E-Commerce portals and websites are one of the major victims of cyberattacks. Some basic configurations in infrastructure can reduce the entire exposure and the vulnerability.
2. Introduction
Threats and Attacks
CIA Concept
Securing the components
Operating System
Application Server
Database
Application
Preventive Measures
3. The protection of information and its critical
elements, including systems and hardware that
use, store, and transmit that information
Information Security is also known as Cyber
Security
4. ● Old Caesar Cipher
● Invoked immediately after the first mainframes
were developed
● Code-breaking computations during World War II
● WikiLeaks, Anonymous, Lulzsec
– Bangladesh Cyber Army
– Bangladesh Black Hat Hackers
5. ● Hacking
● Hacker
● White Hat
● Black Hat
● Gray Hat
● HackTivist
● Compromise
● Cyber Law