SlideShare a Scribd company logo
1 of 11
TO ALL
E-COMMERCE
SECURITY MEASURES
LIMITATIONS OF
LIMITATIONS OF
E-COMMERCE SECURITY MEASURES
• Software for Security Fault & Hardware
• Firewall and Network Configurations
• Human Elements and Company’sThreats
• Weakness of Cryptographic Designs
• Weakness and Limitation on Implementations
• Limitations againstTrust Models
• Weakness on Failure Recovery
SOFTWARE FOR
SECURITY FAULT & HARDWARE
• Complex software code may probably have loopholes
that an attacker can exploit.
• Tamper – Resistant hardware systems assume that public
terminals never fall into the wrong hands, but it is rarely seen the
tools for breaking tamper-resistance are also existing.
• Sometimes cryptographic processors may fail to read or process
the secret keys used.
FIREWALL &
NETWORK CONFIGURATIONS
• Network Security is designed to cover the problems
identified with host security.
• A Firewall security can be very simple or complex depending on the
particular requirements of the enterprise.
• Today Private, internal networks are connected to the Internet to get
access to external resources, so security measures like building firewalls
should be well planned to avoid possible risk of exposure of internal
network to outside world.
HUMAN ELEMENTS &
COMPANY’S THREATS
• Password is the weak link in any encryption method, so a
password is only good if it is chosen carefully.
• As complex password are hard to remember, majority chooses
simple passwords like middle names, birthday, mobile no. etc.
which could be guessed or break by brute force.
WEAKNESS OF
CRYPTOGRAPHIC DESIGNS
• Cracking any of the element of Cryptographic System may break entire
system.
• The value of cryptography lost due to the failure to check the size of
values, reusing parameters that never be reused, and so on.
• It is possible to build strong & weak cryptographic system using strong
algorithms and protocols, so a strong cryptographic system should be
created integrating all power elements.
WEAKNESS & LIMITATION ON
IMPLEMENTATION
• Not ensuring that plain text is destroyed after it is encrypted.
• To protect from data loss, systems use temporary files which
accidentally leaves plain text on the Hard Drive.
• In extreme cases OS leaves the security keys on the Hard
Drive.
LIMITATIONS AGAINST
TRUST MODELS
• We cannot be sure or declare that our system is fully secured,
it should be ensured by certified trusted source who will
stand as our Trust Model.
• That is there should be a Standard Trust Model which certifies
the security of the system as powerful.
WEAKNESS ON
FAILURE RECOVERY
• Strong Systems protect small security breaks from getting
bigger.
• Breaking the key to one file should not allow the attacker to
read every file, that is every files should be separated by any
means.
• A good system design considers methods to recover suddenly
from attacks before it gets bigger.
…ALL

More Related Content

What's hot

סדנת מבוא: הגנת סייבר למבקרי מערכות מידע
סדנת מבוא: הגנת סייבר למבקרי מערכות מידעסדנת מבוא: הגנת סייבר למבקרי מערכות מידע
סדנת מבוא: הגנת סייבר למבקרי מערכות מידעHillel Kobrovski
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...
ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...
ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...Ist. Superiore Marini-Gioia - Enzo Exposyto
 
Sicurezza Informatica
Sicurezza InformaticaSicurezza Informatica
Sicurezza InformaticaMario Varini
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network AttacksPradipta Poudel
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesSlideTeam
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-systemintellisenseit
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system UrmilasSrinivasan
 

What's hot (20)

Smart dust
Smart dustSmart dust
Smart dust
 
cyber security
cyber security cyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
סדנת מבוא: הגנת סייבר למבקרי מערכות מידע
סדנת מבוא: הגנת סייבר למבקרי מערכות מידעסדנת מבוא: הגנת סייבר למבקרי מערכות מידע
סדנת מבוא: הגנת סייבר למבקרי מערכות מידע
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...
ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...
ICDL/ECDL FULL STANDARD - IT SECURITY - CONCETTI di SICUREZZA - SICUREZZA PER...
 
Sicurezza Informatica
Sicurezza InformaticaSicurezza Informatica
Sicurezza Informatica
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
system Security
system Security system Security
system Security
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-system
 
Security in an embedded system
Security in an embedded system Security in an embedded system
Security in an embedded system
 

Viewers also liked

6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Interactive Web Site Limitations
Interactive Web Site LimitationsInteractive Web Site Limitations
Interactive Web Site Limitationswebhostingguy
 
Technology Trends in eCommerce 2010 2013
Technology Trends in eCommerce 2010   2013Technology Trends in eCommerce 2010   2013
Technology Trends in eCommerce 2010 2013Andrew Braun
 
Jh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db IntroJh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db Introbruce nightingale
 
eCommerce Case Studies - numbers inside!
eCommerce Case Studies - numbers inside!eCommerce Case Studies - numbers inside!
eCommerce Case Studies - numbers inside!Divante
 
e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce TechnologyDivante
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
 
Chap 8 ethical, social and political issues in e-commerce
Chap 8   ethical, social and political issues in e-commerceChap 8   ethical, social and political issues in e-commerce
Chap 8 ethical, social and political issues in e-commerceNorisuwanah Jaffar
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesInderjeet Singh
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerceMarya Sholevar
 

Viewers also liked (13)

E commerce Security
E commerce Security E commerce Security
E commerce Security
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Interactive Web Site Limitations
Interactive Web Site LimitationsInteractive Web Site Limitations
Interactive Web Site Limitations
 
Technology Trends in eCommerce 2010 2013
Technology Trends in eCommerce 2010   2013Technology Trends in eCommerce 2010   2013
Technology Trends in eCommerce 2010 2013
 
Jh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db IntroJh Semester1 Year1 2008 09 Db Intro
Jh Semester1 Year1 2008 09 Db Intro
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
eCommerce Case Studies - numbers inside!
eCommerce Case Studies - numbers inside!eCommerce Case Studies - numbers inside!
eCommerce Case Studies - numbers inside!
 
e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce Technology
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Chap 8 ethical, social and political issues in e-commerce
Chap 8   ethical, social and political issues in e-commerceChap 8   ethical, social and political issues in e-commerce
Chap 8 ethical, social and political issues in e-commerce
 
Traditional Versus Online Marketing
Traditional Versus Online MarketingTraditional Versus Online Marketing
Traditional Versus Online Marketing
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
 

Similar to Limitations E - Commerce Security measures

201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptxLakshayYadav46
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architectureImran Khan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackNicole Fucile-Borsian
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.pptnaghamallella
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)NCC Group
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Amr Salah
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a DatabaseJohn Ashmead
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 

Similar to Limitations E - Commerce Security measures (20)

201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Data security
Data securityData security
Data security
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
Unit4
Unit4Unit4
Unit4
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 

More from Jeril Peter

SDG - Sustainable Development Goals
SDG - Sustainable Development GoalsSDG - Sustainable Development Goals
SDG - Sustainable Development GoalsJeril Peter
 
Nestle Industrial analysis
Nestle Industrial analysisNestle Industrial analysis
Nestle Industrial analysisJeril Peter
 
Samsung Industry and Firm Analysis
Samsung Industry and Firm AnalysisSamsung Industry and Firm Analysis
Samsung Industry and Firm AnalysisJeril Peter
 
Amazon Industrial analysis
Amazon Industrial analysisAmazon Industrial analysis
Amazon Industrial analysisJeril Peter
 
Airtel Industrial analysis
Airtel Industrial analysisAirtel Industrial analysis
Airtel Industrial analysisJeril Peter
 
Industrial analysis of TATA Motors
Industrial analysis of TATA MotorsIndustrial analysis of TATA Motors
Industrial analysis of TATA MotorsJeril Peter
 
Industrial Analysis of OLA
Industrial Analysis of OLAIndustrial Analysis of OLA
Industrial Analysis of OLAJeril Peter
 
Internet Regulatory Framework
Internet Regulatory FrameworkInternet Regulatory Framework
Internet Regulatory FrameworkJeril Peter
 
Business Life Cycle
Business Life CycleBusiness Life Cycle
Business Life CycleJeril Peter
 
Performance Management
Performance ManagementPerformance Management
Performance ManagementJeril Peter
 
Marketing Management
Marketing ManagementMarketing Management
Marketing ManagementJeril Peter
 

More from Jeril Peter (17)

SDG - Sustainable Development Goals
SDG - Sustainable Development GoalsSDG - Sustainable Development Goals
SDG - Sustainable Development Goals
 
Nestle Industrial analysis
Nestle Industrial analysisNestle Industrial analysis
Nestle Industrial analysis
 
Samsung Industry and Firm Analysis
Samsung Industry and Firm AnalysisSamsung Industry and Firm Analysis
Samsung Industry and Firm Analysis
 
Amul
Amul Amul
Amul
 
Big Bazaar
Big BazaarBig Bazaar
Big Bazaar
 
Amazon Industrial analysis
Amazon Industrial analysisAmazon Industrial analysis
Amazon Industrial analysis
 
Airtel Industrial analysis
Airtel Industrial analysisAirtel Industrial analysis
Airtel Industrial analysis
 
Industrial analysis of TATA Motors
Industrial analysis of TATA MotorsIndustrial analysis of TATA Motors
Industrial analysis of TATA Motors
 
Industrial Analysis of OLA
Industrial Analysis of OLAIndustrial Analysis of OLA
Industrial Analysis of OLA
 
Internet Regulatory Framework
Internet Regulatory FrameworkInternet Regulatory Framework
Internet Regulatory Framework
 
E - Marketing
E - Marketing E - Marketing
E - Marketing
 
Website
WebsiteWebsite
Website
 
Mobile Apps
Mobile AppsMobile Apps
Mobile Apps
 
Business Life Cycle
Business Life CycleBusiness Life Cycle
Business Life Cycle
 
Performance Management
Performance ManagementPerformance Management
Performance Management
 
Business Ethics
Business EthicsBusiness Ethics
Business Ethics
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 

Recently uploaded

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (11)

Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Limitations E - Commerce Security measures

  • 3. LIMITATIONS OF E-COMMERCE SECURITY MEASURES • Software for Security Fault & Hardware • Firewall and Network Configurations • Human Elements and Company’sThreats • Weakness of Cryptographic Designs • Weakness and Limitation on Implementations • Limitations againstTrust Models • Weakness on Failure Recovery
  • 4. SOFTWARE FOR SECURITY FAULT & HARDWARE • Complex software code may probably have loopholes that an attacker can exploit. • Tamper – Resistant hardware systems assume that public terminals never fall into the wrong hands, but it is rarely seen the tools for breaking tamper-resistance are also existing. • Sometimes cryptographic processors may fail to read or process the secret keys used.
  • 5. FIREWALL & NETWORK CONFIGURATIONS • Network Security is designed to cover the problems identified with host security. • A Firewall security can be very simple or complex depending on the particular requirements of the enterprise. • Today Private, internal networks are connected to the Internet to get access to external resources, so security measures like building firewalls should be well planned to avoid possible risk of exposure of internal network to outside world.
  • 6. HUMAN ELEMENTS & COMPANY’S THREATS • Password is the weak link in any encryption method, so a password is only good if it is chosen carefully. • As complex password are hard to remember, majority chooses simple passwords like middle names, birthday, mobile no. etc. which could be guessed or break by brute force.
  • 7. WEAKNESS OF CRYPTOGRAPHIC DESIGNS • Cracking any of the element of Cryptographic System may break entire system. • The value of cryptography lost due to the failure to check the size of values, reusing parameters that never be reused, and so on. • It is possible to build strong & weak cryptographic system using strong algorithms and protocols, so a strong cryptographic system should be created integrating all power elements.
  • 8. WEAKNESS & LIMITATION ON IMPLEMENTATION • Not ensuring that plain text is destroyed after it is encrypted. • To protect from data loss, systems use temporary files which accidentally leaves plain text on the Hard Drive. • In extreme cases OS leaves the security keys on the Hard Drive.
  • 9. LIMITATIONS AGAINST TRUST MODELS • We cannot be sure or declare that our system is fully secured, it should be ensured by certified trusted source who will stand as our Trust Model. • That is there should be a Standard Trust Model which certifies the security of the system as powerful.
  • 10. WEAKNESS ON FAILURE RECOVERY • Strong Systems protect small security breaks from getting bigger. • Breaking the key to one file should not allow the attacker to read every file, that is every files should be separated by any means. • A good system design considers methods to recover suddenly from attacks before it gets bigger.