SlideShare a Scribd company logo
IT8005 – Electronic Commerce
IV Year / VIII Semester
UNIT III E-COMMERCE SECURITY AND
PAYMENT SYSTEMS
E-Commerce Security Environment – Security
threats in E-Commerce – Technology Solutions:
Encryption, Securing Channels of
Communication, Protecting Networks, Protecting
Servers and Clients – Management Policies,
Business Procedure and Public Laws - Payment
Systems
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer
Security (TLS):
 When you receive a message from a server on the
Web with which you will be communicating through a
secure channel, this means you will be using SSL/TLS
to establish a secure negotiated session.
 The URL changes from HTTP to HTTPS.
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport
Layer Security (TLS):
 A secure negotiated session is a client-server
session in which the URL of the requested
document, along with the contents, contents of
forms, and the cookies exchanged, are encrypted.
Securing Channels of Communication
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer Security
(TLS):
 For instance, your credit card number that you entered into a
form would be encrypted.
 Through a series of handshakes and communications, the
browser and the server establish one another’s identity by
exchanging digital certificates, decide on the strongest shared
form of encryption, and then proceed to communicate using an
agreed upon session key.
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer
Security (TLS):
 A session key is a unique symmetric encryption key
chosen just for this single secure session. Once used, it is
gone forever.
 SSL/TLS provides data encryption, server authentication,
optional client authentication, and message integrity for
TCP/IP connections.
Securing Channels of Communication
 Secure Sockets Layer (SSL) and Transport Layer
Security (TLS):
 SSL/TLS addresses the issue of authenticity by
allowing users to verify another user’s identity or the
identity of a server.
It also protects the integrity of the messages
exchanged.
Securing Channels of Communication
 Virtual Private Networks (VPNs):
 A virtual private network (VPN) allows remote users to
securely access a corporation’s local area network via the
Internet, using a variety of VPN protocols.
 VPNs use both authentication and encryption to secure
information from unauthorized persons.
 Authentication prevents spoofing and misrepresentation of
identities.
Securing Channels of Communication
 Virtual Private Networks (VPNs):
 A remote user can connect to a remote private local network using a
local ISP.
 The VPN protocols will establish the link from the client to the
corporate network as if the user had dialed into the corporate network
directly.
 The process of connecting one protocol through another (IP) is called
tunneling, because the VPN creates a private connection by adding an
invisible wrapper around a message to hide its content.
Securing Channels of Communication
 Virtual Private Networks (VPNs):
 The primary use of VPNs is to establish secure
communications among business partners—larger
suppliers or customers, and employees working
remotely.
 Using the Internet and VPN as the connection method
significantly reduces the cost of secure
communications.
Securing Channels of Communication
 Wireless (Wi-Fi) Networks:
 Early Wi-Fi networks used a security standard called
Wired Equivalent Privacy (WEP) to encrypt information.
 WEP was very weak, and easy for hackers to crack.
 A new standard, Wi-Fi Protected Access (WPA), was
developed that provided a higher standard of protection, but
this too soon became vulnerable to intrusion.
Protecting Networks
 Firewalls and proxy servers are intended to build
a wall around your network and the attached
servers and clients, just like physical-world
firewalls protect you from fires for a limited
period of time.
 Firewalls and proxy servers share some similar
functions, but they are quite different.
Protecting Networks
 Firewalls:
 A firewall refers to either hardware or software that filters
communication packets and prevents some packets from
entering or exiting the network based on a security policy.
 The firewall controls traffic to and from servers and
clients, forbidding communications from untrustworthy
sources, and allowing other communications from trusted
sources to proceed.
Protecting Networks
 Firewalls:
 Every message that is to be sent or received from the network is
processed by the firewall, which determines if the message
meets security guidelines established by the business.
 Firewalls can filter traffic based on packet attributes such as
source IP address, destination port or IP address, type of service
(such as WWW or HTTP), the domain name of the source, and
many other dimensions.
Protecting Networks
 Firewalls:
 The increasing use of firewalls by home and business
Internet users has greatly reduced the effectiveness of
attacks, and forced hackers to focus more on e-mail
attachments to distribute worms and viruses.
 There are two major methods firewalls use to validate
traffic: packet filters and application gateways
Protecting Networks
 Firewalls:
 Packet filters examine data packets to determine
whether they are destined for a prohibited port or
originate from a prohibited IP address.
 The filter specifically looks at the source and
destination information, as well as the port and packet
type, when determining whether the information may
be transmitted.
Protecting Networks
 Firewalls:
 Application gateways are a type of firewall that filters
communications based on the application being
requested, rather than the source or destination of the
message.
 Such firewalls also process requests at the application
level, farther away from the client computer than
packet filters.
Protecting Networks
 Firewalls:
 By providing a central filtering point, application gateways
provide greater security than packet filters but can compromise
system performance.
 Next-generation firewalls use an application-centric approach to
firewall control.
 They are able to identify applications regardless of the port,
protocol, or security evasion tools used; identify users regardless
of device or IP address
Protecting Networks
 Firewalls:
Protecting Networks
 Proxy Servers:
 Proxy servers (proxies) are software servers (often a dedicated
computer) that handle all communications originating from or
being sent to the Internet by local clients, acting as a
spokesperson or bodyguard for the organization.
 Proxies act primarily to limit access of internal clients to
external Internet servers, although some proxy servers act as
firewalls as well.
Protecting Networks
Proxy Servers:
 Proxy servers are sometimes called dual-home
systems because they have two network interfaces. To
internal computers, a proxy server is known as the
gateway, while to external computers it is known as a
mail server or numeric address.
 When a user on an internal network requests a web
page, the request is routed first to the proxy server.
Protecting Networks
 Proxy Servers:
 The proxy server validates the user and the nature of the request,
and then sends the request onto the Internet.
 A web page sent by an external Internet server first passes to the
proxy server. If acceptable, the web page passes onto the internal
network web server and then to the client desktop.
 By prohibiting users from communicating directly with the
Internet, companies can restrict access to certain types of sites,
such as pornographic, auction, or stock-trading sites.
Protecting Networks
 Intrusion Detection and Prevention Systems:
 An intrusion detection system (IDS) examines
network traffic, watching to see if it matches certain
patterns or preconfigured rules indicative of an attack.
 If it detects suspicious activity, the IDS will set off an
alarm alerting administrators and log the event in a
database.
Protecting Networks
 Intrusion Detection and Prevention Systems:
 An intrusion prevention system (IPS) has all the
functionality of an IDS, with the additional ability to
take steps to prevent and block suspicious activities.
 An IPS can terminate a session and reset a connection,
block traffic from a suspicious IP address, or
reconfigure firewall or router security controls.
Protecting Servers and Clients
 Operating System Security Enhancements:
 The most obvious way to protect servers and clients is
to take advantage of automatic computer security
upgrades.
 The Microsoft, Apple, and Linux/Unix operating
systems are continuously updated to patch
vulnerabilities discovered by hackers.
Protecting Servers and Clients
 Operating System Security Enhancements:
 These patches are autonomic; that is, when using these
operating systems on the Internet, you are prompted and
informed that operating system enhancements are available.
 Users can easily download these security patches for free.
The most common known worms and viruses can be
prevented by simply keeping your server and client
operating systems and applications up to date.
Protecting Servers and Clients
 Operating System Security Enhancements - Anti-Virus
Software:
 The easiest and least-expensive way to prevent threats to
system integrity is to install anti-virus software.
 Anti-virus programs can be set up so that e-mail
attachments are inspected before you click on them, and the
attachments are eliminated if they contain a known virus or
worm.
Protecting Servers and Clients
 Operating System Security Enhancements - Anti-Virus
Software:
 Anti-virus suite packages and stand-alone programs are
available to eliminate intruders such as bot programs,
adware, and other security risks.
 Such programs work much like anti-virus software in that
they look for recognized hacker tools or signature actions
of known intruders.

More Related Content

What's hot

Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic Commerce
Er. Nawaraj Bhandari
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
Navjyotsinh Jadeja
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
MithilDoshi1
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
Parag Deodhar
 
IP Address
IP AddressIP Address
IP Address
tishko18
 
Internet
InternetInternet
Internet
mustha3
 
Cloud Deployments Models
Cloud Deployments ModelsCloud Deployments Models
Cloud Deployments Models
Mohamed Sami El-Tahawy
 
Chapter 1/ Overview of Electronic Commerce Technology of E-Business
Chapter 1/ Overview of Electronic Commerce Technology of E-BusinessChapter 1/ Overview of Electronic Commerce Technology of E-Business
Chapter 1/ Overview of Electronic Commerce Technology of E-Business
Eyad Almasri
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
Usama ahmad
 
RFC and internet standards presentation
RFC and internet standards presentationRFC and internet standards presentation
RFC and internet standards presentation
Naveen Jakhar, I.T.S
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
tormeyj
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologies
VTC_NeilaSofien
 
Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerceANOOPA NARAYANAN
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 
What Is User Datagram Protocol?
What Is User Datagram Protocol?What Is User Datagram Protocol?
What Is User Datagram Protocol?
Simplilearn
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Unit 1 overview
Unit 1 overviewUnit 1 overview
Unit 1 overview
Neelam Rawat
 
Electronic data interchange (edi)
Electronic data interchange (edi)Electronic data interchange (edi)
Electronic data interchange (edi)
Bandri Nikhil
 
Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commerce
muhammad-Sulaiman
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data Interchange
Danish Ali Syed
 

What's hot (20)

Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic Commerce
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
IP Address
IP AddressIP Address
IP Address
 
Internet
InternetInternet
Internet
 
Cloud Deployments Models
Cloud Deployments ModelsCloud Deployments Models
Cloud Deployments Models
 
Chapter 1/ Overview of Electronic Commerce Technology of E-Business
Chapter 1/ Overview of Electronic Commerce Technology of E-BusinessChapter 1/ Overview of Electronic Commerce Technology of E-Business
Chapter 1/ Overview of Electronic Commerce Technology of E-Business
 
INTERNET AND E-COMMERCE
INTERNET AND E-COMMERCEINTERNET AND E-COMMERCE
INTERNET AND E-COMMERCE
 
RFC and internet standards presentation
RFC and internet standards presentationRFC and internet standards presentation
RFC and internet standards presentation
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
Web browsing and Internet termenologies
Web browsing and Internet termenologiesWeb browsing and Internet termenologies
Web browsing and Internet termenologies
 
Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerce
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
What Is User Datagram Protocol?
What Is User Datagram Protocol?What Is User Datagram Protocol?
What Is User Datagram Protocol?
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Unit 1 overview
Unit 1 overviewUnit 1 overview
Unit 1 overview
 
Electronic data interchange (edi)
Electronic data interchange (edi)Electronic data interchange (edi)
Electronic data interchange (edi)
 
Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commerce
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data Interchange
 

Similar to IT8005_EC_Unit_III_Securing_Communication_Channels

ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .
SowmyaSomu8
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
gocokir267
 
Firewall
FirewallFirewall
Firewall
FirewallFirewall
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
Network security
Network securityNetwork security
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
fatimagull32
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 

Similar to IT8005_EC_Unit_III_Securing_Communication_Channels (20)

Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .
 
Firewalls
FirewallsFirewalls
Firewalls
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Network security
Network securityNetwork security
Network security
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
The vpn
The vpnThe vpn
The vpn
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Network security
Network securityNetwork security
Network security
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
Security
SecuritySecurity
Security
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 

More from Palani Kumar

CS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLCS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQL
Palani Kumar
 
CS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingCS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_Computing
Palani Kumar
 
CS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationCS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_Recommendation
Palani Kumar
 
CS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringCS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_Clustering
Palani Kumar
 
CS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitectureCS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_Architecture
Palani Kumar
 
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyIT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
Palani Kumar
 

More from Palani Kumar (6)

CS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQLCS8091_BDA_Unit_V_NoSQL
CS8091_BDA_Unit_V_NoSQL
 
CS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_ComputingCS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_Computing
 
CS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_RecommendationCS8091_BDA_Unit_III_Content_Based_Recommendation
CS8091_BDA_Unit_III_Content_Based_Recommendation
 
CS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_ClusteringCS8091_BDA_Unit_II_Clustering
CS8091_BDA_Unit_II_Clustering
 
CS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_ArchitectureCS8091_BDA_Unit_I_Analytical_Architecture
CS8091_BDA_Unit_I_Analytical_Architecture
 
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_TechnologyIT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
IT8005_EC_Unit_V_Features_Of_E_Commerce_Technology
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 

IT8005_EC_Unit_III_Securing_Communication_Channels

  • 1. IT8005 – Electronic Commerce IV Year / VIII Semester
  • 2. UNIT III E-COMMERCE SECURITY AND PAYMENT SYSTEMS E-Commerce Security Environment – Security threats in E-Commerce – Technology Solutions: Encryption, Securing Channels of Communication, Protecting Networks, Protecting Servers and Clients – Management Policies, Business Procedure and Public Laws - Payment Systems
  • 3. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  When you receive a message from a server on the Web with which you will be communicating through a secure channel, this means you will be using SSL/TLS to establish a secure negotiated session.  The URL changes from HTTP to HTTPS.
  • 4. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  A secure negotiated session is a client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted.
  • 5. Securing Channels of Communication
  • 6. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  For instance, your credit card number that you entered into a form would be encrypted.  Through a series of handshakes and communications, the browser and the server establish one another’s identity by exchanging digital certificates, decide on the strongest shared form of encryption, and then proceed to communicate using an agreed upon session key.
  • 7. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  A session key is a unique symmetric encryption key chosen just for this single secure session. Once used, it is gone forever.  SSL/TLS provides data encryption, server authentication, optional client authentication, and message integrity for TCP/IP connections.
  • 8. Securing Channels of Communication  Secure Sockets Layer (SSL) and Transport Layer Security (TLS):  SSL/TLS addresses the issue of authenticity by allowing users to verify another user’s identity or the identity of a server. It also protects the integrity of the messages exchanged.
  • 9. Securing Channels of Communication  Virtual Private Networks (VPNs):  A virtual private network (VPN) allows remote users to securely access a corporation’s local area network via the Internet, using a variety of VPN protocols.  VPNs use both authentication and encryption to secure information from unauthorized persons.  Authentication prevents spoofing and misrepresentation of identities.
  • 10. Securing Channels of Communication  Virtual Private Networks (VPNs):  A remote user can connect to a remote private local network using a local ISP.  The VPN protocols will establish the link from the client to the corporate network as if the user had dialed into the corporate network directly.  The process of connecting one protocol through another (IP) is called tunneling, because the VPN creates a private connection by adding an invisible wrapper around a message to hide its content.
  • 11. Securing Channels of Communication  Virtual Private Networks (VPNs):  The primary use of VPNs is to establish secure communications among business partners—larger suppliers or customers, and employees working remotely.  Using the Internet and VPN as the connection method significantly reduces the cost of secure communications.
  • 12. Securing Channels of Communication  Wireless (Wi-Fi) Networks:  Early Wi-Fi networks used a security standard called Wired Equivalent Privacy (WEP) to encrypt information.  WEP was very weak, and easy for hackers to crack.  A new standard, Wi-Fi Protected Access (WPA), was developed that provided a higher standard of protection, but this too soon became vulnerable to intrusion.
  • 13. Protecting Networks  Firewalls and proxy servers are intended to build a wall around your network and the attached servers and clients, just like physical-world firewalls protect you from fires for a limited period of time.  Firewalls and proxy servers share some similar functions, but they are quite different.
  • 14. Protecting Networks  Firewalls:  A firewall refers to either hardware or software that filters communication packets and prevents some packets from entering or exiting the network based on a security policy.  The firewall controls traffic to and from servers and clients, forbidding communications from untrustworthy sources, and allowing other communications from trusted sources to proceed.
  • 15. Protecting Networks  Firewalls:  Every message that is to be sent or received from the network is processed by the firewall, which determines if the message meets security guidelines established by the business.  Firewalls can filter traffic based on packet attributes such as source IP address, destination port or IP address, type of service (such as WWW or HTTP), the domain name of the source, and many other dimensions.
  • 16. Protecting Networks  Firewalls:  The increasing use of firewalls by home and business Internet users has greatly reduced the effectiveness of attacks, and forced hackers to focus more on e-mail attachments to distribute worms and viruses.  There are two major methods firewalls use to validate traffic: packet filters and application gateways
  • 17. Protecting Networks  Firewalls:  Packet filters examine data packets to determine whether they are destined for a prohibited port or originate from a prohibited IP address.  The filter specifically looks at the source and destination information, as well as the port and packet type, when determining whether the information may be transmitted.
  • 18. Protecting Networks  Firewalls:  Application gateways are a type of firewall that filters communications based on the application being requested, rather than the source or destination of the message.  Such firewalls also process requests at the application level, farther away from the client computer than packet filters.
  • 19. Protecting Networks  Firewalls:  By providing a central filtering point, application gateways provide greater security than packet filters but can compromise system performance.  Next-generation firewalls use an application-centric approach to firewall control.  They are able to identify applications regardless of the port, protocol, or security evasion tools used; identify users regardless of device or IP address
  • 21. Protecting Networks  Proxy Servers:  Proxy servers (proxies) are software servers (often a dedicated computer) that handle all communications originating from or being sent to the Internet by local clients, acting as a spokesperson or bodyguard for the organization.  Proxies act primarily to limit access of internal clients to external Internet servers, although some proxy servers act as firewalls as well.
  • 22. Protecting Networks Proxy Servers:  Proxy servers are sometimes called dual-home systems because they have two network interfaces. To internal computers, a proxy server is known as the gateway, while to external computers it is known as a mail server or numeric address.  When a user on an internal network requests a web page, the request is routed first to the proxy server.
  • 23. Protecting Networks  Proxy Servers:  The proxy server validates the user and the nature of the request, and then sends the request onto the Internet.  A web page sent by an external Internet server first passes to the proxy server. If acceptable, the web page passes onto the internal network web server and then to the client desktop.  By prohibiting users from communicating directly with the Internet, companies can restrict access to certain types of sites, such as pornographic, auction, or stock-trading sites.
  • 24. Protecting Networks  Intrusion Detection and Prevention Systems:  An intrusion detection system (IDS) examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack.  If it detects suspicious activity, the IDS will set off an alarm alerting administrators and log the event in a database.
  • 25. Protecting Networks  Intrusion Detection and Prevention Systems:  An intrusion prevention system (IPS) has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities.  An IPS can terminate a session and reset a connection, block traffic from a suspicious IP address, or reconfigure firewall or router security controls.
  • 26. Protecting Servers and Clients  Operating System Security Enhancements:  The most obvious way to protect servers and clients is to take advantage of automatic computer security upgrades.  The Microsoft, Apple, and Linux/Unix operating systems are continuously updated to patch vulnerabilities discovered by hackers.
  • 27. Protecting Servers and Clients  Operating System Security Enhancements:  These patches are autonomic; that is, when using these operating systems on the Internet, you are prompted and informed that operating system enhancements are available.  Users can easily download these security patches for free. The most common known worms and viruses can be prevented by simply keeping your server and client operating systems and applications up to date.
  • 28. Protecting Servers and Clients  Operating System Security Enhancements - Anti-Virus Software:  The easiest and least-expensive way to prevent threats to system integrity is to install anti-virus software.  Anti-virus programs can be set up so that e-mail attachments are inspected before you click on them, and the attachments are eliminated if they contain a known virus or worm.
  • 29. Protecting Servers and Clients  Operating System Security Enhancements - Anti-Virus Software:  Anti-virus suite packages and stand-alone programs are available to eliminate intruders such as bot programs, adware, and other security risks.  Such programs work much like anti-virus software in that they look for recognized hacker tools or signature actions of known intruders.