This document discusses securing business transactions on the internet. It covers network security, transaction security, and digital signatures. Network security protects data and files from unauthorized access. Transaction security provides privacy and protects client-server networks from threats like hacking, impersonation, and viruses. Digital signatures authenticate identity and ensure message integrity using public/private keys. Overall, the document outlines important concepts for securely conducting business online.
4. Network
Security -
MEANING
• Network security is
the protection of the
layers of security to
data, files, etc., against
the unauthorized
access that could lead
to data theft or misuse.
This Photo by Unknown author is licensed under CC BY-ND.
5. DEFINITION
Network Security Is a Broad term that covers a multitude of technologies, devices, and processes.
In simplest term, it is a set of rules and configurationsdesigned to protect the
integrity(sincerity),confidentiality, andaccessibility of computer networks and data.
This Photo by Unknown author is licensed under CC BY
6. 1.SECURITY
NETWORK
TRANSACTION
-Introduction
• Security Network Transaction are Very Important
because these days most of the things are happening
online.
• The transactions happen in the following
forms -
▪ When you go in a market & you use a
POS(POINT OF SALE) for payment, then a transaction
occurs.
▪ In your mobile phone when you download am
android app to order something like Amazon, Flipcart
etc.,
▪ When you pay something through an online
payment service like PAYTM, GPAY, etc.,
7. Secure network transaction happens in an
encrypted form which happens between
the site that we are connected to and the
browser that we are using.
It happens through a file in which the
website provides its details, which we
will deal further in the following sections
A simpler indication is recognizing the
difference between a secure and insecure
connection of which Https:// is a secured
site, while Http:// is not secured.
MEANING
8.
9. 2.TRANSACTION
SECURITY
-
MEANING
TRANSACTION SECURITY IS
CONCERNED WITH PROVIDING
PRIVACY IN TRANSACTION TO
THE BUYERS AND SELLERS AND
PROTECTING THE CLIENT-
SERVER NETWORK FROM
BREAKDOWN AND THIRD PARTY
ATTACKS.
IT BASICALLY DEALS WITH,
• CLIENT SECURITY
• SERVER SECURITY
• SECURE TRANSACTIONS
10. • 1.CLIENT SECURITY
• Techniques & practices that protectusers privacy and
integrity of the computing system.
• 2. SERVER SECURITY
• Protectweb server,software& associatedhardware
frombreak-ins,and DOS(DENIAL-OF SERVICE)) attacks.
• DOS(DENIAL OF SERVICE) attacks is an attack meant
to shut down a machine or networkmaking it
inaccessible.
• 3.SECURE TRANSACTION
• Guarantee protectionagainsteavesdropping
(secretly listento a conversation),intentional message
modification(diverting ,tapping)
11. THERE ARE SOME THREATS INVOLVED IN
BUSINESS TRANSACTION WHICH PUT
QUESTION MARK SAFETY &SECURITY OF
BUSINESS TRANSACTION DONE THROUGH
E-COMMERCE:
THESE THREATS
ARE,
1. BRAND HIJACKING
2. HACKING
3. IMPERSONATION
4. DISHONEST
TRADING
5. VIRUSES
6. SPOOFING
12. 1.BRAND HIJACKING
Through the Internet powerful new brands can be created almost overnight;
which can quickly overshadow well-established old brands created through
radio, TV and other media over a long time with considerable expenditure of
money, time and efforts. This phenomenon in technical language is called brand
hijacking, which involves severe loss of goodwill to the owners of old established
brand
2.HACKING
Hackers may intercept messages sent on the Internet. They may misuse
information to their own advantage. They may even modify information to harm
the parties. They may also destroy the data.
3.IMPERSONATION
The hacker may impersonate and pretend to be a customer himself. He may
make use of the stolen credit card of the real customer
13. 4.DISHONEST TRADING
A business enterprise operating a website may indulge(desire) in undesirable
practices. It may operate a fake website & take money from customers and may
not supply the product.
5.VIRUSES
A danger in e-commerce is that of viruses. Some of the viruses are deadly; and clean
up all information that the computer mightbe storing. Viruses thus cause huge loss of
revenue and employeetime.
6.SPOOFING
It is a specific type of cyber attack. It tricks others computer, device or network by
network by trick other computer networks by hiding as a legitimate entity.
15. 3.DIGITAL SIGNATURE
• A digital signature is an electronic form of a
signature that can be used to authenticate
the identity of the sender of a message or
the signer of a document, and also ensure
that the original content of the message or
document that has been sent is unchanged.
17. HOW IS DIGITAL SIGNATURE
CREATED/VERIFIED/GENERATED? • A user will generate the
digital signature and another
user will verify the signature
using the verificationprocess.
Both the signer and the
verifier have a public and
private key that they use to
complete each process.... In
this sense,anyone with the
public key can verify the
signed message using the
public key
•
This Photo by Unknown author is licensed under CC BY-SA.