SlideShare a Scribd company logo
1 of 27
Security in E-Commerce
Presented By
Akhand Pratap Singh
What is Security
• Security is an essential part of any transaction
that takes place over the internet. Customer
will loose his/her faith in e-business if its
security is compromised. Following are the
essential requirements for safe e-
payments/transactions
E-Commerce Security Enviorment
• Confidentiality
• Integrity
• Availability
• Authenticity
• Non-Repudiability
• Encryption
• Auditabilty
Measure to insure security
• Encryption
• Digital signature
• Security Certificates
Security Protocols in Internet
• SSL(Secure Socket Layer)
• It is the most commonly used protocol and is
widely used across the industry. It meets
following security requirements −
• Authentication
• Encryption
• Integrity
• Non-reputability
Secure Electronic Transaction
• Card Holder's Digital Wallet Software
• Merchant Software
• Payment Gateway Server Software
• Certificate Authority Software
The Tension Between Security and
Other Values
• Security vs. ease of use: The more security
measures that are added, the more difficult a
site is to use, and the slower it becomes
• Security vs. desire of individuals to act
anonymously
Security Threats in the E-commerce
Environment
• Three key points of vulnerability:
 Client
 Server
 Communications channel
• Most common threats:
 Malicious code
 Hacking
 Credit card fraud/theft
 Spoofing
 Denial of service attacks
 Sniffing
 Insider jobs
A Logical Design for a Simple Web Site
Vulnerable Points in an E-commerce
Environment
Malicious Code
• Viruses: computer program that as ability to replicate
and spread to other files; most also deliver a
“payload” of some sort (may be destructive or
benign); include macro viruses, file-infecting viruses
and script viruses
• Worms: designed to spread from computer to
computer
• Trojan horse: appears to be benign, but then does
something other than expected
• Bad applets (malicious mobile code): malicious Java
applets or ActiveX controls that may be downloaded
onto client and activated merely by surfing to a Web
site
Spoofing, DoS and dDoS Attacks,
Sniffing, Insider Jobs
• Spoofing: Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else
• Denial of service (DoS) attack: Hackers flood Web site with
useless traffic to inundate and overwhelm network
• Distributed denial of service (dDoS) attack: hackers use
numerous computers to attack target network from
numerous launch points
• Sniffing: type of eavesdropping program that monitors
information traveling over a network; enables hackers to
steal proprietary information from anywhere on a network
• Insider jobs: single largest financial threat
Fake mail example
Hacking and Cybervandalism
• Hacker: Individual who intends to gain unauthorized access to
a computer systems
• Cracker: Used to denote hacker with criminal intent (two
terms often used interchangeably)
• Cybervandalism: Intentionally disrupting, defacing or
destroying a Web site
• Types of hackers include:
 White hats – Members of “tiger teams” used by corporate
security departments to test their own security measures
 Black hats – Act with the intention of causing harm
 Grey hats – Believe they are pursuing some greater good
by breaking in and revealing system flaws
Technology Solutions
• Protecting Internet communications
(encryption)
• Securing channels of communication (SSL
secure sockets layer), S-HTTP, VPNs) URL
changes from HTTP to HTTPS
• SSL: Protocol that provides secure
communications between client and server
• Protecting networks (firewalls)
• Protecting servers and clients
Tools Available to Achieve Site Security
Protecting Internet Communications:
Encryption
• Encryption: The process of transforming plain text or data into
cipher text that cannot be read by anyone other than the
sender and receiver
• Purpose:
 Secure stored information
 Secure information transmission
• Provides:
 Message integrity:
 Nonrepudiation
 Authentication
 Confidentiality
Encryption ensures:
 Message integrity: provides assurance that
message has been altered
 Nonrepudiation: prevents the user from denying
he or she sent the message
 Authentication: provides verification of the
identity of the person or machine sending the
message
 Confidentiality: gives assurance that the message
was not read by others
Symmetric Key Encryption
• Also known as secret key encryption
• Both the sender and receiver use the same
digital key to encrypt and decrypt message
• Requires a different set of keys for each
transaction
• Data Encryption Standard (DES): Most
widely used symmetric key encryption
today; uses 56-bit encryption key; other
types use 128-bit keys up through 2048 bits
Public Key Encryption
• Public key cryptography solves symmetric key
encryption problem of having to exchange secret key
• Uses two mathematically related digital keys – public
key (widely disseminated) and private key (kept
secret by owner)
• Both keys are used to encrypt and decrypt message
• Once key is used to encrypt message, same key
cannot be used to decrypt message
• For example, sender uses recipient’s public key to
encrypt message; recipient uses his/her private key
to decrypt it
Public Key Cryptography – A Simple
Case
Digital Envelopes
• Addresses weaknesses of public key
encryption (computationally slow, decreases
transmission speed, increases processing
time) and symmetric key encryption (faster,
but more secure)
• Uses symmetric key encryption to encrypt
document but public key encryption to
encrypt and send symmetric key
Secure Negotiated Sessions Using SSL
Protecting Networks: Firewalls and
Proxy Servers
• Firewall: Software application that acts as a filter between a
company’s private network and the Internet
• Firewall methods include:
 Packet filters
 Application gateways
• Proxy servers: Software servers that handle all
communications originating from for being sent to the
Internet (act as “spokesperson” or “bodyguard” for the
organization)
Firewalls and Proxy Servers
Protecting Servers and Clients
• Operating system controls: Authentication and
access control mechanisms
• Anti-virus software: Easiest and least
expensive way to prevent threats to system
integrity

More Related Content

What's hot

Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceVinay Chaithanya
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commercesajid ullah
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 

What's hot (20)

Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
E business security
E business securityE business security
E business security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
History of E commerce- Brief History
History of E commerce- Brief HistoryHistory of E commerce- Brief History
History of E commerce- Brief History
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 

Viewers also liked

Introduzione Tavola Rotonda su Security a MECSPE
Introduzione Tavola Rotonda su Security a MECSPEIntroduzione Tavola Rotonda su Security a MECSPE
Introduzione Tavola Rotonda su Security a MECSPEuninfoit
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Nescafe marketing
Nescafe marketingNescafe marketing
Nescafe marketingMayank707
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Keith Harris
 
Ip security systems
Ip security systems Ip security systems
Ip security systems sysvideo
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip securityrajakhurram
 
Mobile commerce.
Mobile commerce.Mobile commerce.
Mobile commerce.Wasim Akram
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6koolkampus
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and ThreatsBPalmer13
 

Viewers also liked (20)

E commerce security
E commerce securityE commerce security
E commerce security
 
Introduzione Tavola Rotonda su Security a MECSPE
Introduzione Tavola Rotonda su Security a MECSPEIntroduzione Tavola Rotonda su Security a MECSPE
Introduzione Tavola Rotonda su Security a MECSPE
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Nescafe marketing
Nescafe marketingNescafe marketing
Nescafe marketing
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
E commerce
E commerceE commerce
E commerce
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
 
Ip security systems
Ip security systems Ip security systems
Ip security systems
 
Ip security
Ip security Ip security
Ip security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Mobile commerce.
Mobile commerce.Mobile commerce.
Mobile commerce.
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
IP Security
IP SecurityIP Security
IP Security
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
Core banking
Core bankingCore banking
Core banking
 
E payment
E paymentE payment
E payment
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 

Similar to Security in e commerce

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniquesMohitManna
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVEric Vanderburg
 

Similar to Security in e commerce (20)

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Encryption techniques
Encryption techniquesEncryption techniques
Encryption techniques
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Security framework
Security frameworkSecurity framework
Security framework
 
Computer security
Computer securityComputer security
Computer security
 
Cryptography
CryptographyCryptography
Cryptography
 
Security
SecuritySecurity
Security
 
6 security
6 security6 security
6 security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Intrusion in computing
Intrusion in computingIntrusion in computing
Intrusion in computing
 
Sw2
Sw2Sw2
Sw2
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Security in e commerce

  • 1. Security in E-Commerce Presented By Akhand Pratap Singh
  • 2. What is Security • Security is an essential part of any transaction that takes place over the internet. Customer will loose his/her faith in e-business if its security is compromised. Following are the essential requirements for safe e- payments/transactions
  • 4. • Confidentiality • Integrity • Availability • Authenticity • Non-Repudiability • Encryption • Auditabilty
  • 5. Measure to insure security • Encryption • Digital signature • Security Certificates
  • 6. Security Protocols in Internet • SSL(Secure Socket Layer) • It is the most commonly used protocol and is widely used across the industry. It meets following security requirements − • Authentication • Encryption • Integrity • Non-reputability
  • 7. Secure Electronic Transaction • Card Holder's Digital Wallet Software • Merchant Software • Payment Gateway Server Software • Certificate Authority Software
  • 8. The Tension Between Security and Other Values • Security vs. ease of use: The more security measures that are added, the more difficult a site is to use, and the slower it becomes • Security vs. desire of individuals to act anonymously
  • 9. Security Threats in the E-commerce Environment • Three key points of vulnerability:  Client  Server  Communications channel • Most common threats:  Malicious code  Hacking  Credit card fraud/theft  Spoofing  Denial of service attacks  Sniffing  Insider jobs
  • 10. A Logical Design for a Simple Web Site
  • 11. Vulnerable Points in an E-commerce Environment
  • 12. Malicious Code • Viruses: computer program that as ability to replicate and spread to other files; most also deliver a “payload” of some sort (may be destructive or benign); include macro viruses, file-infecting viruses and script viruses • Worms: designed to spread from computer to computer • Trojan horse: appears to be benign, but then does something other than expected • Bad applets (malicious mobile code): malicious Java applets or ActiveX controls that may be downloaded onto client and activated merely by surfing to a Web site
  • 13. Spoofing, DoS and dDoS Attacks, Sniffing, Insider Jobs • Spoofing: Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else • Denial of service (DoS) attack: Hackers flood Web site with useless traffic to inundate and overwhelm network • Distributed denial of service (dDoS) attack: hackers use numerous computers to attack target network from numerous launch points • Sniffing: type of eavesdropping program that monitors information traveling over a network; enables hackers to steal proprietary information from anywhere on a network • Insider jobs: single largest financial threat
  • 15. Hacking and Cybervandalism • Hacker: Individual who intends to gain unauthorized access to a computer systems • Cracker: Used to denote hacker with criminal intent (two terms often used interchangeably) • Cybervandalism: Intentionally disrupting, defacing or destroying a Web site • Types of hackers include:  White hats – Members of “tiger teams” used by corporate security departments to test their own security measures  Black hats – Act with the intention of causing harm  Grey hats – Believe they are pursuing some greater good by breaking in and revealing system flaws
  • 16. Technology Solutions • Protecting Internet communications (encryption) • Securing channels of communication (SSL secure sockets layer), S-HTTP, VPNs) URL changes from HTTP to HTTPS • SSL: Protocol that provides secure communications between client and server • Protecting networks (firewalls) • Protecting servers and clients
  • 17. Tools Available to Achieve Site Security
  • 18. Protecting Internet Communications: Encryption • Encryption: The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and receiver • Purpose:  Secure stored information  Secure information transmission • Provides:  Message integrity:  Nonrepudiation  Authentication  Confidentiality
  • 19. Encryption ensures:  Message integrity: provides assurance that message has been altered  Nonrepudiation: prevents the user from denying he or she sent the message  Authentication: provides verification of the identity of the person or machine sending the message  Confidentiality: gives assurance that the message was not read by others
  • 20. Symmetric Key Encryption • Also known as secret key encryption • Both the sender and receiver use the same digital key to encrypt and decrypt message • Requires a different set of keys for each transaction • Data Encryption Standard (DES): Most widely used symmetric key encryption today; uses 56-bit encryption key; other types use 128-bit keys up through 2048 bits
  • 21. Public Key Encryption • Public key cryptography solves symmetric key encryption problem of having to exchange secret key • Uses two mathematically related digital keys – public key (widely disseminated) and private key (kept secret by owner) • Both keys are used to encrypt and decrypt message • Once key is used to encrypt message, same key cannot be used to decrypt message • For example, sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it
  • 22. Public Key Cryptography – A Simple Case
  • 23. Digital Envelopes • Addresses weaknesses of public key encryption (computationally slow, decreases transmission speed, increases processing time) and symmetric key encryption (faster, but more secure) • Uses symmetric key encryption to encrypt document but public key encryption to encrypt and send symmetric key
  • 25. Protecting Networks: Firewalls and Proxy Servers • Firewall: Software application that acts as a filter between a company’s private network and the Internet • Firewall methods include:  Packet filters  Application gateways • Proxy servers: Software servers that handle all communications originating from for being sent to the Internet (act as “spokesperson” or “bodyguard” for the organization)
  • 27. Protecting Servers and Clients • Operating system controls: Authentication and access control mechanisms • Anti-virus software: Easiest and least expensive way to prevent threats to system integrity