This document discusses e-commerce security strategies and technologies. It covers security principles like confidentiality, integrity and availability. It describes common security threats like denial of service attacks, viruses, worms and Trojans. It also summarizes technologies used to secure communications and networks, including encryption, firewalls, proxies, and public/private key infrastructure. The overall goal is to explain how to develop a comprehensive security program using a life cycle approach to address risks from criminals targeting online businesses and customers.