E-Commerce Security

SyedManiruzzamanPabe 20,138 views 20 slides Sep 05, 2016
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

Detailed about E-Commerce Security


Slide Content

WelcomeWelcome
To To
My Presentation.
Syed Maniruzzaman Pabel
ID:142-15-4186
Daffodil International University

Our Topic :
E-Commerce Security
2

What is E-Commerce Security
E-commerce security is the protection of e-
commerce assets from unauthorized access, use,
alteration, or destruction.
3

Six dimensions of e-commerce security:
1. Integrity
2. Nonrepudiation
3. Authenticity
4. Confidentiality
5. Privacy
6. Availability
4

The Continuing Need for E-Commerce Security:
Computer Security Institute (CSI)
Nonprofit organization located in San Francisco,
California, that is dedicated to serving and training
information, computer, and network security
professionals
Computer Emergency Response Team (CERT)
Group of three teams at Carnegie Mellon University
that monitor the incidence of cyber attacks, analyze
vulnerabilities, and provide guidance on protecting
against attacks
5

Basic Security Issues:
Authentication
Authorization
Auditing
6

Nontechnical attack:
An attack that uses chicanery to trick people into
revealing sensitive information or performing actions
that compromise the security of a network
7

Technical attack:
An attack perpetrated using software and systems
knowledge or expertise
8

Types of technical attack:
common (security) vulnerabilities and
exposures (CVEs
National Infrastructure Protection Center
(NIPC)
denial-of-service (DoS) attack
distributed denial-ofservice (DDoS) attack
9

Malware:
A generic term for malicious software
Example:
10

Virus and Worm:
virus
A piece of software code that inserts itself into a host,
including the operating systems, in order to propagate;
it requires that its host program be run to activate it
worm
A software program that runs independently, consuming
the resources of its host in order to maintain itself, that
is capable of propagating a complete working version of
itself onto another machine
11

Common mistakes in managing
security risks:
Undervalued information
Narrowly defined security boundaries
Reactive security management
Dated security management processes
Lack of communication about security
responsibilities
12

Security Risk Management:
A systematic process for determining the likelihood
of various security attacks and for identifying the
actions needed to prevent or mitigate those attacks
13

Security risk management consists of three
phases:
Asset identification
Risk assessment
Implementation
14

passive tokens and active tokens:
passive tokens
Storage devices (e.g., magnetic strips) that contain a
secret code used in a two-factor authentication
system
active tokens
Small, stand-alone electronic devices that generate
one-time passwords used in a two-factor
authentication system
15

Symmetric (Private) Key
Encryption:
16

Public (Asymmetric) Key Encryption:
public key encryption
Method of encryption that uses a pair of
matched keys—a public key to encrypt a
message and a private key to decrypt it, or
vice versa
public key
Encryption code that is publicly available to
anyone
17

virtual private network (VPN):
A network that uses the public Internet to carry
information but remains private by using
encryption to scramble the communications,
authentication to ensure that information has not
been tampered with, and access control to verify
the identity of anyone using the network
18

Honeynet and Honeypots:
honeynet
A way to evaluate vulnerabilities of an organization
by studying the types of attacks to which a site is
subjected using a network of systems called
honeypots
honeypots
Production systems (e.g., firewalls, routers, Web
servers, database servers) designed to do real work
but that are watched and studied as network
intrusions occur
19

Thank You

Every Body
20