SlideShare a Scribd company logo
1 of 14
1
PART - 2
CHAPTER 5
INTRODUCTION
TO M-COMMERCE
Presented by Nuzhat Ibrahim Memon
Security Issues in E-Commerce & M-Commerce
2
 Secrecy of the information
so that unauthorized user
cannot read it.
 It is achieved by using
cryptography
 All the message transmitted
are encrypted and only the
receiver can read it after
decrypting the message
using appropriate key.
 It helps in protecting the
confidential data like credit
card number
Confidentiality
 Ensures that the information
must not be accidentally or
maliciously altered or
tampered in transit.
 Receiver should receive the
same message as was sent by
the sender.
 If the message is altered in
between the transition, it
should be detected. This
removes the problem of
modifying the order quantity in
between and later creating the
payment problems.
Integrity
The valuable data or information that travels on the internet may be misused, stolen, corrupted or lost.
E-Commerce and M-Commerce security must meet four important aspects:
Presented by Nuzhat Ibrahim Memon
Securing Issues in E-Commerce & M-Commerce (cont.)
Authorization Non-repudiation
3
 Ensures that only
authentic users are
allowed to use the system.
 Login and Password is
one of the way to achieve
authentication.
 Sender of the message
cannot deny that he/she has
sent the message.
 It prevents sender or
receiver from denying a
transmitted message when
in fact they did send it.
 It is usually accomplished via
digital signatures or a
Trusted Third Party (TTP).
Presented by Nuzhat Ibrahim Memon
Internet Security Threats
Malicious Code Sniffing
4
 Malicious code is one that
causes damage to a
computer or system.
 Either Active itself or be like
a virus requiring a user to
perform an action as clicking
on something or opening
an e-mail attachment.
 It can also affect a network,
send messages through e-
mail and steal information or
cause even more damage by
deleting file.
 Program that uses Internet to
record information that passes
through a computer or router in
transits from sender or receiver.
 Like tapping the telephone wire
and recording the conversation.
 It can read e-mail, login,
password, credit card numbers.
Presented by Nuzhat Ibrahim Memon
Internet Security Threats
5
 Electronic defacing of an
existing website page.
 An attacker replaces the
website’s original content
with his/her own content.
 It is an example of
integrity violation.
 Equivalent electronic
equivalent of destroying
property or to placing
graffiti on someone’s
photograph.
Cyber Vandalism
 DoS is an attack used to shut
down a machine or network,
making it inaccessible to its
intended users.
 An attacker may be able to
prevent the user from accessing
e-mail, websites, online
account etc.
 The users are flooded with
hundreds and thousands of
messages that create traffic
problem on the network.
Denial of Service attack
Attacker
Presented by Nuzhat Ibrahim Memon
Internet Security Threats
6
 Spoofing is pretending to be someone you are not.
 Representing a website as authentic when it is actually a
fake.
 It is a technique where the attacker tries to assume the
identity of another person or system for transacting with
victim site.
 For example, an attacker can create a fake website as
www.gswan.co.in and substitute his IP address for the real
website IP address.
 All the user’s visiting to the real site will then be redirected
to the fake website.
Spoofing
Presented by Nuzhat Ibrahim Memon
Security Measures
7
 Computer program
 Detects, prevent and takes action to remove the malicious codes
like viruses, worms and Trojan horses from the infected system.
 Once a system is infected by virus, it will replicates itself (spread
by attaching it to other programs or files ) within the system
and also spread to other systems by taking control of the users
email and sending out copies of itself to those in the users contact
list.
 The infection may be simple as causing strange noises, pop-ups and
other annoying things on the system.
 It may delete the files and slow down the system or also can
damage the hardware or destroy the entire computer system.
 Most common way a system is attacked is through e-mail or
through internet download.
 Antivirus software is critical to be installed and kept updated
regularly on the computer.
Antivirus Software
Presented by Nuzhat Ibrahim Memon
Security Measures
8
 Companies having their own websites have to control the access to
the network services both inside and outside the company
network.
 Device (computer/router) places between the network and the
Internet to monitor and control the traffic between the company’s
local network and the outside world.
 A firewall protects the local network against the following:
 Email services that sometimes create problems.
 Undesirable material like photos, videos entering into local
network.
 Unauthorized persons gaining access to local network.
 Unauthorized data or information leaving the company’s
network.
 Blocks the traffic from outside world to the local network.
 Protect from any type of network attack.
Firewall
Presented by Nuzhat Ibrahim Memon
Security Measures
9
 Digital Certificate / Digital ID – proving identify in electronic
transactions.
 With a digital certificate, we can assure the business organizations,
online services and friends that the electronic information they
receive from us are authentic.
 Third party issues certificates is known as Certification Authority
(CA).
 Public key which is used for encrypting messages
 The digital signature of the certification authority so that a
receiver can verify that the certificate is real.
Digital Certificate
Presented by Nuzhat Ibrahim Memon
Security Measures
10
 An art of protecting the information by transforming it into an
unreadable form.
 Encryption is the transformation of normal text or plain text into
unreadable or secret text known as cipher text.
 Secret key is used to encrypt and decrypt a message.
 Messages are encrypted just before they are sent on the internet or
network. When the encrypted message is received by the receiver, it needs
to be decrypted. Decryption is the reverse of encryption. It is the
transformation of encrypted text back into normal text.
 Encryption is used to protect data in transit, for example, data being
transferred via networks like internet or ecommerce, mobile telephones,
Bluetooth devices and bank ATM (Automatic Teller Machines)
 A coded form of ”WAVES” using encryption.
 Here the encryption mechanism substitutes each alphabet with the
alphabet that comes before it.
Plain text (normal text)
Cipher text (unreadable/secret text)
Cryptography
Presented by Nuzhat Ibrahim Memon
W A V E S
V Z U D R
Security Measures
11
 Securing web transaction on the internet
 Developed by Netscape.
 During the e-commerce transactions, all the information is exchanged
in secured manner using SSL by encrypting all the messages.
 If a site is secured by Verisign, then the security logo of VeriSign is
displayed on the login screen of the secured site.
 On clicking the you will get the owner information and the
validity of the certificate.
 This indicates that the communication with this site is
secured and the owner of the website is valid who is
certified by the authority like VeriSign
 Starts from https:// rather than http://
Secure Socket Layer (SSL)
Presented by Nuzhat Ibrahim Memon
Securing Intellectual Properties
12
Indian Government has established the IT laws (Information technology laws) under the IT act.
Intellectual Properties: books | software | music | video | copyrights | trademarks | webpages
 Copyright provides the author with a tool to
protect his/her original work from being
used or taken by other without permission.
 Applicable to books, software programs &
articles.
 Copyright matter cannot be used freely.
 Copying contents from the website also
violates copyright laws.
Copyright
 Specific logo, mark, word, symbol,
design, phrase, image used by an
individuals or a company to distinguish
product or service from that of other in
the market.
 Trademark symbols : TM : Trade Mark
SM : Service Mark ® : Registered
Trademark
 Competition over domain names is
another legal issue.
 Earlier, the domain names were given on
first come first serve (FCFS)basis.
 Thus people would register domain
names that were not in use but would be
of importance, Later on such domain
names were sold to concerned
company at a very high price is known
as cyber-squatting.
 Mislead the consumers who generally
make typographical errors while
entering a URL.
Domain Name Disputes
Presented by Nuzhat Ibrahim Memon
Protecting Intellectual Property
Steganography
 Process of hiding information
within other information.
 It works by replacing unused
data in computer files such as
images, sound or text with
invisible information.
 This hidden information can be
text, cipher text, image.
Digital Watermarking
 Digital code inserted into a digital
image, audio or video file which can
identify the file’s copyright information.
 Allows hiding information in a totally
invisible manner.
 In Digital world, artist can watermark
their work by hiding their name within
the image.
 In the field of data security, watermarks
can be used for certification and
authentication.
 Big problem of unauthorized mp3 audio
distribution.
 A visible digital watermark can be added
with GIMP.
13Presented by Nuzhat Ibrahim Memon
Exercise
"new unique zero-error hidden accurate text“
THANK YOU!
Speaker Name
Email:
speakermail@website.com
Phone:
+7 888 999-000-11
Presented by Nuzhat Ibrahim Memon

More Related Content

What's hot

Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerceanshutomar6
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Phishing
PhishingPhishing
Phishingdefquon
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 

What's hot (19)

Risks of E-commerce
Risks of E-commerceRisks of E-commerce
Risks of E-commerce
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Mobile security
Mobile security Mobile security
Mobile security
 
Web security
Web securityWeb security
Web security
 
Phishing
PhishingPhishing
Phishing
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Shilpa
ShilpaShilpa
Shilpa
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Bi
BiBi
Bi
 
Seminar
SeminarSeminar
Seminar
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
E commerce
E commerceE commerce
E commerce
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 

Similar to M-Commerce Security Issues (20)

Information security
Information securityInformation security
Information security
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
E commerce- securing the business on internet
E commerce- securing the business on internetE commerce- securing the business on internet
E commerce- securing the business on internet
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 

More from Nuzhat Memon

Std 10 chapter 11 data type, expression and operators important MCQs
Std 10 chapter 11 data type, expression and operators important MCQsStd 10 chapter 11 data type, expression and operators important MCQs
Std 10 chapter 11 data type, expression and operators important MCQsNuzhat Memon
 
Std 10 Chapter 10 Introduction to C Language Important MCQs
Std 10 Chapter 10 Introduction to C Language Important MCQsStd 10 Chapter 10 Introduction to C Language Important MCQs
Std 10 Chapter 10 Introduction to C Language Important MCQsNuzhat Memon
 
Std 12 chapter 7 Java Basics Important MCQs
Std 12 chapter 7 Java Basics Important MCQsStd 12 chapter 7 Java Basics Important MCQs
Std 12 chapter 7 Java Basics Important MCQsNuzhat Memon
 
Std 12 computer chapter 8 classes and objects in java important MCQs
Std 12 computer chapter 8 classes and objects in java important MCQsStd 12 computer chapter 8 classes and objects in java important MCQs
Std 12 computer chapter 8 classes and objects in java important MCQsNuzhat Memon
 
Std 12 Computer Chapter 6 object oriented concept important mcqs
Std 12 Computer Chapter 6 object oriented concept important mcqsStd 12 Computer Chapter 6 object oriented concept important mcqs
Std 12 Computer Chapter 6 object oriented concept important mcqsNuzhat Memon
 
Std 12 computer chapter 6 object oriented concepts (part 1)
Std 12 computer chapter 6 object oriented concepts (part 1)Std 12 computer chapter 6 object oriented concepts (part 1)
Std 12 computer chapter 6 object oriented concepts (part 1)Nuzhat Memon
 
Std 12 computer chapter 6 object oriented concepts (part 2)
Std 12 computer chapter 6 object oriented concepts (part 2)Std 12 computer chapter 6 object oriented concepts (part 2)
Std 12 computer chapter 6 object oriented concepts (part 2)Nuzhat Memon
 
Std 12 computer java basics part 3 control structure
Std 12 computer java basics part 3 control structureStd 12 computer java basics part 3 control structure
Std 12 computer java basics part 3 control structureNuzhat Memon
 
Std 12 Computer Chapter 7 Java Basics (Part 2)
Std 12 Computer Chapter 7 Java Basics (Part 2)Std 12 Computer Chapter 7 Java Basics (Part 2)
Std 12 Computer Chapter 7 Java Basics (Part 2)Nuzhat Memon
 
Std 12 Computer Chapter 7 Java Basics (Part 1)
Std 12 Computer Chapter 7 Java Basics (Part 1)Std 12 Computer Chapter 7 Java Basics (Part 1)
Std 12 Computer Chapter 7 Java Basics (Part 1)Nuzhat Memon
 
Std 12 Computer Chapter 13 other useful free tools and services important MCQs
Std 12 Computer Chapter 13 other useful free tools and services important MCQsStd 12 Computer Chapter 13 other useful free tools and services important MCQs
Std 12 Computer Chapter 13 other useful free tools and services important MCQsNuzhat Memon
 
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQs
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQsStd 12 Computer Chapter 9 Working with Array and String in Java important MCQs
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQsNuzhat Memon
 
Std 12 computer chapter 8 classes and object in java (part 2)
Std 12 computer chapter 8 classes and object in java (part 2)Std 12 computer chapter 8 classes and object in java (part 2)
Std 12 computer chapter 8 classes and object in java (part 2)Nuzhat Memon
 
Std 10 computer chapter 10 introduction to c language (part2)
Std 10 computer chapter 10 introduction to c language (part2)Std 10 computer chapter 10 introduction to c language (part2)
Std 10 computer chapter 10 introduction to c language (part2)Nuzhat Memon
 
Std 10 computer chapter 10 introduction to c language (part1)
Std 10 computer chapter 10 introduction to c language (part1)Std 10 computer chapter 10 introduction to c language (part1)
Std 10 computer chapter 10 introduction to c language (part1)Nuzhat Memon
 
Std 10 computer chapter 9 Problems and Problem Solving
Std 10 computer chapter 9 Problems and Problem SolvingStd 10 computer chapter 9 Problems and Problem Solving
Std 10 computer chapter 9 Problems and Problem SolvingNuzhat Memon
 
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...Nuzhat Memon
 
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)Nuzhat Memon
 
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1 Basics Opera...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1  Basics Opera...Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1  Basics Opera...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1 Basics Opera...Nuzhat Memon
 
Std 11 Computer Chapter 4 Introduction to Layers (Part 3 Solving Textual Exe...
Std 11 Computer Chapter 4 Introduction to Layers  (Part 3 Solving Textual Exe...Std 11 Computer Chapter 4 Introduction to Layers  (Part 3 Solving Textual Exe...
Std 11 Computer Chapter 4 Introduction to Layers (Part 3 Solving Textual Exe...Nuzhat Memon
 

More from Nuzhat Memon (20)

Std 10 chapter 11 data type, expression and operators important MCQs
Std 10 chapter 11 data type, expression and operators important MCQsStd 10 chapter 11 data type, expression and operators important MCQs
Std 10 chapter 11 data type, expression and operators important MCQs
 
Std 10 Chapter 10 Introduction to C Language Important MCQs
Std 10 Chapter 10 Introduction to C Language Important MCQsStd 10 Chapter 10 Introduction to C Language Important MCQs
Std 10 Chapter 10 Introduction to C Language Important MCQs
 
Std 12 chapter 7 Java Basics Important MCQs
Std 12 chapter 7 Java Basics Important MCQsStd 12 chapter 7 Java Basics Important MCQs
Std 12 chapter 7 Java Basics Important MCQs
 
Std 12 computer chapter 8 classes and objects in java important MCQs
Std 12 computer chapter 8 classes and objects in java important MCQsStd 12 computer chapter 8 classes and objects in java important MCQs
Std 12 computer chapter 8 classes and objects in java important MCQs
 
Std 12 Computer Chapter 6 object oriented concept important mcqs
Std 12 Computer Chapter 6 object oriented concept important mcqsStd 12 Computer Chapter 6 object oriented concept important mcqs
Std 12 Computer Chapter 6 object oriented concept important mcqs
 
Std 12 computer chapter 6 object oriented concepts (part 1)
Std 12 computer chapter 6 object oriented concepts (part 1)Std 12 computer chapter 6 object oriented concepts (part 1)
Std 12 computer chapter 6 object oriented concepts (part 1)
 
Std 12 computer chapter 6 object oriented concepts (part 2)
Std 12 computer chapter 6 object oriented concepts (part 2)Std 12 computer chapter 6 object oriented concepts (part 2)
Std 12 computer chapter 6 object oriented concepts (part 2)
 
Std 12 computer java basics part 3 control structure
Std 12 computer java basics part 3 control structureStd 12 computer java basics part 3 control structure
Std 12 computer java basics part 3 control structure
 
Std 12 Computer Chapter 7 Java Basics (Part 2)
Std 12 Computer Chapter 7 Java Basics (Part 2)Std 12 Computer Chapter 7 Java Basics (Part 2)
Std 12 Computer Chapter 7 Java Basics (Part 2)
 
Std 12 Computer Chapter 7 Java Basics (Part 1)
Std 12 Computer Chapter 7 Java Basics (Part 1)Std 12 Computer Chapter 7 Java Basics (Part 1)
Std 12 Computer Chapter 7 Java Basics (Part 1)
 
Std 12 Computer Chapter 13 other useful free tools and services important MCQs
Std 12 Computer Chapter 13 other useful free tools and services important MCQsStd 12 Computer Chapter 13 other useful free tools and services important MCQs
Std 12 Computer Chapter 13 other useful free tools and services important MCQs
 
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQs
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQsStd 12 Computer Chapter 9 Working with Array and String in Java important MCQs
Std 12 Computer Chapter 9 Working with Array and String in Java important MCQs
 
Std 12 computer chapter 8 classes and object in java (part 2)
Std 12 computer chapter 8 classes and object in java (part 2)Std 12 computer chapter 8 classes and object in java (part 2)
Std 12 computer chapter 8 classes and object in java (part 2)
 
Std 10 computer chapter 10 introduction to c language (part2)
Std 10 computer chapter 10 introduction to c language (part2)Std 10 computer chapter 10 introduction to c language (part2)
Std 10 computer chapter 10 introduction to c language (part2)
 
Std 10 computer chapter 10 introduction to c language (part1)
Std 10 computer chapter 10 introduction to c language (part1)Std 10 computer chapter 10 introduction to c language (part1)
Std 10 computer chapter 10 introduction to c language (part1)
 
Std 10 computer chapter 9 Problems and Problem Solving
Std 10 computer chapter 9 Problems and Problem SolvingStd 10 computer chapter 9 Problems and Problem Solving
Std 10 computer chapter 9 Problems and Problem Solving
 
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 3: Masking to R...
 
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)
Chapter 5 Using Pictures in Synfig (Practical 2: Masking to hide area in synfig)
 
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1 Basics Opera...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1  Basics Opera...Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1  Basics Opera...
Std 11 Computer Chapter 5 Using Pictures in Synfig (Practical 1 Basics Opera...
 
Std 11 Computer Chapter 4 Introduction to Layers (Part 3 Solving Textual Exe...
Std 11 Computer Chapter 4 Introduction to Layers  (Part 3 Solving Textual Exe...Std 11 Computer Chapter 4 Introduction to Layers  (Part 3 Solving Textual Exe...
Std 11 Computer Chapter 4 Introduction to Layers (Part 3 Solving Textual Exe...
 

Recently uploaded

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Recently uploaded (20)

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

M-Commerce Security Issues

  • 1. 1 PART - 2 CHAPTER 5 INTRODUCTION TO M-COMMERCE Presented by Nuzhat Ibrahim Memon
  • 2. Security Issues in E-Commerce & M-Commerce 2  Secrecy of the information so that unauthorized user cannot read it.  It is achieved by using cryptography  All the message transmitted are encrypted and only the receiver can read it after decrypting the message using appropriate key.  It helps in protecting the confidential data like credit card number Confidentiality  Ensures that the information must not be accidentally or maliciously altered or tampered in transit.  Receiver should receive the same message as was sent by the sender.  If the message is altered in between the transition, it should be detected. This removes the problem of modifying the order quantity in between and later creating the payment problems. Integrity The valuable data or information that travels on the internet may be misused, stolen, corrupted or lost. E-Commerce and M-Commerce security must meet four important aspects: Presented by Nuzhat Ibrahim Memon
  • 3. Securing Issues in E-Commerce & M-Commerce (cont.) Authorization Non-repudiation 3  Ensures that only authentic users are allowed to use the system.  Login and Password is one of the way to achieve authentication.  Sender of the message cannot deny that he/she has sent the message.  It prevents sender or receiver from denying a transmitted message when in fact they did send it.  It is usually accomplished via digital signatures or a Trusted Third Party (TTP). Presented by Nuzhat Ibrahim Memon
  • 4. Internet Security Threats Malicious Code Sniffing 4  Malicious code is one that causes damage to a computer or system.  Either Active itself or be like a virus requiring a user to perform an action as clicking on something or opening an e-mail attachment.  It can also affect a network, send messages through e- mail and steal information or cause even more damage by deleting file.  Program that uses Internet to record information that passes through a computer or router in transits from sender or receiver.  Like tapping the telephone wire and recording the conversation.  It can read e-mail, login, password, credit card numbers. Presented by Nuzhat Ibrahim Memon
  • 5. Internet Security Threats 5  Electronic defacing of an existing website page.  An attacker replaces the website’s original content with his/her own content.  It is an example of integrity violation.  Equivalent electronic equivalent of destroying property or to placing graffiti on someone’s photograph. Cyber Vandalism  DoS is an attack used to shut down a machine or network, making it inaccessible to its intended users.  An attacker may be able to prevent the user from accessing e-mail, websites, online account etc.  The users are flooded with hundreds and thousands of messages that create traffic problem on the network. Denial of Service attack Attacker Presented by Nuzhat Ibrahim Memon
  • 6. Internet Security Threats 6  Spoofing is pretending to be someone you are not.  Representing a website as authentic when it is actually a fake.  It is a technique where the attacker tries to assume the identity of another person or system for transacting with victim site.  For example, an attacker can create a fake website as www.gswan.co.in and substitute his IP address for the real website IP address.  All the user’s visiting to the real site will then be redirected to the fake website. Spoofing Presented by Nuzhat Ibrahim Memon
  • 7. Security Measures 7  Computer program  Detects, prevent and takes action to remove the malicious codes like viruses, worms and Trojan horses from the infected system.  Once a system is infected by virus, it will replicates itself (spread by attaching it to other programs or files ) within the system and also spread to other systems by taking control of the users email and sending out copies of itself to those in the users contact list.  The infection may be simple as causing strange noises, pop-ups and other annoying things on the system.  It may delete the files and slow down the system or also can damage the hardware or destroy the entire computer system.  Most common way a system is attacked is through e-mail or through internet download.  Antivirus software is critical to be installed and kept updated regularly on the computer. Antivirus Software Presented by Nuzhat Ibrahim Memon
  • 8. Security Measures 8  Companies having their own websites have to control the access to the network services both inside and outside the company network.  Device (computer/router) places between the network and the Internet to monitor and control the traffic between the company’s local network and the outside world.  A firewall protects the local network against the following:  Email services that sometimes create problems.  Undesirable material like photos, videos entering into local network.  Unauthorized persons gaining access to local network.  Unauthorized data or information leaving the company’s network.  Blocks the traffic from outside world to the local network.  Protect from any type of network attack. Firewall Presented by Nuzhat Ibrahim Memon
  • 9. Security Measures 9  Digital Certificate / Digital ID – proving identify in electronic transactions.  With a digital certificate, we can assure the business organizations, online services and friends that the electronic information they receive from us are authentic.  Third party issues certificates is known as Certification Authority (CA).  Public key which is used for encrypting messages  The digital signature of the certification authority so that a receiver can verify that the certificate is real. Digital Certificate Presented by Nuzhat Ibrahim Memon
  • 10. Security Measures 10  An art of protecting the information by transforming it into an unreadable form.  Encryption is the transformation of normal text or plain text into unreadable or secret text known as cipher text.  Secret key is used to encrypt and decrypt a message.  Messages are encrypted just before they are sent on the internet or network. When the encrypted message is received by the receiver, it needs to be decrypted. Decryption is the reverse of encryption. It is the transformation of encrypted text back into normal text.  Encryption is used to protect data in transit, for example, data being transferred via networks like internet or ecommerce, mobile telephones, Bluetooth devices and bank ATM (Automatic Teller Machines)  A coded form of ”WAVES” using encryption.  Here the encryption mechanism substitutes each alphabet with the alphabet that comes before it. Plain text (normal text) Cipher text (unreadable/secret text) Cryptography Presented by Nuzhat Ibrahim Memon W A V E S V Z U D R
  • 11. Security Measures 11  Securing web transaction on the internet  Developed by Netscape.  During the e-commerce transactions, all the information is exchanged in secured manner using SSL by encrypting all the messages.  If a site is secured by Verisign, then the security logo of VeriSign is displayed on the login screen of the secured site.  On clicking the you will get the owner information and the validity of the certificate.  This indicates that the communication with this site is secured and the owner of the website is valid who is certified by the authority like VeriSign  Starts from https:// rather than http:// Secure Socket Layer (SSL) Presented by Nuzhat Ibrahim Memon
  • 12. Securing Intellectual Properties 12 Indian Government has established the IT laws (Information technology laws) under the IT act. Intellectual Properties: books | software | music | video | copyrights | trademarks | webpages  Copyright provides the author with a tool to protect his/her original work from being used or taken by other without permission.  Applicable to books, software programs & articles.  Copyright matter cannot be used freely.  Copying contents from the website also violates copyright laws. Copyright  Specific logo, mark, word, symbol, design, phrase, image used by an individuals or a company to distinguish product or service from that of other in the market.  Trademark symbols : TM : Trade Mark SM : Service Mark ® : Registered Trademark  Competition over domain names is another legal issue.  Earlier, the domain names were given on first come first serve (FCFS)basis.  Thus people would register domain names that were not in use but would be of importance, Later on such domain names were sold to concerned company at a very high price is known as cyber-squatting.  Mislead the consumers who generally make typographical errors while entering a URL. Domain Name Disputes Presented by Nuzhat Ibrahim Memon
  • 13. Protecting Intellectual Property Steganography  Process of hiding information within other information.  It works by replacing unused data in computer files such as images, sound or text with invisible information.  This hidden information can be text, cipher text, image. Digital Watermarking  Digital code inserted into a digital image, audio or video file which can identify the file’s copyright information.  Allows hiding information in a totally invisible manner.  In Digital world, artist can watermark their work by hiding their name within the image.  In the field of data security, watermarks can be used for certification and authentication.  Big problem of unauthorized mp3 audio distribution.  A visible digital watermark can be added with GIMP. 13Presented by Nuzhat Ibrahim Memon Exercise "new unique zero-error hidden accurate text“
  • 14. THANK YOU! Speaker Name Email: speakermail@website.com Phone: +7 888 999-000-11 Presented by Nuzhat Ibrahim Memon