SlideShare a Scribd company logo
1 of 30
SECURITY ENVIRONMENT
BY :
JAYPAL SINGH CHOUDHARY
ANUPMA TRIPATHI
SGSITS MBA
INTRODUCTION:
E-commerce security is the protection of e-commerce assets from
unauthorized access, use of it.
The importance of securing e-commerce
– Secrecy: protection against unauthorized data disclosure and
authentication of data source.
– Integrity: prevention against unauthorized data modification.
– Necessity: prevention against data delays or removal.
– Non-repudiation: prevention against any one party from
reneging on an agreement after the fact protect corporation's
image and reputation.
 Unauthorized access
 Loss of message confidentiality or integrity
 User Identification
 Access Control
 Players:
◦ User community
◦ Network Administration
◦ Introducers
“$$”The Internet:
open
virus
Hackers and crackers
 Data being stolen
 Electronic mail can be intercepted and read
 Customer’s credit card numbers may be read
 Login/password and other access information
stolen
 Operating system shutdown
 Filesystem corruption
 User login information can be captured
 E-mail is the most widely used application in
the Internet.
 Who wants to read your mail ?
 Business competitors
 Reporters,Criminals
 Friends and Family
 Two approaches are used:
 PGP: Pretty Good Privacy
 PEM: Privacy-Enhanced Mail
 Authentication problems
 Impersonation attacks
 Privacy problems
 Hacking and similar attacks
 Integrity problems
 Repudiation problems
 How to communicate securely:
 SSL – “the web security protocols”
 IPSEC – “the IP layer security protocol”
 SMIME – “the email security protocol”
 SET – “credit card transaction security protocol”
 Secured HTTP (S-HTTP)
 Security on application layer
 Protection mechanism:
 Digital Signature
 Message authentication
 Message encryption
 Support private & public key cryptograph
 Enhanced HTTP data exchange
Non-repudiation
Authenticity
Confidentiality
Privacy
Availability
- Increased Data Access
- Much more valuable Data
- Scalability with Large User Communities
- Manageability
- Assurance
•Active Content
•Malicious Code
Client threats
• Confidentiality Threats
• Integrity Threats
• Availability Threats
Communication
channels
Threats
•Web-Server ,Commerce Server
Threats
•Password Hacking,Data base
Threats
Server Threats
 Applications that run on computers
 Rely on servers for
 Files
 Devices
 Processing power
 Example: E-mail client
 An application that enables you to send
and receive e-mail
Clients
Clients are Applications
Servers
 Computers or processes that manage
network resources
 Disk drives (file servers)
 Printers (print servers)
 Network traffic (network servers)
 Example: Database Server
 A computer system that processes database
queries
Servers Manage
Resources
Communication
Networks
Networks Connect
Clients and Servers
ELEMENTS OF A COMPREHENSIVE
SECURITY PROGRAM
Have Good Passwords
Use Good Antiviral Products
Use Good Cryptography
Have Good Firewalls
Have a Backup System
Audit and Monitor Systems and Networks
Have Training and Awareness Programs
Test Your Security Frequently
Certification authority
 Malicious code
◦ Viruses
◦ Worms
◦ Trojan horses
◦ Bots, botnets
 Unwanted programs
◦ Browser parasites
◦ Adware
◦ Spyware
Copyright © 2010 Pearson
Education, Inc.
Sli
de
5-
19
 Phishing
◦ Deceptive online attempt to obtain confidential information
◦ Social engineering, e-mail scams, spoofing legitimate Web
sites
◦ Use information to commit fraudulent acts (access checking
accounts), steal identity
 Hacking and cybervandalism
◦ Hackers vs. crackers
◦ Cybervandalism: intentionally disrupting, defacing,
destroying Web site
◦ Types of hackers: white hats, black hats, grey hats
Copyright © 2010 Pearson
Education, Inc.
Sli
de
5-
20
 Credit card fraud/theft
◦ Fear of stolen credit card information deters online
purchases
◦ Hackers target merchant servers; use data to establish
credit under false identity
◦ Online companies at higher risk than offline
 Spoofing: misrepresenting self by using fake e-
mail address
 Pharming: spoofing a Web site
◦ Redirecting a Web link to a new, fake Web site
۩ Electronic data security is important at a time
when people are considering banking and
other financial transaction by PCs.
۩ One major threat to data security is
unauthorized network monitoring also called
packet sniffing.
Messaging Security is a program that
provides protection for companies messaging
infrastructure.
It protects all the personal message of the
company which are related to company’s
vision and mission.
Message Confidentiality
Message and
System Integrity
Message
Authentication
It is use to protect the systems from
unauthorized
access, disclosure, disruption, modification, p
erusal, inspection, recording or destruction.
Cryptographically
singed certificates
E-commerce
authentication
Third-party
authentication
Encryption is the mutation of information
in any form (text, video, and graphics) into
a representation unreadable by anyone
without a decryption key.
 No can figure out the private key from the
corresponding public key. Hence, the key
management problems is mostly confined to
the management of private keys
 The need for sender and receiver to share
secret information over public channels is
completely eliminated.
Security environment

More Related Content

What's hot (20)

E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
EDI
 EDI EDI
EDI
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Data security
Data securityData security
Data security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Network security
Network securityNetwork security
Network security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Viewers also liked

The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesQanita Ahmad
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Risk management in e banking
Risk management in e bankingRisk management in e banking
Risk management in e bankingAmer Mushtaq
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
A project report on e business
A project report on e businessA project report on e business
A project report on e businessVerma Pramod
 

Viewers also liked (8)

Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web Services
 
Brian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government PerspectiveBrian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government Perspective
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Risk management in e banking
Risk management in e bankingRisk management in e banking
Risk management in e banking
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
A project report on e business
A project report on e businessA project report on e business
A project report on e business
 

Similar to Security environment

securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptxrehamrere
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTCyberambessador
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...AwodiranOlumide
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commercenikitaTahilyani1
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 

Similar to Security environment (20)

securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Fraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPTFraud Prevention in Cybersecurity | PPT
Fraud Prevention in Cybersecurity | PPT
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Security in it
Security in it Security in it
Security in it
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 

More from Jay Choudhary

Separation processes
Separation processesSeparation processes
Separation processesJay Choudhary
 
National income and employement
National income and employementNational income and employement
National income and employementJay Choudhary
 
Effective communication
Effective communicationEffective communication
Effective communicationJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parksJay Choudhary
 

More from Jay Choudhary (9)

Separation processes
Separation processesSeparation processes
Separation processes
 
National income and employement
National income and employementNational income and employement
National income and employement
 
Markowitz model
Markowitz modelMarkowitz model
Markowitz model
 
Effective communication
Effective communicationEffective communication
Effective communication
 
Economic growth
Economic growthEconomic growth
Economic growth
 
Data comparation
Data comparationData comparation
Data comparation
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 
Bio technology parks
Bio technology  parksBio technology  parks
Bio technology parks
 

Recently uploaded

BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 

Recently uploaded (20)

BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 

Security environment

  • 1. SECURITY ENVIRONMENT BY : JAYPAL SINGH CHOUDHARY ANUPMA TRIPATHI SGSITS MBA
  • 2. INTRODUCTION: E-commerce security is the protection of e-commerce assets from unauthorized access, use of it. The importance of securing e-commerce – Secrecy: protection against unauthorized data disclosure and authentication of data source. – Integrity: prevention against unauthorized data modification. – Necessity: prevention against data delays or removal. – Non-repudiation: prevention against any one party from reneging on an agreement after the fact protect corporation's image and reputation.
  • 3.  Unauthorized access  Loss of message confidentiality or integrity  User Identification  Access Control  Players: ◦ User community ◦ Network Administration ◦ Introducers
  • 5.  Data being stolen  Electronic mail can be intercepted and read  Customer’s credit card numbers may be read  Login/password and other access information stolen  Operating system shutdown  Filesystem corruption  User login information can be captured
  • 6.  E-mail is the most widely used application in the Internet.  Who wants to read your mail ?  Business competitors  Reporters,Criminals  Friends and Family  Two approaches are used:  PGP: Pretty Good Privacy  PEM: Privacy-Enhanced Mail
  • 7.  Authentication problems  Impersonation attacks  Privacy problems  Hacking and similar attacks  Integrity problems  Repudiation problems
  • 8.  How to communicate securely:  SSL – “the web security protocols”  IPSEC – “the IP layer security protocol”  SMIME – “the email security protocol”  SET – “credit card transaction security protocol”
  • 9.  Secured HTTP (S-HTTP)  Security on application layer  Protection mechanism:  Digital Signature  Message authentication  Message encryption  Support private & public key cryptograph  Enhanced HTTP data exchange
  • 11. - Increased Data Access - Much more valuable Data - Scalability with Large User Communities - Manageability - Assurance
  • 12.
  • 13. •Active Content •Malicious Code Client threats • Confidentiality Threats • Integrity Threats • Availability Threats Communication channels Threats •Web-Server ,Commerce Server Threats •Password Hacking,Data base Threats Server Threats
  • 14.  Applications that run on computers  Rely on servers for  Files  Devices  Processing power  Example: E-mail client  An application that enables you to send and receive e-mail Clients Clients are Applications
  • 15. Servers  Computers or processes that manage network resources  Disk drives (file servers)  Printers (print servers)  Network traffic (network servers)  Example: Database Server  A computer system that processes database queries Servers Manage Resources
  • 17. ELEMENTS OF A COMPREHENSIVE SECURITY PROGRAM Have Good Passwords Use Good Antiviral Products Use Good Cryptography Have Good Firewalls Have a Backup System Audit and Monitor Systems and Networks Have Training and Awareness Programs Test Your Security Frequently
  • 19.  Malicious code ◦ Viruses ◦ Worms ◦ Trojan horses ◦ Bots, botnets  Unwanted programs ◦ Browser parasites ◦ Adware ◦ Spyware Copyright © 2010 Pearson Education, Inc. Sli de 5- 19
  • 20.  Phishing ◦ Deceptive online attempt to obtain confidential information ◦ Social engineering, e-mail scams, spoofing legitimate Web sites ◦ Use information to commit fraudulent acts (access checking accounts), steal identity  Hacking and cybervandalism ◦ Hackers vs. crackers ◦ Cybervandalism: intentionally disrupting, defacing, destroying Web site ◦ Types of hackers: white hats, black hats, grey hats Copyright © 2010 Pearson Education, Inc. Sli de 5- 20
  • 21.  Credit card fraud/theft ◦ Fear of stolen credit card information deters online purchases ◦ Hackers target merchant servers; use data to establish credit under false identity ◦ Online companies at higher risk than offline  Spoofing: misrepresenting self by using fake e- mail address  Pharming: spoofing a Web site ◦ Redirecting a Web link to a new, fake Web site
  • 22. ۩ Electronic data security is important at a time when people are considering banking and other financial transaction by PCs. ۩ One major threat to data security is unauthorized network monitoring also called packet sniffing.
  • 23. Messaging Security is a program that provides protection for companies messaging infrastructure. It protects all the personal message of the company which are related to company’s vision and mission.
  • 24. Message Confidentiality Message and System Integrity Message Authentication
  • 25. It is use to protect the systems from unauthorized access, disclosure, disruption, modification, p erusal, inspection, recording or destruction.
  • 27. Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.
  • 28.
  • 29.  No can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys  The need for sender and receiver to share secret information over public channels is completely eliminated.