SlideShare a Scribd company logo
1 of 11
Ecommerce Security Dr Ali Sekhavati Elmira Aghagoli 8861008
Ecommerce Policy Account numbers (in databases, logs, files, backup media, etc.) must be stored securely, for example, by means of encryption (128-bit minimum) or truncation.
Ecommerce Policy The secure internal networks must use network address translation (NAT) to hide IP addresses. NAT server
Ecommerce Policy All router, switch, and firewall configurations must be secured
Ecommerce Policy Each non-consumer user with ecommerce access is required to authenticate using a unique username and password
Ecommerce Policy Employees, administrators, or third parties who need to access the ecommerce network remotely must connect with the VPN
Ecommerce Policy Equipment and media containing cardholder data must be physically protected against unauthorized access.  All cardholder data printed on paper or received by fax must be protected against unauthorized access.
Ecommerce Policy An intrusion detection system (IDS) must be used on the ecommerce networks.  Security alerts from the IDS must be continuously monitored, and the latest IDS signatures must be installed.
Symmetric encryption Data Data
Asymmetric Encryption Private key and publik key
security Authentication   Encryption             Data Integrity                                     Data confidentiality

More Related Content

What's hot

E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Security environment
Security environmentSecurity environment
Security environment
Jay Choudhary
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web Security
Dragos Lungu
 

What's hot (20)

E commerce security
E commerce securityE commerce security
E commerce security
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Security environment
Security environmentSecurity environment
Security environment
 
E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web Security
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 

Viewers also liked

Introduction to e commerce
Introduction to e commerceIntroduction to e commerce
Introduction to e commerce
Utomo Prawiro
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 

Viewers also liked (8)

Ecommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant maliEcommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant mali
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
Introduction to e commerce
Introduction to e commerceIntroduction to e commerce
Introduction to e commerce
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
eCMO Conference 2013 - eCommerce - from Policies to Practices
eCMO Conference 2013 - eCommerce - from Policies to PracticeseCMO Conference 2013 - eCommerce - from Policies to Practices
eCMO Conference 2013 - eCommerce - from Policies to Practices
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
E commerce
E commerceE commerce
E commerce
 

Similar to Ecommerce security

EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
ashu6
 

Similar to Ecommerce security (20)

PCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed IntroductionPCI DSS 2.0 Detailed Introduction
PCI DSS 2.0 Detailed Introduction
 
CARD PRODUCTION MANAGER
CARD PRODUCTION MANAGERCARD PRODUCTION MANAGER
CARD PRODUCTION MANAGER
 
CARD PRODUCTION MANAGER
CARD PRODUCTION MANAGERCARD PRODUCTION MANAGER
CARD PRODUCTION MANAGER
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Encryption-Decryption of Email
Encryption-Decryption of EmailEncryption-Decryption of Email
Encryption-Decryption of Email
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
 
Cybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small Businesses
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 

Ecommerce security