SlideShare a Scribd company logo
1 of 18
Download to read offline
UNIT-IV
SECURING THE BUSINESS ON
INTERNET
This Photo by Unknown author is licensed under CC BY-NC-ND.
TOPICS
SECURITY NETWORK
TRANSACTION
TRANSACTION
SECURITY
DIGITAL SIGNATURES
SECURING
THE BUSINESS
ON INTERNET
Network
Security -
MEANING
• Network security is
the protection of the
layers of security to
data, files, etc., against
the unauthorized
access that could lead
to data theft or misuse.​
This Photo by Unknown author is licensed under CC BY-ND.
DEFINITION
Network Security Is a Broad term that covers a multitude of technologies, devices, and processes.
In simplest term, it is a set of rules and configurationsdesigned to protect the
integrity(sincerity),confidentiality, andaccessibility of computer networks and data.
This Photo by Unknown author is licensed under CC BY
1.SECURITY
NETWORK
TRANSACTION
-Introduction
• Security Network Transaction are Very Important
because these days most of the things are happening
online.
• The transactions happen in the following
forms -
▪ When you go in a market & you use a
POS(POINT OF SALE) for payment, then a transaction
occurs.
▪ In your mobile phone when you download am
android app to order something like Amazon, Flipcart
etc.,
▪ When you pay something through an online
payment service like PAYTM, GPAY, etc.,
Secure network transaction happens in an
encrypted form which happens between
the site that we are connected to and the
browser that we are using.
It happens through a file in which the
website provides its details, which we
will deal further in the following sections
A simpler indication is recognizing the
difference between a secure and insecure
connection of which Https:// is a secured
site, while Http:// is not secured.
MEANING
2.TRANSACTION
SECURITY
-
MEANING
TRANSACTION SECURITY IS
CONCERNED WITH PROVIDING
PRIVACY IN TRANSACTION TO
THE BUYERS AND SELLERS AND
PROTECTING THE CLIENT-
SERVER NETWORK FROM
BREAKDOWN AND THIRD PARTY
ATTACKS.
IT BASICALLY DEALS WITH,
• CLIENT SECURITY
• SERVER SECURITY
• SECURE TRANSACTIONS
• 1.CLIENT SECURITY​
• Techniques & practices that protectusers privacy and
integrity of the computing system.
• 2. SERVER SECURITY
• Protectweb server,software& associatedhardware
frombreak-ins,and DOS(DENIAL-OF SERVICE)) attacks.
• DOS(DENIAL OF SERVICE) attacks is an attack meant
to shut down a machine or networkmaking it
inaccessible.
• 3.SECURE TRANSACTION
• Guarantee protectionagainsteavesdropping
(secretly listento a conversation),intentional message
modification(diverting ,tapping)
THERE ARE SOME THREATS INVOLVED IN
BUSINESS TRANSACTION WHICH PUT
QUESTION MARK SAFETY &SECURITY OF
BUSINESS TRANSACTION DONE THROUGH
E-COMMERCE:
THESE THREATS
ARE,
1. BRAND HIJACKING​
2. HACKING​
3. IMPERSONATION​
4. DISHONEST
TRADING​
5. VIRUSES
6. SPOOFING​
1.BRAND HIJACKING
Through the Internet powerful new brands can be created almost overnight;
which can quickly overshadow well-established old brands created through
radio, TV and other media over a long time with considerable expenditure of
money, time and efforts. This phenomenon in technical language is called brand
hijacking, which involves severe loss of goodwill to the owners of old established
brand
2.HACKING
Hackers may intercept messages sent on the Internet. They may misuse
information to their own advantage. They may even modify information to harm
the parties. They may also destroy the data.
3.IMPERSONATION
The hacker may impersonate and pretend to be a customer himself. He may
make use of the stolen credit card of the real customer
4.DISHONEST TRADING
A business enterprise operating a website may indulge(desire) in undesirable
practices. It may operate a fake website & take money from customers and may
not supply the product.
5.VIRUSES
A danger in e-commerce is that of viruses. Some of the viruses are deadly; and clean
up all information that the computer mightbe storing. Viruses thus cause huge loss of
revenue and employeetime.
6.SPOOFING
It is a specific type of cyber attack. It tricks others computer, device or network by
network by trick other computer networks by hiding as a legitimate entity.
REQUIREMENT
S OF
TRANSACTION
SECURITY​
• AUTHENTICATION OF MERCHANT &
CONSUMER ​(PIN OR PASSWORD)
• CONFIDENTIALITYOF
DATA​(UNINTENTIONAL,
UNLAWFUL,THEFT)
• INTEGRITY OF DATA​(ACCURACY &
VALIDITY)
3.DIGITAL SIGNATURE
• A digital signature is an electronic form of a
signature that can be used to authenticate
the identity of the sender of a message or
the signer of a document, and also ensure
that the original content of the message or
document that has been sent is unchanged.
WHO ISSUES
THE DIGITAL
SIGNATURE
CERTIFICATE?
HOW IS DIGITAL SIGNATURE
CREATED/VERIFIED/GENERATED? • A user will generate the
digital signature and another
user will verify the signature
using the verificationprocess.
Both the signer and the
verifier have a public and
private key that they use to
complete each process.... In
this sense,anyone with the
public key can verify the
signed message using the
public key
•
This Photo by Unknown author is licensed under CC BY-SA.
THANK YOU​

More Related Content

What's hot

python Function
python Function python Function
python Function Ronak Rathi
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship DiagramShakila Mahjabin
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business ModelsKarri Huhtanen
 
Basic Concept of Database
Basic Concept of DatabaseBasic Concept of Database
Basic Concept of DatabaseMarlon Jamera
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Normalization in RDBMS.pptx
Normalization in RDBMS.pptxNormalization in RDBMS.pptx
Normalization in RDBMS.pptxYounusS2
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 

What's hot (20)

python Function
python Function python Function
python Function
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
 
Basic Concept of Database
Basic Concept of DatabaseBasic Concept of Database
Basic Concept of Database
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Text mining
Text miningText mining
Text mining
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Normalization in RDBMS.pptx
Normalization in RDBMS.pptxNormalization in RDBMS.pptx
Normalization in RDBMS.pptx
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Rdbms
RdbmsRdbms
Rdbms
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 

Similar to E commerce- securing the business on internet

Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)Nuzhat Memon
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 

Similar to E commerce- securing the business on internet (20)

Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
cyber security
cyber security cyber security
cyber security
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
cyber security
cyber security cyber security
cyber security
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDemandbase
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Search Engine Journal
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfasiyahanif9977
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...ChesterYang6
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!dstvtechnician
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategySouvikRay24
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessAggregage
 
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurRussian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurCall girls in Ahmedabad High profile
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingJuan Pineda
 
How To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot SetupHow To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot Setupssuser4571da
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa
 

Recently uploaded (20)

Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting GroupSEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
 
No Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found OnlineNo Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found Online
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurRussian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO Copywriting
 
How To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot SetupHow To Utilize Calculated Properties in your HubSpot Setup
How To Utilize Calculated Properties in your HubSpot Setup
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdf
 

E commerce- securing the business on internet

  • 1. UNIT-IV SECURING THE BUSINESS ON INTERNET This Photo by Unknown author is licensed under CC BY-NC-ND.
  • 4. Network Security - MEANING • Network security is the protection of the layers of security to data, files, etc., against the unauthorized access that could lead to data theft or misuse.​ This Photo by Unknown author is licensed under CC BY-ND.
  • 5. DEFINITION Network Security Is a Broad term that covers a multitude of technologies, devices, and processes. In simplest term, it is a set of rules and configurationsdesigned to protect the integrity(sincerity),confidentiality, andaccessibility of computer networks and data. This Photo by Unknown author is licensed under CC BY
  • 6. 1.SECURITY NETWORK TRANSACTION -Introduction • Security Network Transaction are Very Important because these days most of the things are happening online. • The transactions happen in the following forms - ▪ When you go in a market & you use a POS(POINT OF SALE) for payment, then a transaction occurs. ▪ In your mobile phone when you download am android app to order something like Amazon, Flipcart etc., ▪ When you pay something through an online payment service like PAYTM, GPAY, etc.,
  • 7. Secure network transaction happens in an encrypted form which happens between the site that we are connected to and the browser that we are using. It happens through a file in which the website provides its details, which we will deal further in the following sections A simpler indication is recognizing the difference between a secure and insecure connection of which Https:// is a secured site, while Http:// is not secured. MEANING
  • 8.
  • 9. 2.TRANSACTION SECURITY - MEANING TRANSACTION SECURITY IS CONCERNED WITH PROVIDING PRIVACY IN TRANSACTION TO THE BUYERS AND SELLERS AND PROTECTING THE CLIENT- SERVER NETWORK FROM BREAKDOWN AND THIRD PARTY ATTACKS. IT BASICALLY DEALS WITH, • CLIENT SECURITY • SERVER SECURITY • SECURE TRANSACTIONS
  • 10. • 1.CLIENT SECURITY​ • Techniques & practices that protectusers privacy and integrity of the computing system. • 2. SERVER SECURITY • Protectweb server,software& associatedhardware frombreak-ins,and DOS(DENIAL-OF SERVICE)) attacks. • DOS(DENIAL OF SERVICE) attacks is an attack meant to shut down a machine or networkmaking it inaccessible. • 3.SECURE TRANSACTION • Guarantee protectionagainsteavesdropping (secretly listento a conversation),intentional message modification(diverting ,tapping)
  • 11. THERE ARE SOME THREATS INVOLVED IN BUSINESS TRANSACTION WHICH PUT QUESTION MARK SAFETY &SECURITY OF BUSINESS TRANSACTION DONE THROUGH E-COMMERCE: THESE THREATS ARE, 1. BRAND HIJACKING​ 2. HACKING​ 3. IMPERSONATION​ 4. DISHONEST TRADING​ 5. VIRUSES 6. SPOOFING​
  • 12. 1.BRAND HIJACKING Through the Internet powerful new brands can be created almost overnight; which can quickly overshadow well-established old brands created through radio, TV and other media over a long time with considerable expenditure of money, time and efforts. This phenomenon in technical language is called brand hijacking, which involves severe loss of goodwill to the owners of old established brand 2.HACKING Hackers may intercept messages sent on the Internet. They may misuse information to their own advantage. They may even modify information to harm the parties. They may also destroy the data. 3.IMPERSONATION The hacker may impersonate and pretend to be a customer himself. He may make use of the stolen credit card of the real customer
  • 13. 4.DISHONEST TRADING A business enterprise operating a website may indulge(desire) in undesirable practices. It may operate a fake website & take money from customers and may not supply the product. 5.VIRUSES A danger in e-commerce is that of viruses. Some of the viruses are deadly; and clean up all information that the computer mightbe storing. Viruses thus cause huge loss of revenue and employeetime. 6.SPOOFING It is a specific type of cyber attack. It tricks others computer, device or network by network by trick other computer networks by hiding as a legitimate entity.
  • 14. REQUIREMENT S OF TRANSACTION SECURITY​ • AUTHENTICATION OF MERCHANT & CONSUMER ​(PIN OR PASSWORD) • CONFIDENTIALITYOF DATA​(UNINTENTIONAL, UNLAWFUL,THEFT) • INTEGRITY OF DATA​(ACCURACY & VALIDITY)
  • 15. 3.DIGITAL SIGNATURE • A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and also ensure that the original content of the message or document that has been sent is unchanged.
  • 17. HOW IS DIGITAL SIGNATURE CREATED/VERIFIED/GENERATED? • A user will generate the digital signature and another user will verify the signature using the verificationprocess. Both the signer and the verifier have a public and private key that they use to complete each process.... In this sense,anyone with the public key can verify the signed message using the public key • This Photo by Unknown author is licensed under CC BY-SA.