Okpala
 
E-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, LocalE-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, LocalINTI International University
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualizationmazin Salih
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
Virtualization in green computing
Virtualization in green computingVirtualization in green computing
Virtualization in green computingRAHUL SINHA
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITGovt. P.G. College Dharamshala
 
Smart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialSmart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialRomin Irani
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computingpurplesea
 
Hospital information system
Hospital information systemHospital information system
Hospital information systemguest86ac9e
 

What's hot (20)

E COMMERCE
E COMMERCEE COMMERCE
E COMMERCE
 
E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)Service Oriented Architecture (SOA)
Service Oriented Architecture (SOA)
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
 
CS8078-Green Computing Notes Unit-3
CS8078-Green Computing Notes Unit-3CS8078-Green Computing Notes Unit-3
CS8078-Green Computing Notes Unit-3
 
Cloud Computing and Virtualization
Cloud Computing and Virtualization Cloud Computing and Virtualization
Cloud Computing and Virtualization
 
What is Content centric networking
What is Content centric networkingWhat is Content centric networking
What is Content centric networking
 
Architecture Challenges In Cloud Computing
Architecture Challenges In Cloud ComputingArchitecture Challenges In Cloud Computing
Architecture Challenges In Cloud Computing
 
Ecommerce Management PowerPoint Presentation Slides
Ecommerce Management PowerPoint Presentation SlidesEcommerce Management PowerPoint Presentation Slides
Ecommerce Management PowerPoint Presentation Slides
 
Personal information management (PIM)
Personal information management (PIM)Personal information management (PIM)
Personal information management (PIM)
 
E-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, LocalE-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, Local
 
Data center virtualization
Data center virtualizationData center virtualization
Data center virtualization
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Virtualization in green computing
Virtualization in green computingVirtualization in green computing
Virtualization in green computing
 
Chapter 7 e business systems
Chapter 7  e business systemsChapter 7  e business systems
Chapter 7 e business systems
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
 
Smart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + SocialSmart Computing : Cloud + Mobile + Social
Smart Computing : Cloud + Mobile + Social
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Hospital information system
Hospital information systemHospital information system
Hospital information system
 

Similar to IT8005_EC_Unit_III_Securing_Communication_Channels

ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .SowmyaSomu8
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptgocokir267
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - IIITAMBEMAHENDRA1
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfatimagull32
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptxssuserd24233
 

Similar to IT8005_EC_Unit_III_Securing_Communication_Channels (20)

Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .
 
Firewalls
FirewallsFirewalls
Firewalls
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Network security
Network securityNetwork security
Network security
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
The vpn
The vpnThe vpn
The vpn
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Network security
Network securityNetwork security
Network security
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Security
SecuritySecurity
Security
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 

More from Palani Kumar

CS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLCS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLPalani Kumar
 
CS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingCS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingPalani Kumar
 
CS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationCS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationPalani Kumar
 
CS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringCS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringPalani Kumar
 
CS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitectureCS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitecturePalani Kumar
 
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyIT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyPalani Kumar
 

More from Palani Kumar (6)

CS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLCS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQL
 
CS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingCS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_Computing
 
CS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationCS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_Recommendation
 
CS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringCS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_Clustering
 
CS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitectureCS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_Architecture
 
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyIT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
 

Recently uploaded

Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdfKamal Acharya
 
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDrGurudutt
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdfKamal Acharya
 
ROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptxROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptxGagandeepKaur617299
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5T.D. Shashikala
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfJNTUA
 
E-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are presentE-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are presentjatinraor66
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor banktawat puangthong
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...Roi Lipman
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsSheetal Jain
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2T.D. Shashikala
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdfKamal Acharya
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoninghotman30312
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsKineticEngineeringCo
 

Recently uploaded (20)

Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdfDR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
DR PROF ING GURUDUTT SAHNI WIKIPEDIA.pdf
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
ROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptxROAD CONSTRUCTION PRESENTATION.PPTX.pptx
ROAD CONSTRUCTION PRESENTATION.PPTX.pptx
 
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
RM&IPR M5 notes.pdfResearch Methodolgy & Intellectual Property Rights Series 5
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
E-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are presentE-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are present
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and Applications
 

IT8005_EC_Unit_III_Securing_Communication_Channels

  • 1. IT8005 – Electronic Commerce IV Year / VIII Semester
  • 2. UNIT III E-COMMERCE SECURITY AND PAYMENT SYSTEMS E-Commerce Security Environment – Security threats in E-Commerce – Technology Solutions: Encryption, Securing Channels of Communication, Protecting Networks, Protecting Servers and Clients – Management Policies, Business Procedure and Public Laws - Payment Systems
  • 3. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  When you receive a message from a server on the Web with which you will be communicating through a secure channel, this means you will be using SSL/TLS to establish a secure negotiated session.  The URL changes from HTTP to HTTPS.
  • 4. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  A secure negotiated session is a client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted.
  • 5. Securing Channels of Communication
  • 6. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  For instance, your credit card number that you entered into a form would be encrypted.  Through a series of handshakes and communications, the browser and the server establish one another’s identity by exchanging digital certificates, decide on the strongest shared form of encryption, and then proceed to communicate using an agreed upon session key.
  • 7. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  A session key is a unique symmetric encryption key chosen just for this single secure session. Once used, it is gone forever.  SSL/TLS provides data encryption, server authentication, optional client authentication, and message integrity for TCP/IP connections.
  • 8. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  SSL/TLS addresses the issue of authenticity by allowing users to verify another user’s identity or the identity of a server. It also protects the integrity of the messages exchanged.
  • 9. Securing Channels of Communication  Virtual Private Networks (VPNs):  A virtual private network (VPN) allows remote users to securely access a corporation’s local area network via the Internet, using a variety of VPN protocols.  VPNs use both authentication and encryption to secure information from unauthorized persons.  Authentication prevents spoofing and misrepresentation of identities.
  • 10. Securing Channels of Communication  Virtual Private Networks (VPNs):  A remote user can connect to a remote private local network using a local ISP.  The VPN protocols will establish the link from the client to the corporate network as if the user had dialed into the corporate network directly.  The process of connecting one protocol through another (IP) is called tunneling, because the VPN creates a private connection by adding an invisible wrapper around a message to hide its content.
  • 11. Securing Channels of Communication  Virtual Private Networks (VPNs):  The primary use of VPNs is to establish secure communications among business partners—larger suppliers or customers, and employees working remotely.  Using the Internet and VPN as the connection method significantly reduces the cost of secure communications.
  • 12. Securing Channels of Communication  Wireless (Wi-Fi) Networks:  Early Wi-Fi networks used a security standard called Wired Equivalent Privacy (WEP) to encrypt information.  WEP was very weak, and easy for hackers to crack.  A new standard, Wi-Fi Protected Access (WPA), was developed that provided a higher standard of protection, but this too soon became vulnerable to intrusion.
  • 13. Protecting Networks  Firewalls and proxy servers are intended to build a wall around your network and the attached servers and clients, just like physical-world firewalls protect you from fires for a limited period of time.  Firewalls and proxy servers share some similar functions, but they are quite different.
  • 14. Protecting Networks  Firewalls:  A firewall refers to either hardware or software that filters communication packets and prevents some packets from entering or exiting the network based on a security policy.  The firewall controls traffic to and from servers and clients, forbidding communications from untrustworthy sources, and allowing other communications from trusted sources to proceed.
  • 15. Protecting Networks  Firewalls:  Every message that is to be sent or received from the network is processed by the firewall, which determines if the message meets security guidelines established by the business.  Firewalls can filter traffic based on packet attributes such as source IP address, destination port or IP address, type of service (such as WWW or HTTP), the domain name of the source, and many other dimensions.
  • 16. Protecting Networks  Firewalls:  The increasing use of firewalls by home and business Internet users has greatly reduced the effectiveness of attacks, and forced hackers to focus more on e-mail attachments to distribute worms and viruses.  There are two major methods firewalls use to validate traffic: packet filters and application gateways
  • 17. Protecting Networks  Firewalls:  Packet filters examine data packets to determine whether they are destined for a prohibited port or originate from a prohibited IP address.  The filter specifically looks at the source and destination information, as well as the port and packet type, when determining whether the information may be transmitted.
  • 18. Protecting Networks  Firewalls:  Application gateways are a type of firewall that filters communications based on the application being requested, rather than the source or destination of the message.  Such firewalls also process requests at the application level, farther away from the client computer than packet filters.
  • 19. Protecting Networks  Firewalls:  By providing a central filtering point, application gateways provide greater security than packet filters but can compromise system performance.  Next-generation firewalls use an application-centric approach to firewall control.  They are able to identify applications regardless of the port, protocol, or security evasion tools used; identify users regardless of device or IP address
  • 21. Protecting Networks  Proxy Servers:  Proxy servers (proxies) are software servers (often a dedicated computer) that handle all communications originating from or being sent to the Internet by local clients, acting as a spokesperson or bodyguard for the organization.  Proxies act primarily to limit access of internal clients to external Internet servers, although some proxy servers act as firewalls as well.
  • 22. Protecting Networks Proxy Servers:  Proxy servers are sometimes called dual-home systems because they have two network interfaces. To internal computers, a proxy server is known as the gateway, while to external computers it is known as a mail server or numeric address.  When a user on an internal network requests a web page, the request is routed first to the proxy server.
  • 23. Protecting Networks  Proxy Servers:  The proxy server validates the user and the nature of the request, and then sends the request onto the Internet.  A web page sent by an external Internet server first passes to the proxy server. If acceptable, the web page passes onto the internal network web server and then to the client desktop.  By prohibiting users from communicating directly with the Internet, companies can restrict access to certain types of sites, such as pornographic, auction, or stock-trading sites.
  • 24. Protecting Networks  Intrusion Detection and Prevention Systems:  An intrusion detection system (IDS) examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack.  If it detects suspicious activity, the IDS will set off an alarm alerting administrators and log the event in a database.
  • 25. Protecting Networks  Intrusion Detection and Prevention Systems:  An intrusion prevention system (IPS) has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities.  An IPS can terminate a session and reset a connection, block traffic from a suspicious IP address, or reconfigure firewall or router security controls.
  • 26. Protecting Servers and Clients  Operating System Security Enhancements:  The most obvious way to protect servers and clients is to take advantage of automatic computer security upgrades.  The Microsoft, Apple, and Linux/Unix operating systems are continuously updated to patch vulnerabilities discovered by hackers.
  • 27. Protecting Servers and Clients  Operating System Security Enhancements:  These patches are autonomic; that is, when using these operating systems on the Internet, you are prompted and informed that operating system enhancements are available.  Users can easily download these security patches for free. The most common known worms and viruses can be prevented by simply keeping your server and client operating systems and applications up to date.
  • 28. Protecting Servers and Clients  Operating System Security Enhancements - Anti-Virus Software:  The easiest and least-expensive way to prevent threats to system integrity is to install anti-virus software.  Anti-virus programs can be set up so that e-mail attachments are inspected before you click on them, and the attachments are eliminated if they contain a known virus or worm.
  • 29. Protecting Servers and Clients  Operating System Security Enhancements - Anti-Virus Software:  Anti-virus suite packages and stand-alone programs are available to eliminate intruders such as bot programs, adware, and other security risks.  Such programs work much like anti-virus software in that they look for recognized hacker tools or signature actions of known intruders.