SlideShare a Scribd company logo
1 of 12
E-BUSINESS SECURITY
E-Business Security Objectives
• Positively identify or confirm the identity of the party they are dealing with on the
other end of the transaction.
• Determine that the activities being engaged in by an individual or machine is
commensurate with the level of authorization assigned to the individual or
machine.
• Confirm the action taken by the individual or machine and be able to prove to a
third party that the entity (person or machine) did in fact perform the action.
• Protect information from being altered either in storage or in transit.
• Be certain that only authorized entities have access to information.
• Ensure that every component of the e-business infrastructure is available when
needed.
• Be capable of generating an audit trail for verification of transactions.
Challenges Posed to Internet
Mediated Businesses.
• Confidentiality
• Integrity
• Availability
• Legitimate use
• Auditing or Traceability
• Non-repudiation
Confidentiality
• Confidentiality involves making information
accessible to only authorized parties, or
restricting information access to unauthorized
parties.
Integrity
• information integrity is that it remain intact so
that nothing is added nor taken from it that is not
intended or authorized.
• Transmitting information over the Internet (or
any other network) is similar to sending a
package by mail. The package may travel across
numerous trusted and untrusted networks
before reaching its final destination. It is possible
for the data to be intercepted and modified while
in transit.
Availability
• Availability means that systems, data, and
other resources are usable when needed
despite subsystem outages and environmental
disruptions.
• The goal is to ensure that system components
provide continuous service by preventing
failures that could result from accidents or
attacks
Legitimate use
• Legitimate use has three components:
identification, authentication and authorization.
• Identification involves a process of a user positively
identifying itself (human or machine) to the host
(server) that it wishes to conduct a transaction with.
• The response to identification is authentication.
Without authentication, it is possible for the system
to be accessed by an impersonator
• The next step in establishing legitimate use is to
ensure that the entity’s activities within the system
are limited to what it has the right to do.
Auditing or Traceability
• in an e-business security context, auditing is the
process of examining transactions.
• Trust is enhanced if users can be assured that
transactions can be traced from origin to
completion.
• If there is a discrepancy or dispute, it will be
possible to work back through each step in the
process to determine where the problem
occurred and, probably, who is responsible
Non-repudiation
• Non-repudiation is the ability of an originator or
recipient of a transaction to prove to a third
party that their counterpart did in fact take the
action in question.
• Thus the sender of a message should be able to
prove to a third party that the intended recipient
got the message and the recipient should be able
to prove to a third party that the originator did
actually send the message.
Checklist of Security Options
• Physical protection for computers
• Network systems management
• Email control security
• Networks security
• Firewalls
• Encryption
• PKI (Public Key Infrastructure)
• Incident handling
Checklist of Security Options
• Antivirus software
• Digital certificate
• Strong authentication
• Access control
• Audit and Tracing software
• Backup and Disaster recovery
• Biometric software
• Wireless communications security
Risk Assessment
• Risk = (Threat x Vulnerability x Cost of business
disruption) / (Cost of Countermeasure)
• Threat is simply the probability of an attack
• Vulnerability is 1 minus system effectiveness
(which is a number less than 1). That means
100% system effectiveness will produce zero risk
• Cost of disruption is a measure of what it costs to
restore the system to full function plus any loss
of revenue that may occur during the disruption
period

More Related Content

What's hot

E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesInderjeet Singh
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business modelsVikram g b
 
Presentation - Electronic Data Interchange
Presentation - Electronic Data InterchangePresentation - Electronic Data Interchange
Presentation - Electronic Data InterchangeSharad Srivastava
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructureRaj vardhan
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security Tawhid Rahman
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-paymentsraviteja reddy
 
Infrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructureInfrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructurePrince Sharma
 

What's hot (20)

Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
E business strategy
E business strategyE business strategy
E business strategy
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
 
E Payment Methods
E Payment MethodsE Payment Methods
E Payment Methods
 
e-commerce
e-commercee-commerce
e-commerce
 
Presentation - Electronic Data Interchange
Presentation - Electronic Data InterchangePresentation - Electronic Data Interchange
Presentation - Electronic Data Interchange
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-payments
 
Infrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructureInfrastructure of E- commerce and Issues of e-commerce infrastructure
Infrastructure of E- commerce and Issues of e-commerce infrastructure
 

Viewers also liked

Body language and power poses
Body language and power posesBody language and power poses
Body language and power posesSameer Sharma
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networkingSameer Sharma
 
What do you mean by trading on equity.
What do you mean by trading on equity.What do you mean by trading on equity.
What do you mean by trading on equity.Alankit Group
 
E-Commerce and E-Business
E-Commerce and E-BusinessE-Commerce and E-Business
E-Commerce and E-BusinessMiguel Rebollo
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationAnusorn Kansap
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and ThreatsBPalmer13
 

Viewers also liked (14)

E business security
E business securityE business security
E business security
 
Body language and power poses
Body language and power posesBody language and power poses
Body language and power poses
 
Wall Street Career Paths
Wall Street Career PathsWall Street Career Paths
Wall Street Career Paths
 
Bought out deal
Bought out dealBought out deal
Bought out deal
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
What do you mean by trading on equity.
What do you mean by trading on equity.What do you mean by trading on equity.
What do you mean by trading on equity.
 
Ebusiness & Information Systems
Ebusiness & Information SystemsEbusiness & Information Systems
Ebusiness & Information Systems
 
E-Commerce and E-Business
E-Commerce and E-BusinessE-Commerce and E-Business
E-Commerce and E-Business
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
E business & e-commerce contrasted
E business & e-commerce contrastedE business & e-commerce contrasted
E business & e-commerce contrasted
 
E business ppt
E business pptE business ppt
E business ppt
 
E business models
E business modelsE business models
E business models
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 

Similar to E business security

Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptxAwais725629
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptxAwais725629
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptxNISARSHAIKH57
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfAmeliaJonas2
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxRizwanBasha12
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptxdotco
 
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptxOnline Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptxjayveeperez1
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network securitysneha padhiar
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 

Similar to E business security (20)

Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 
ch1-1.ppt
ch1-1.pptch1-1.ppt
ch1-1.ppt
 
Network security
Network securityNetwork security
Network security
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptxOnline Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Unit 1
Unit 1Unit 1
Unit 1
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 

E business security

  • 2. E-Business Security Objectives • Positively identify or confirm the identity of the party they are dealing with on the other end of the transaction. • Determine that the activities being engaged in by an individual or machine is commensurate with the level of authorization assigned to the individual or machine. • Confirm the action taken by the individual or machine and be able to prove to a third party that the entity (person or machine) did in fact perform the action. • Protect information from being altered either in storage or in transit. • Be certain that only authorized entities have access to information. • Ensure that every component of the e-business infrastructure is available when needed. • Be capable of generating an audit trail for verification of transactions.
  • 3. Challenges Posed to Internet Mediated Businesses. • Confidentiality • Integrity • Availability • Legitimate use • Auditing or Traceability • Non-repudiation
  • 4. Confidentiality • Confidentiality involves making information accessible to only authorized parties, or restricting information access to unauthorized parties.
  • 5. Integrity • information integrity is that it remain intact so that nothing is added nor taken from it that is not intended or authorized. • Transmitting information over the Internet (or any other network) is similar to sending a package by mail. The package may travel across numerous trusted and untrusted networks before reaching its final destination. It is possible for the data to be intercepted and modified while in transit.
  • 6. Availability • Availability means that systems, data, and other resources are usable when needed despite subsystem outages and environmental disruptions. • The goal is to ensure that system components provide continuous service by preventing failures that could result from accidents or attacks
  • 7. Legitimate use • Legitimate use has three components: identification, authentication and authorization. • Identification involves a process of a user positively identifying itself (human or machine) to the host (server) that it wishes to conduct a transaction with. • The response to identification is authentication. Without authentication, it is possible for the system to be accessed by an impersonator • The next step in establishing legitimate use is to ensure that the entity’s activities within the system are limited to what it has the right to do.
  • 8. Auditing or Traceability • in an e-business security context, auditing is the process of examining transactions. • Trust is enhanced if users can be assured that transactions can be traced from origin to completion. • If there is a discrepancy or dispute, it will be possible to work back through each step in the process to determine where the problem occurred and, probably, who is responsible
  • 9. Non-repudiation • Non-repudiation is the ability of an originator or recipient of a transaction to prove to a third party that their counterpart did in fact take the action in question. • Thus the sender of a message should be able to prove to a third party that the intended recipient got the message and the recipient should be able to prove to a third party that the originator did actually send the message.
  • 10. Checklist of Security Options • Physical protection for computers • Network systems management • Email control security • Networks security • Firewalls • Encryption • PKI (Public Key Infrastructure) • Incident handling
  • 11. Checklist of Security Options • Antivirus software • Digital certificate • Strong authentication • Access control • Audit and Tracing software • Backup and Disaster recovery • Biometric software • Wireless communications security
  • 12. Risk Assessment • Risk = (Threat x Vulnerability x Cost of business disruption) / (Cost of Countermeasure) • Threat is simply the probability of an attack • Vulnerability is 1 minus system effectiveness (which is a number less than 1). That means 100% system effectiveness will produce zero risk • Cost of disruption is a measure of what it costs to restore the system to full function plus any loss of revenue that may occur during the disruption period