SlideShare a Scribd company logo
E-BUSINESS SECURITY
E-Business Security Objectives
• Positively identify or confirm the identity of the party they are dealing with on the
other end of the transaction.
• Determine that the activities being engaged in by an individual or machine is
commensurate with the level of authorization assigned to the individual or
machine.
• Confirm the action taken by the individual or machine and be able to prove to a
third party that the entity (person or machine) did in fact perform the action.
• Protect information from being altered either in storage or in transit.
• Be certain that only authorized entities have access to information.
• Ensure that every component of the e-business infrastructure is available when
needed.
• Be capable of generating an audit trail for verification of transactions.
Challenges Posed to Internet
Mediated Businesses.
• Confidentiality
• Integrity
• Availability
• Legitimate use
• Auditing or Traceability
• Non-repudiation
Confidentiality
• Confidentiality involves making information
accessible to only authorized parties, or
restricting information access to unauthorized
parties.
Integrity
• information integrity is that it remain intact so
that nothing is added nor taken from it that is not
intended or authorized.
• Transmitting information over the Internet (or
any other network) is similar to sending a
package by mail. The package may travel across
numerous trusted and untrusted networks
before reaching its final destination. It is possible
for the data to be intercepted and modified while
in transit.
Availability
• Availability means that systems, data, and
other resources are usable when needed
despite subsystem outages and environmental
disruptions.
• The goal is to ensure that system components
provide continuous service by preventing
failures that could result from accidents or
attacks
Legitimate use
• Legitimate use has three components:
identification, authentication and authorization.
• Identification involves a process of a user positively
identifying itself (human or machine) to the host
(server) that it wishes to conduct a transaction with.
• The response to identification is authentication.
Without authentication, it is possible for the system
to be accessed by an impersonator
• The next step in establishing legitimate use is to
ensure that the entity’s activities within the system
are limited to what it has the right to do.
Auditing or Traceability
• in an e-business security context, auditing is the
process of examining transactions.
• Trust is enhanced if users can be assured that
transactions can be traced from origin to
completion.
• If there is a discrepancy or dispute, it will be
possible to work back through each step in the
process to determine where the problem
occurred and, probably, who is responsible
Non-repudiation
• Non-repudiation is the ability of an originator or
recipient of a transaction to prove to a third
party that their counterpart did in fact take the
action in question.
• Thus the sender of a message should be able to
prove to a third party that the intended recipient
got the message and the recipient should be able
to prove to a third party that the originator did
actually send the message.
Checklist of Security Options
• Physical protection for computers
• Network systems management
• Email control security
• Networks security
• Firewalls
• Encryption
• PKI (Public Key Infrastructure)
• Incident handling
Checklist of Security Options
• Antivirus software
• Digital certificate
• Strong authentication
• Access control
• Audit and Tracing software
• Backup and Disaster recovery
• Biometric software
• Wireless communications security
Risk Assessment
• Risk = (Threat x Vulnerability x Cost of business
disruption) / (Cost of Countermeasure)
• Threat is simply the probability of an attack
• Vulnerability is 1 minus system effectiveness
(which is a number less than 1). That means
100% system effectiveness will produce zero risk
• Cost of disruption is a measure of what it costs to
restore the system to full function plus any loss
of revenue that may occur during the disruption
period

More Related Content

What's hot

Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
Dattatreya Reddy Peram
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
Advantages and disadvantages of e commerce
Advantages and disadvantages of e commerceAdvantages and disadvantages of e commerce
Advantages and disadvantages of e commerce
Shubha Sharma
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
minisharma35
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 
Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce Full Notes on E-Commerce | Study Material for E-Commerce
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
politegcuf
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
Mohsin Ahmad
 
Computer crime
 Computer crime Computer crime
Computer crime
Anika Rahman Orin
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
Inderjeet Singh
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
Vinay Chaithanya
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
Dattatreya Reddy Peram
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
arun alfie
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
Nrapesh Shah
 

What's hot (20)

Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Advantages and disadvantages of e commerce
Advantages and disadvantages of e commerceAdvantages and disadvantages of e commerce
Advantages and disadvantages of e commerce
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Computer crime
 Computer crime Computer crime
Computer crime
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 

Viewers also liked

E business security
E business securityE business security
E business security
Yennie Rossia
 
Body language and power poses
Body language and power posesBody language and power poses
Body language and power poses
Sameer Sharma
 
Wall Street Career Paths
Wall Street Career PathsWall Street Career Paths
Wall Street Career Paths
Michael Herlache
 
Bought out deal
Bought out dealBought out deal
Bought out deal
NEELAM KUSHWAHA
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
Sameer Sharma
 
What do you mean by trading on equity.
What do you mean by trading on equity.What do you mean by trading on equity.
What do you mean by trading on equity.
Alankit Group
 
Ebusiness & Information Systems
Ebusiness & Information SystemsEbusiness & Information Systems
Ebusiness & Information Systems
Jose G. Lepervanche, PhD
 
E-Commerce and E-Business
E-Commerce and E-BusinessE-Commerce and E-Business
E-Commerce and E-Business
Miguel Rebollo
 
E business & e-commerce contrasted
E business & e-commerce contrastedE business & e-commerce contrasted
E business & e-commerce contrasted
Kato Ismael, MUBS-UGANDA
 
E business ppt
E business pptE business ppt
E business ppt
Mayank Kumar
 
E business models
E business modelsE business models
E business models
Madhur Choudhary
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
Anusorn Kansap
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
BPalmer13
 

Viewers also liked (13)

E business security
E business securityE business security
E business security
 
Body language and power poses
Body language and power posesBody language and power poses
Body language and power poses
 
Wall Street Career Paths
Wall Street Career PathsWall Street Career Paths
Wall Street Career Paths
 
Bought out deal
Bought out dealBought out deal
Bought out deal
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
What do you mean by trading on equity.
What do you mean by trading on equity.What do you mean by trading on equity.
What do you mean by trading on equity.
 
Ebusiness & Information Systems
Ebusiness & Information SystemsEbusiness & Information Systems
Ebusiness & Information Systems
 
E-Commerce and E-Business
E-Commerce and E-BusinessE-Commerce and E-Business
E-Commerce and E-Business
 
E business & e-commerce contrasted
E business & e-commerce contrastedE business & e-commerce contrasted
E business & e-commerce contrasted
 
E business ppt
E business pptE business ppt
E business ppt
 
E business models
E business modelsE business models
E business models
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 

Similar to E business security

Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
Awais725629
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
Awais725629
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
MohammadAbusaa3
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
BhargaviGorde1
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
NISARSHAIKH57
 
ch1-1.ppt
ch1-1.pptch1-1.ppt
ch1-1.ppt
NayyabMirTahir
 
Network security
Network securityNetwork security
Network security
Siddhesh Palkar
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
AmeliaJonas2
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
RizwanBasha12
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
dotco
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
 
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptxOnline Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx
jayveeperez1
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
Temesgen Berhanu
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
sneha padhiar
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
VinzoCenzo
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Unit 1
Unit 1Unit 1

Similar to E business security (20)

Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 
ch1-1.ppt
ch1-1.pptch1-1.ppt
ch1-1.ppt
 
Network security
Network securityNetwork security
Network security
 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
crisc_wk_5.pptx
crisc_wk_5.pptxcrisc_wk_5.pptx
crisc_wk_5.pptx
 
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - IntroductionCNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
 
Online Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptxOnline Safety, Security and Rules of Netiquette.pptx
Online Safety, Security and Rules of Netiquette.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Introduction of network security
Introduction of network securityIntroduction of network security
Introduction of network security
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Unit 1
Unit 1Unit 1
Unit 1
 

Recently uploaded

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

E business security

  • 2. E-Business Security Objectives • Positively identify or confirm the identity of the party they are dealing with on the other end of the transaction. • Determine that the activities being engaged in by an individual or machine is commensurate with the level of authorization assigned to the individual or machine. • Confirm the action taken by the individual or machine and be able to prove to a third party that the entity (person or machine) did in fact perform the action. • Protect information from being altered either in storage or in transit. • Be certain that only authorized entities have access to information. • Ensure that every component of the e-business infrastructure is available when needed. • Be capable of generating an audit trail for verification of transactions.
  • 3. Challenges Posed to Internet Mediated Businesses. • Confidentiality • Integrity • Availability • Legitimate use • Auditing or Traceability • Non-repudiation
  • 4. Confidentiality • Confidentiality involves making information accessible to only authorized parties, or restricting information access to unauthorized parties.
  • 5. Integrity • information integrity is that it remain intact so that nothing is added nor taken from it that is not intended or authorized. • Transmitting information over the Internet (or any other network) is similar to sending a package by mail. The package may travel across numerous trusted and untrusted networks before reaching its final destination. It is possible for the data to be intercepted and modified while in transit.
  • 6. Availability • Availability means that systems, data, and other resources are usable when needed despite subsystem outages and environmental disruptions. • The goal is to ensure that system components provide continuous service by preventing failures that could result from accidents or attacks
  • 7. Legitimate use • Legitimate use has three components: identification, authentication and authorization. • Identification involves a process of a user positively identifying itself (human or machine) to the host (server) that it wishes to conduct a transaction with. • The response to identification is authentication. Without authentication, it is possible for the system to be accessed by an impersonator • The next step in establishing legitimate use is to ensure that the entity’s activities within the system are limited to what it has the right to do.
  • 8. Auditing or Traceability • in an e-business security context, auditing is the process of examining transactions. • Trust is enhanced if users can be assured that transactions can be traced from origin to completion. • If there is a discrepancy or dispute, it will be possible to work back through each step in the process to determine where the problem occurred and, probably, who is responsible
  • 9. Non-repudiation • Non-repudiation is the ability of an originator or recipient of a transaction to prove to a third party that their counterpart did in fact take the action in question. • Thus the sender of a message should be able to prove to a third party that the intended recipient got the message and the recipient should be able to prove to a third party that the originator did actually send the message.
  • 10. Checklist of Security Options • Physical protection for computers • Network systems management • Email control security • Networks security • Firewalls • Encryption • PKI (Public Key Infrastructure) • Incident handling
  • 11. Checklist of Security Options • Antivirus software • Digital certificate • Strong authentication • Access control • Audit and Tracing software • Backup and Disaster recovery • Biometric software • Wireless communications security
  • 12. Risk Assessment • Risk = (Threat x Vulnerability x Cost of business disruption) / (Cost of Countermeasure) • Threat is simply the probability of an attack • Vulnerability is 1 minus system effectiveness (which is a number less than 1). That means 100% system effectiveness will produce zero risk • Cost of disruption is a measure of what it costs to restore the system to full function plus any loss of revenue that may occur during the disruption period