SlideShare a Scribd company logo
AladdinT. Dandis
Jordan eGov Program
 Trust
 Security
 Confidentiality
 Integrity
 Availability
 Authentication
 Non-Repudiation
 Privacy
 Transparency
2AladdinT. Danids - E-Transactions Forum - Amman 2011
 E-Healthcare
 E-Learning
 E-Commerce
 E-Business
 E-Government
 E-Banking
 E-Procurement
 E-Voting
3AladdinT. Danids - E-Transactions Forum - Amman 2011
 Timing:
 Real-time
 Non-real-time
 Infrastructure
 Internet
 Mobile
4AladdinT. Danids - E-Transactions Forum - Amman 2011
 Client-Server
 E-Commerce
 Peer-to-Peer
 EDI
5AladdinT. Danids - E-Transactions Forum - Amman 2011
6AladdinT. Danids - E-Transactions Forum - Amman 2011
 Security
 Identification and authentication
 Message confidentiality
 Message integrity
 Non-repudiation
 Traceability and accountability
 Privacy
 Transparency
 Transparent transaction process
7AladdinT. Danids - E-Transactions Forum - Amman 2011
 Definition
 The willingness of a party (Trustor) to be
vulnerable to the actions of another party
(Trustee) based on expectation that the Trustee
will perform a particular action important to the
Trustor, irrespective of the ability to monitor or
control the Trustee
9AladdinT. Danids - E-Transactions Forum - Amman 2011
 Product or Service
 Brand, Quality
 Financial Model
 Assurance
 Data Flow
 Confidence
10AladdinT. Danids - E-Transactions Forum - Amman 2011
 Data
 Source
 Accuracy
 Subjective
 Personal Responsibility
 Reasoning
 Usability
 Harm
 System
 AuditTrail
 Authorization
 Identification
 Availability
 Reliability
AladdinT. Danids - E-Transactions Forum - Amman 2011 11
 Trust = Fn(Security, Privacy,Transparency)
 Where
 Security = Fn(Security Parameters)
 Privacy = Fn(Privacy Parameters)
 Transparency = Fn(Transparency Parameters)
12AladdinT. Danids - E-Transactions Forum - Amman 2011
13AladdinT. Danids - E-Transactions Forum - Amman 2011
Factor Role Methodology
Social Invoke and EstablishTrust Reputation, Familiarity
Legal System EnforceTrust Law Enforcement and Judicial System
Organizational
and Procedural
EnableTrust Banks andTheir Rules
Technology Enable and EnforceTrust Cryptography, Protocol Standards,
Tools
14AladdinT. Danids - E-Transactions Forum - Amman 2011
 Confidentiality
 Encryption, Data Classification
 Integrity
 Hashing, Checksum, ACID
 Availability
 Backup, Clustering, BC & DR
16AladdinT. Danids - E-Transactions Forum - Amman 2011
 Trustee
 Site Seal
 WS-X
 Trustor
 Digital Certificates
 Passwords over SSL
 Smart Cards or Payment Cards
17AladdinT. Danids - E-Transactions Forum - Amman 2011
 Digital Signature
 PGP
 PKI
 AuditTrails
 Rather thanTraceability and Auditability
18AladdinT. Danids - E-Transactions Forum - Amman 2011
 Definition
 The appropriate use of personal information
under the circumstances, depending on context,
law, and the individual’s expectations.
 The right of an individual to control the collection,
use, and disclosure of personal information.
20AladdinT. Danids - E-Transactions Forum - Amman 2011
 Opt-in,Opt-out
 User Profile Management
21AladdinT. Danids - E-Transactions Forum - Amman 2011
 Organization for Economic Cooperation and
Development (OECD)
1. Collection Limitation Principle
2. Data Quality Principle
3. Purpose Specification Principle
4. Use Limitation Principle
5. Security Safeguards Principle
6. Openness Principle
7. Individual Participation Principle
8. Accountability Principle
22AladdinT. Danids - E-Transactions Forum - Amman 2011
 Definition:
 The quality of being clear and transparent
 Easily understood or seen through
24AladdinT. Danids - E-Transactions Forum - Amman 2011
 Business Processes
 Governance
 Policies
 Standards
 Roles and Accountability
 Closed vs. Open Source
 Auditability
 Certification
 Full Disclosure
 Cryptography
25AladdinT. Danids - E-Transactions Forum - Amman 2011
 Target:
 Organizations that store, process, or transmit credit
card data.
 Requirements
 Building and maintaining a secure network
 Protecting cardholder data
 Maintaining a vulnerability management program
 Implementing strong access control measures
 Regularly monitoring and testing networks
 Maintaining an information security policy
27AladdinT. Danids - E-Transactions Forum - Amman 2011
28AladdinT. Danids - E-Transactions Forum - Amman 2011
www.infosecacademy.blogspot.com

More Related Content

What's hot

The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
ForgeRock
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
Gareth Niblett
 
What is smart contract and how does it work
What is smart contract and how does it work What is smart contract and how does it work
What is smart contract and how does it work
Global Tech Council
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business Cases
Slava Buga
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
Ubisecure
 
Various blockchain specialization domains
Various blockchain specialization domainsVarious blockchain specialization domains
Various blockchain specialization domains
Blockchain Council
 
Cayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPsCayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPs
Ramona Tudorancea
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key Infrastructure
Chin Wan Lim
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock
 
Blockchain in human resource
Blockchain in human resourceBlockchain in human resource
Blockchain in human resource
Celine George
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual CurrenciesInitial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
Mark McKenzie, RHB
 
Blockchain Solutions for HR
Blockchain Solutions for HRBlockchain Solutions for HR
Blockchain Solutions for HR
Edward Lange
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
Nitin Patidar
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
Alan Quayle
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utility
Quan Risk
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit123
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
FIDO Alliance
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership Edition
Farhan Farrukh
 
Blockchain Technology And Innovation In Insurance Sector
Blockchain Technology And Innovation In Insurance SectorBlockchain Technology And Innovation In Insurance Sector
Blockchain Technology And Innovation In Insurance Sector
Blockchain Council
 

What's hot (20)

The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
What is smart contract and how does it work
What is smart contract and how does it work What is smart contract and how does it work
What is smart contract and how does it work
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business Cases
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
Various blockchain specialization domains
Various blockchain specialization domainsVarious blockchain specialization domains
Various blockchain specialization domains
 
Cayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPsCayman Compliant Series - AML Requirements for VASPs
Cayman Compliant Series - AML Requirements for VASPs
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key Infrastructure
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Blockchain in human resource
Blockchain in human resourceBlockchain in human resource
Blockchain in human resource
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual CurrenciesInitial Thoughts on Regulation for Bitcoin and Virtual Currencies
Initial Thoughts on Regulation for Bitcoin and Virtual Currencies
 
Blockchain Solutions for HR
Blockchain Solutions for HRBlockchain Solutions for HR
Blockchain Solutions for HR
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utility
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership Edition
 
Blockchain Technology And Innovation In Insurance Sector
Blockchain Technology And Innovation In Insurance SectorBlockchain Technology And Innovation In Insurance Sector
Blockchain Technology And Innovation In Insurance Sector
 

Similar to Building trust attributes in e transactions (final) ver 3.0

Pki (2nd e transactions forum) v 1.0
Pki (2nd e transactions forum) v 1.0Pki (2nd e transactions forum) v 1.0
Pki (2nd e transactions forum) v 1.0
Aladdin Dandis
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
Mohan Venkataraman
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
Agile Testing Alliance
 
Andy Martin - Token Economy Graphics
Andy Martin - Token Economy GraphicsAndy Martin - Token Economy Graphics
Andy Martin - Token Economy Graphics
Tu Chu Quang
 
Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)
Aladdin Dandis
 
Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019
R3
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
Colleen Beck-Domanico
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Agile Financial Technologies
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
Dr Rachel O'Connell
 
Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Amila Gamanayake
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
lgcdcpas
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
IdentityNorthEvents
 
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic CommerceIRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET Journal
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup Landscape
Tracxn
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
Ulf Mattsson
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
Ulf Mattsson
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
The paypers Vol 5.
The paypers Vol 5. The paypers Vol 5.
The paypers Vol 5. EastNets
 

Similar to Building trust attributes in e transactions (final) ver 3.0 (20)

Pki (2nd e transactions forum) v 1.0
Pki (2nd e transactions forum) v 1.0Pki (2nd e transactions forum) v 1.0
Pki (2nd e transactions forum) v 1.0
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
 
Andy Martin - Token Economy Graphics
Andy Martin - Token Economy GraphicsAndy Martin - Token Economy Graphics
Andy Martin - Token Economy Graphics
 
Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)Sice2011 cdam by aladdin dandis (final)
Sice2011 cdam by aladdin dandis (final)
 
Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019Corda for Corporates at Sibos 2019
Corda for Corporates at Sibos 2019
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
 
Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
 
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic CommerceIRJET -  	  Data Privacy,Trust Issues and Solutions in Electronic Commerce
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup Landscape
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
The paypers Vol 5.
The paypers Vol 5. The paypers Vol 5.
The paypers Vol 5.
 

More from Aladdin Dandis

The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace
Aladdin Dandis
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...
Aladdin Dandis
 
What is still missed for security real life facts
What is still missed for security  real life factsWhat is still missed for security  real life facts
What is still missed for security real life facts
Aladdin Dandis
 
A practical approach to secure your business on the cloud using aws from str...
A practical approach to secure your business on the cloud using aws  from str...A practical approach to secure your business on the cloud using aws  from str...
A practical approach to secure your business on the cloud using aws from str...
Aladdin Dandis
 
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Aladdin Dandis
 
The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...
Aladdin Dandis
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
Aladdin Dandis
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
Aladdin Dandis
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
Aladdin Dandis
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
Aladdin Dandis
 
Module 3 business continuity student slides ver 1.0
Module 3 business continuity   student slides ver 1.0Module 3 business continuity   student slides ver 1.0
Module 3 business continuity student slides ver 1.0
Aladdin Dandis
 
Module 1 bc and dr fundamentals student slides ver 1.0
Module 1 bc and dr fundamentals   student slides ver 1.0Module 1 bc and dr fundamentals   student slides ver 1.0
Module 1 bc and dr fundamentals student slides ver 1.0
Aladdin Dandis
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
Aladdin Dandis
 
Assessing a cloud based approach to cyber security
Assessing a cloud based approach to cyber securityAssessing a cloud based approach to cyber security
Assessing a cloud based approach to cyber security
Aladdin Dandis
 
Cisa 2013 ch3
Cisa 2013 ch3Cisa 2013 ch3
Cisa 2013 ch3
Aladdin Dandis
 
Cisa 2013 ch2
Cisa 2013 ch2Cisa 2013 ch2
Cisa 2013 ch2
Aladdin Dandis
 
Cisa 2013 ch4
Cisa 2013 ch4Cisa 2013 ch4
Cisa 2013 ch4
Aladdin Dandis
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
Aladdin Dandis
 
Cisa 2013 ch0
Cisa 2013 ch0Cisa 2013 ch0
Cisa 2013 ch0
Aladdin Dandis
 

More from Aladdin Dandis (20)

The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace
 
How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...How to secure your business on the cloud? practical approach from strategy to...
How to secure your business on the cloud? practical approach from strategy to...
 
What is still missed for security real life facts
What is still missed for security  real life factsWhat is still missed for security  real life facts
What is still missed for security real life facts
 
A practical approach to secure your business on the cloud using aws from str...
A practical approach to secure your business on the cloud using aws  from str...A practical approach to secure your business on the cloud using aws  from str...
A practical approach to secure your business on the cloud using aws from str...
 
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
 
The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
 
Module 3 business continuity student slides ver 1.0
Module 3 business continuity   student slides ver 1.0Module 3 business continuity   student slides ver 1.0
Module 3 business continuity student slides ver 1.0
 
Module 1 bc and dr fundamentals student slides ver 1.0
Module 1 bc and dr fundamentals   student slides ver 1.0Module 1 bc and dr fundamentals   student slides ver 1.0
Module 1 bc and dr fundamentals student slides ver 1.0
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
Assessing a cloud based approach to cyber security
Assessing a cloud based approach to cyber securityAssessing a cloud based approach to cyber security
Assessing a cloud based approach to cyber security
 
Cisa 2013 ch3
Cisa 2013 ch3Cisa 2013 ch3
Cisa 2013 ch3
 
Cisa 2013 ch2
Cisa 2013 ch2Cisa 2013 ch2
Cisa 2013 ch2
 
Cisa 2013 ch4
Cisa 2013 ch4Cisa 2013 ch4
Cisa 2013 ch4
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Cisa 2013 ch0
Cisa 2013 ch0Cisa 2013 ch0
Cisa 2013 ch0
 

Recently uploaded

Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 

Recently uploaded (13)

Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 

Building trust attributes in e transactions (final) ver 3.0

  • 2.  Trust  Security  Confidentiality  Integrity  Availability  Authentication  Non-Repudiation  Privacy  Transparency 2AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 3.  E-Healthcare  E-Learning  E-Commerce  E-Business  E-Government  E-Banking  E-Procurement  E-Voting 3AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 4.  Timing:  Real-time  Non-real-time  Infrastructure  Internet  Mobile 4AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 5.  Client-Server  E-Commerce  Peer-to-Peer  EDI 5AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 6. 6AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 7.  Security  Identification and authentication  Message confidentiality  Message integrity  Non-repudiation  Traceability and accountability  Privacy  Transparency  Transparent transaction process 7AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 8.
  • 9.  Definition  The willingness of a party (Trustor) to be vulnerable to the actions of another party (Trustee) based on expectation that the Trustee will perform a particular action important to the Trustor, irrespective of the ability to monitor or control the Trustee 9AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 10.  Product or Service  Brand, Quality  Financial Model  Assurance  Data Flow  Confidence 10AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 11.  Data  Source  Accuracy  Subjective  Personal Responsibility  Reasoning  Usability  Harm  System  AuditTrail  Authorization  Identification  Availability  Reliability AladdinT. Danids - E-Transactions Forum - Amman 2011 11
  • 12.  Trust = Fn(Security, Privacy,Transparency)  Where  Security = Fn(Security Parameters)  Privacy = Fn(Privacy Parameters)  Transparency = Fn(Transparency Parameters) 12AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 13. 13AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 14. Factor Role Methodology Social Invoke and EstablishTrust Reputation, Familiarity Legal System EnforceTrust Law Enforcement and Judicial System Organizational and Procedural EnableTrust Banks andTheir Rules Technology Enable and EnforceTrust Cryptography, Protocol Standards, Tools 14AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 15.
  • 16.  Confidentiality  Encryption, Data Classification  Integrity  Hashing, Checksum, ACID  Availability  Backup, Clustering, BC & DR 16AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 17.  Trustee  Site Seal  WS-X  Trustor  Digital Certificates  Passwords over SSL  Smart Cards or Payment Cards 17AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 18.  Digital Signature  PGP  PKI  AuditTrails  Rather thanTraceability and Auditability 18AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 19.
  • 20.  Definition  The appropriate use of personal information under the circumstances, depending on context, law, and the individual’s expectations.  The right of an individual to control the collection, use, and disclosure of personal information. 20AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 21.  Opt-in,Opt-out  User Profile Management 21AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 22.  Organization for Economic Cooperation and Development (OECD) 1. Collection Limitation Principle 2. Data Quality Principle 3. Purpose Specification Principle 4. Use Limitation Principle 5. Security Safeguards Principle 6. Openness Principle 7. Individual Participation Principle 8. Accountability Principle 22AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 23.
  • 24.  Definition:  The quality of being clear and transparent  Easily understood or seen through 24AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 25.  Business Processes  Governance  Policies  Standards  Roles and Accountability  Closed vs. Open Source  Auditability  Certification  Full Disclosure  Cryptography 25AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 26.
  • 27.  Target:  Organizations that store, process, or transmit credit card data.  Requirements  Building and maintaining a secure network  Protecting cardholder data  Maintaining a vulnerability management program  Implementing strong access control measures  Regularly monitoring and testing networks  Maintaining an information security policy 27AladdinT. Danids - E-Transactions Forum - Amman 2011
  • 28. 28AladdinT. Danids - E-Transactions Forum - Amman 2011