SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Entrepreneurship &
Commerce in IT
11
Sachintha Gunasena MBCS
http://lk.linkedin.com/in/sachinthadtg
Recap so far…
Sachintha Gunasena MBCS
http://lk.linkedin.com/in/sachinthadtg
Building an E-Commerce
Website
• Planning
• Systems analysis and design
• Building the system: In-house vs. outsourcing
• Website hosting: In-house vs. outsourcing
• System Testing
• Implementation and maintenance
• Website optimization factors
• Choosing server software
• Application servers
• E-commerce merchant server software functionality
• Merchant server software packages
• Choosing the right hardware for your e-commerce site
• Right-sizing your hardware platform
• Other e-commerce site development tools
• Personalization tools
Today…
Security and Encryption
• The e-commerce security environment
• Types of threats
• Technology solutions
• Protecting Internet communications
• Encryption
• Securing channels of communication
• Secure socket layers (SSL)
• Protecting networks - Firewalls
• Protecting servers and clients – OS controls/Anti-virus software
The E-Commerce Security
Environment
• For most law-abiding citizens, the Internet holds the promise of a
huge and convenient global marketplace
• For criminals, the Internet has created entirely new – and profitable –
ways to steal from the more than one billion Internet consumers
worldwide
• steal what?
• products, services, cash, information
• It’s also less risky to steal online
• For example, rather than rob a bank in person, the Internet makes it
possible to rob people remotely and almost anonymously
The E-Commerce Security
Environment
The E-Commerce Security
Environment
Security Implementation
Concerns
• Can there be too much security?
• Yes.
• adds overhead and expense to business operations
• Expanding computer security also has other downsides:
• Makes systems more difficult to use
• Slows down processors
• Increases data storage demands
• May reduce individual’s abilities to remain anonymous
Threats
• Three key points of vulnerability:
• Client
• Server
• Communications channel
An E-Commerce Transaction
Vulnerable Points in an E-
Commerce Transaction
Types of Threats
• Viruses
• needs a host
• a virus attaches itself to executable code and is executed when the software program begins to run
or an infected file is opened
• Worms
• does not need a host
• replicates itself through the Internet
• Trojans
• code that is layered behind another program,
• can perform covert, malicious functions
• Logic Bombs
• a version of a Trojan Horse, however, it is event or time specific
Types of Threats Cont.d
• Bot networks
• a number of Internet-connected computers communicating with other similar machines in an effort to
complete repetitive tasks and objectives
• zombie computer network / master host computer
• used for spam or DDoS attacks
• DDoS attacks
• many computers are used to launch an attack on a particular E-Commerce server
• a massive amount of invalid data is sent to the server
• achieved by bot networks
• Phishing
• the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an
attempt to scam the user into surrendering private information that will be used for identity theft
Types of Threats Cont.d
• Data Packet Sniffing
• an attacker can also use a sniffer to intercept the data packet flow and analyze the
individual data packets
• IP Spoofing
• change the source address of a data packet to give it the appearance that it originated
from another computer
• used to start the launch of a Denial of Service Attack
• Port Scanning
• listening to the network ports of the E-Commerce server
• figure out what kind of services are running on the E-Commerce server
• figure out the vulnerabilities of the system in order to cause the greatest damage possible
Types of Threats Cont.d
• Backdoors / Trapdoors
• developers often leave “backdoors” to monitor the code as it is developed
• Instead of a implementing a secure protocol in which to access the code, backdoors
provide a quick way into the code
• Backdoors provide a very easy vulnerability for the attacker to get into, and cause system
wide damage to the E-Commerce server.
• Data theft
• create an additional, unauthorized copy
• Identify theft
• someone pretends to be someone else by assuming that person's identity
• as a method to gain access to resources or obtain credit and other benefits in that
person's name
Types of Threats Cont.d
• Credit card fraud
• obtain goods without paying
• obtain unauthorized funds from an account
• also an adjunct to identity theft
• Spyware
• software that aims to gather information about a person or organization
without their knowledge
• send such information to another entity without the consumer's consent
• asserts control over a computer without the consumer's knowledge
Security Solutions
• Two lines of defence
• Technology Solutions
• Policy Solutions
Technology Solutions
• Redundant firewall protection
• stop cyberattacks before they can penetrate the network perimeter
• Web application protection
• Web Application Firewall
• protects from from application-level attacks like SQL injections and cross-site
scripting (XSS) attacks
• extends protection in places where traditional firewall’s can’t provide
• DoS/DDoS mitigation
• ward off DDoS events by providing a barrier between your server and the IP
flood
Technology Solutions
• SSL VPN
• create a secure connection for remote users who will be
administering the Web applications and hosting environment
• Vulnerability Monitoring
• scan your Web application code around the clock looking for
unexpected changes and malicious code that matches known
"diseases" in the threat database
• Antivirus protection
• reviews files and services stored on the physical server
Technology Solutions
• Two factor authentication
• requires Web site administrators to go through two layers of
security before obtaining access to the hosting environment
• unique because it challenges you with something you know
and something you have
• prevents password leaks
• Encrypted backup, service monitoring and response
• read more
Protecting Internet
Communications
• ideas?
Encryption
• transforming plain text or data into cipher text that cannot be read by anyone other than the
sender and the receiver
• to secure stored information and to secure information transmission
• [old way]
• Symmetric Key Encryption
• both the sender and the receiver use the same key to encrypt and decrypt the message
• sent the key to each other over some communications media or in person
• [updated way 1976]
• Asymmetric Key Encryption / Public Key Cryptography
• a class of cryptographic protocols based on algorithms that require two separate keys, one of
which is secret (or private) and one of which is public
• Although different, the two parts of this key pair are mathematically linked
Public Key Cryptography
Limitations to Encryption
• All forms of encryption have limitations
• It is not effective against insiders
• Protecting private keys may also be difficult
because they are stored on insecure desktop and
laptop computers
• Additional technology solutions exist for securing
channels of communications, networks, and
servers/clients
Securing Channels of
Communication
• Secure Sockets Layer (SSL)
• Virtual Private Networks (VPNs)
Secure Socket Layer (SSL)
• Transport Layer Security (TLS) and its predecessor, Secure
Sockets Layer (SSL), both of which are frequently referred to as
'SSL', are cryptographic protocols designed to provide
communications security over a computer network
• use X.509 certificates and hence asymmetric cryptography to
• authenticate the counterpart with whom they are communicating
• and to negotiate a symmetric session key
• session key is then used to encrypt data flowing between the
parties
Secure Socket Layer (SSL)
• allows
• data/message confidentiality
• message authentication codes for message integrity
• message authentication
• use in applications such as
• web browsing
• email
• Internet faxing
• instant messaging
• voice-over-IP (VoIP)
Protecting Networks -
Firewalls
• a technological barrier designed to prevent unauthorized or
unwanted communications between computer networks or hosts
• a network security system that monitors and controls the incoming
and outgoing network traffic based on predetermined security
rules
• establishes a barrier between a trusted, secure internal network
and another outside network, such as the Internet, that is
assumed to not be secure or trusted
• network firewall
• host-based firewall
Protecting Servers & Clients –
OS Controls/Anti-virus Software
• Operating system security enhancements
• Anti-virus software
Policy Solutions
• Management Policies
• Business Procedures
• Public Laws
Policy Solutions
• An e-commerce security plan would include
• a risk assessment
• development of a security policy
• implementation plan
• creation of a security organization
• a security audit
Policy Solutions
• A Implementation may involve
• expanded forms of access controls
• IDs
• passwords
• access codes
• biometrics
• fingerprints
• retina scans
• speech recognition
Policy Solutions
• more ideas?
References
• http://www.technologyexecutivesclub.com/Articles/security/artThreatstoEcommerceServers.php
• http://www.slideshare.net/Timothy212/ebusiness-environment-and-analysis
• http://www.slideshare.net/omvikram/securityecommerce?qid=ae6a3149-f235-4e7d-81f0-
9e45da47bcd5&v=qf1&b=&from_search=4
• http://www.applicure.com/solutions/ecommerce-security
• http://www.ecommercetimes.com/story/69577.html
• http://www.ehow.com/how_5303365_protect-privacy-internet.html
• http://www.slate.com/blogs/future_tense/2013/06/07/how_to_secure_and_encrypt_your_email_and_other_communications_fro
m_prism.html
• http://www.ecommerce-digest.com/staying-safe.html
• http://econ.ucsb.edu/~doug/245a/Papers/ECommerce%20Privacy.pdf
• http://www.zurich.ibm.com/pdf/news/Konsbruck.pdf
• http://www.slideshare.net/m8817/security-in-ecommerce
• http://paws.kettering.edu/~aborcher/articles/CC001.PDF
• https://en.wikipedia.org/wiki/Transport_Layer_Security
• https://en.wikipedia.org/wiki/Public-key_cryptography
Next Up…
• Web Payment Systems
Sachintha Gunasena MBCS
http://lk.linkedin.com/in/sachinthadtg
Thank you.
Sachintha Gunasena MBCS
http://lk.linkedin.com/in/sachinthadtg

Weitere ähnliche Inhalte

Was ist angesagt?

CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksSam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsNetFort
 

Was ist angesagt? (20)

Security framework
Security frameworkSecurity framework
Security framework
 
Unit 3
Unit 3Unit 3
Unit 3
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
Cyber secure
Cyber secure Cyber secure
Cyber secure
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
BOTNET
BOTNETBOTNET
BOTNET
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Network Security
Network SecurityNetwork Security
Network Security
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Finding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analyticsFinding the source of Ransomware - Wire data analytics
Finding the source of Ransomware - Wire data analytics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
WLAN Security
WLAN Security WLAN Security
WLAN Security
 

Ähnlich wie Entrepreneurship & Commerce in IT - 11 - Security & Encryption

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
E-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).pptE-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).pptHemlata Gangwar
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 

Ähnlich wie Entrepreneurship & Commerce in IT - 11 - Security & Encryption (20)

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
6 security
6 security6 security
6 security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
E-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).pptE-COMMERCE SECURITY (2).ppt
E-COMMERCE SECURITY (2).ppt
 
Unit08
Unit08Unit08
Unit08
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Security problems.pptx
Security problems.pptxSecurity problems.pptx
Security problems.pptx
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 

Mehr von Sachintha Gunasena

Entrepreneurship and Commerce in IT - 14 - Web Marketing Communications
Entrepreneurship and Commerce in IT - 14 - Web Marketing CommunicationsEntrepreneurship and Commerce in IT - 14 - Web Marketing Communications
Entrepreneurship and Commerce in IT - 14 - Web Marketing CommunicationsSachintha Gunasena
 
Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...
Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...
Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...Sachintha Gunasena
 
Entrepreneurship & Commerce in IT - 12 - Web Payments
Entrepreneurship & Commerce in IT - 12 - Web PaymentsEntrepreneurship & Commerce in IT - 12 - Web Payments
Entrepreneurship & Commerce in IT - 12 - Web PaymentsSachintha Gunasena
 
Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...
Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...
Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...Sachintha Gunasena
 
Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...
Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...
Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...Sachintha Gunasena
 
Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...
Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...
Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...Sachintha Gunasena
 
Concurrency Programming in Java - 03 - Essentials of Java Part 2
Concurrency Programming in Java - 03 - Essentials of Java Part 2Concurrency Programming in Java - 03 - Essentials of Java Part 2
Concurrency Programming in Java - 03 - Essentials of Java Part 2Sachintha Gunasena
 
Concurrency Programming in Java - 02 - Essentials of Java Part 1
Concurrency Programming in Java - 02 - Essentials of Java Part 1Concurrency Programming in Java - 02 - Essentials of Java Part 1
Concurrency Programming in Java - 02 - Essentials of Java Part 1Sachintha Gunasena
 
Concurrency Programming in Java - 01 - Introduction to Concurrency Programming
Concurrency Programming in Java - 01 - Introduction to Concurrency ProgrammingConcurrency Programming in Java - 01 - Introduction to Concurrency Programming
Concurrency Programming in Java - 01 - Introduction to Concurrency ProgrammingSachintha Gunasena
 
Entrepreneurship & Commerce in IT - 08 - E-Commerce business models and concepts
Entrepreneurship & Commerce in IT - 08 - E-Commerce business models and conceptsEntrepreneurship & Commerce in IT - 08 - E-Commerce business models and concepts
Entrepreneurship & Commerce in IT - 08 - E-Commerce business models and conceptsSachintha Gunasena
 
Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...
Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...
Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...Sachintha Gunasena
 
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webEntrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webSachintha Gunasena
 
Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...
Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...
Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...Sachintha Gunasena
 
Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...
Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...
Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...Sachintha Gunasena
 
Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...
Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...
Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...Sachintha Gunasena
 
Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...
Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...
Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...Sachintha Gunasena
 
Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...
Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...
Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...Sachintha Gunasena
 
Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...
Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...
Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...Sachintha Gunasena
 
Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...
Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...
Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...Sachintha Gunasena
 

Mehr von Sachintha Gunasena (19)

Entrepreneurship and Commerce in IT - 14 - Web Marketing Communications
Entrepreneurship and Commerce in IT - 14 - Web Marketing CommunicationsEntrepreneurship and Commerce in IT - 14 - Web Marketing Communications
Entrepreneurship and Commerce in IT - 14 - Web Marketing Communications
 
Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...
Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...
Entrepreneurship and Commerce in IT - 13 - The Internet Audience, consumer be...
 
Entrepreneurship & Commerce in IT - 12 - Web Payments
Entrepreneurship & Commerce in IT - 12 - Web PaymentsEntrepreneurship & Commerce in IT - 12 - Web Payments
Entrepreneurship & Commerce in IT - 12 - Web Payments
 
Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...
Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...
Concurrency Programming in Java - 07 - High-level Concurrency objects, Lock O...
 
Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...
Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...
Concurrency Programming in Java - 06 - Thread Synchronization, Liveness, Guar...
 
Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...
Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...
Concurrency Programming in Java - 05 - Processes and Threads, Thread Objects,...
 
Concurrency Programming in Java - 03 - Essentials of Java Part 2
Concurrency Programming in Java - 03 - Essentials of Java Part 2Concurrency Programming in Java - 03 - Essentials of Java Part 2
Concurrency Programming in Java - 03 - Essentials of Java Part 2
 
Concurrency Programming in Java - 02 - Essentials of Java Part 1
Concurrency Programming in Java - 02 - Essentials of Java Part 1Concurrency Programming in Java - 02 - Essentials of Java Part 1
Concurrency Programming in Java - 02 - Essentials of Java Part 1
 
Concurrency Programming in Java - 01 - Introduction to Concurrency Programming
Concurrency Programming in Java - 01 - Introduction to Concurrency ProgrammingConcurrency Programming in Java - 01 - Introduction to Concurrency Programming
Concurrency Programming in Java - 01 - Introduction to Concurrency Programming
 
Entrepreneurship & Commerce in IT - 08 - E-Commerce business models and concepts
Entrepreneurship & Commerce in IT - 08 - E-Commerce business models and conceptsEntrepreneurship & Commerce in IT - 08 - E-Commerce business models and concepts
Entrepreneurship & Commerce in IT - 08 - E-Commerce business models and concepts
 
Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...
Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...
Entrepreneurship & Commerce in IT - 10 - The Internet today and How to build ...
 
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide webEntrepreneurship & Commerce in IT - 09 - The internet and the world wide web
Entrepreneurship & Commerce in IT - 09 - The internet and the world wide web
 
Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...
Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...
Entrepreneurship and Commerce in IT - 07 - Introduction to E-Commerce I - e-c...
 
Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...
Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...
Entrepreneurship and Commerce in IT - 06 - Funding, Expanding, and Exit Strat...
 
Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...
Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...
Entrepreneurship and Commerce in IT - 05 - Marketing, Technology and Marketin...
 
Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...
Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...
Entrepreneurship & Commerce in IT - 01 - Introduction in to Entrepreneurship,...
 
Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...
Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...
Entrepreneurship & Commerce in IT - 02 - Basic Concepts of Entrepreneurship, ...
 
Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...
Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...
Entrepreneurship & Commerce in IT - 04 - Marketing Plan, Marketing 7 P's, STP...
 
Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...
Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...
Entrepreneurship & Commerce in IT - 03 - Writing a Business Plan, Creating a ...
 

Kürzlich hochgeladen

VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...aditipandeya
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Paymentanilsa9823
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...aditipandeya
 
ServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for SuccessServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for SuccessCyntexa
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...aditipandeya
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniturem3resolve
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...gurkirankumar98700
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...anilsa9823
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night EnjoyPooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...anilsa9823
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...Hot Call Girls In Sector 58 (Noida)
 

Kürzlich hochgeladen (14)

VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Secunderabad high-profile Cal...
 
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
Top Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash PaymentTop Call Girls In Arjunganj ( Lucknow  ) ✨ 8923113531 ✨  Cash Payment
Top Call Girls In Arjunganj ( Lucknow ) ✨ 8923113531 ✨ Cash Payment
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Gachibowli high-profile Call ...
 
ServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for SuccessServiceNow Field Service Management: Transforms Field Operations for Success
ServiceNow Field Service Management: Transforms Field Operations for Success
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
VIP 7001035870 Find & Meet Hyderabad Call Girls Jubilee Hills high-profile Ca...
 
Product Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design FurnitureProduct Catalog Bandung Home Decor Design Furniture
Product Catalog Bandung Home Decor Design Furniture
 
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Indira Nagar Lucknow ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Indira Nagar Lucknow ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
High Profile Call Girls in Lucknow | Whatsapp No 🧑🏼‍❤️‍💋‍🧑🏽 8923113531 𓀇 VIP ...
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls 7001035870 Enjoy Call Girls With Our Escorts
 
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
Lucknow 💋 Escort Service in Lucknow ₹7.5k Pick Up & Drop With Cash Payment 89...
 
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night EnjoyMumbai Call Girls Colaba Pooja WhatsApp  7738631006  💞 Full Night Enjoy
Mumbai Call Girls Colaba Pooja WhatsApp 7738631006 💞 Full Night Enjoy
 
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
CALL ON ➥8923113531 🔝Call Girls Sushant Golf City Lucknow best sexual service...
 
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
(COD) ̄Young Call Girls In Defence Colony , New Delhi꧁❤ 7042364481❤꧂ Escorts S...
 

Entrepreneurship & Commerce in IT - 11 - Security & Encryption

  • 1. Entrepreneurship & Commerce in IT 11 Sachintha Gunasena MBCS http://lk.linkedin.com/in/sachinthadtg
  • 2. Recap so far… Sachintha Gunasena MBCS http://lk.linkedin.com/in/sachinthadtg
  • 3. Building an E-Commerce Website • Planning • Systems analysis and design • Building the system: In-house vs. outsourcing • Website hosting: In-house vs. outsourcing • System Testing • Implementation and maintenance • Website optimization factors • Choosing server software • Application servers • E-commerce merchant server software functionality • Merchant server software packages • Choosing the right hardware for your e-commerce site • Right-sizing your hardware platform • Other e-commerce site development tools • Personalization tools
  • 5. Security and Encryption • The e-commerce security environment • Types of threats • Technology solutions • Protecting Internet communications • Encryption • Securing channels of communication • Secure socket layers (SSL) • Protecting networks - Firewalls • Protecting servers and clients – OS controls/Anti-virus software
  • 6. The E-Commerce Security Environment • For most law-abiding citizens, the Internet holds the promise of a huge and convenient global marketplace • For criminals, the Internet has created entirely new – and profitable – ways to steal from the more than one billion Internet consumers worldwide • steal what? • products, services, cash, information • It’s also less risky to steal online • For example, rather than rob a bank in person, the Internet makes it possible to rob people remotely and almost anonymously
  • 9. Security Implementation Concerns • Can there be too much security? • Yes. • adds overhead and expense to business operations • Expanding computer security also has other downsides: • Makes systems more difficult to use • Slows down processors • Increases data storage demands • May reduce individual’s abilities to remain anonymous
  • 10. Threats • Three key points of vulnerability: • Client • Server • Communications channel
  • 12. Vulnerable Points in an E- Commerce Transaction
  • 13. Types of Threats • Viruses • needs a host • a virus attaches itself to executable code and is executed when the software program begins to run or an infected file is opened • Worms • does not need a host • replicates itself through the Internet • Trojans • code that is layered behind another program, • can perform covert, malicious functions • Logic Bombs • a version of a Trojan Horse, however, it is event or time specific
  • 14. Types of Threats Cont.d • Bot networks • a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives • zombie computer network / master host computer • used for spam or DDoS attacks • DDoS attacks • many computers are used to launch an attack on a particular E-Commerce server • a massive amount of invalid data is sent to the server • achieved by bot networks • Phishing • the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft
  • 15. Types of Threats Cont.d • Data Packet Sniffing • an attacker can also use a sniffer to intercept the data packet flow and analyze the individual data packets • IP Spoofing • change the source address of a data packet to give it the appearance that it originated from another computer • used to start the launch of a Denial of Service Attack • Port Scanning • listening to the network ports of the E-Commerce server • figure out what kind of services are running on the E-Commerce server • figure out the vulnerabilities of the system in order to cause the greatest damage possible
  • 16. Types of Threats Cont.d • Backdoors / Trapdoors • developers often leave “backdoors” to monitor the code as it is developed • Instead of a implementing a secure protocol in which to access the code, backdoors provide a quick way into the code • Backdoors provide a very easy vulnerability for the attacker to get into, and cause system wide damage to the E-Commerce server. • Data theft • create an additional, unauthorized copy • Identify theft • someone pretends to be someone else by assuming that person's identity • as a method to gain access to resources or obtain credit and other benefits in that person's name
  • 17. Types of Threats Cont.d • Credit card fraud • obtain goods without paying • obtain unauthorized funds from an account • also an adjunct to identity theft • Spyware • software that aims to gather information about a person or organization without their knowledge • send such information to another entity without the consumer's consent • asserts control over a computer without the consumer's knowledge
  • 18. Security Solutions • Two lines of defence • Technology Solutions • Policy Solutions
  • 19. Technology Solutions • Redundant firewall protection • stop cyberattacks before they can penetrate the network perimeter • Web application protection • Web Application Firewall • protects from from application-level attacks like SQL injections and cross-site scripting (XSS) attacks • extends protection in places where traditional firewall’s can’t provide • DoS/DDoS mitigation • ward off DDoS events by providing a barrier between your server and the IP flood
  • 20. Technology Solutions • SSL VPN • create a secure connection for remote users who will be administering the Web applications and hosting environment • Vulnerability Monitoring • scan your Web application code around the clock looking for unexpected changes and malicious code that matches known "diseases" in the threat database • Antivirus protection • reviews files and services stored on the physical server
  • 21. Technology Solutions • Two factor authentication • requires Web site administrators to go through two layers of security before obtaining access to the hosting environment • unique because it challenges you with something you know and something you have • prevents password leaks • Encrypted backup, service monitoring and response • read more
  • 23. Encryption • transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver • to secure stored information and to secure information transmission • [old way] • Symmetric Key Encryption • both the sender and the receiver use the same key to encrypt and decrypt the message • sent the key to each other over some communications media or in person • [updated way 1976] • Asymmetric Key Encryption / Public Key Cryptography • a class of cryptographic protocols based on algorithms that require two separate keys, one of which is secret (or private) and one of which is public • Although different, the two parts of this key pair are mathematically linked
  • 25. Limitations to Encryption • All forms of encryption have limitations • It is not effective against insiders • Protecting private keys may also be difficult because they are stored on insecure desktop and laptop computers • Additional technology solutions exist for securing channels of communications, networks, and servers/clients
  • 26. Securing Channels of Communication • Secure Sockets Layer (SSL) • Virtual Private Networks (VPNs)
  • 27. Secure Socket Layer (SSL) • Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as 'SSL', are cryptographic protocols designed to provide communications security over a computer network • use X.509 certificates and hence asymmetric cryptography to • authenticate the counterpart with whom they are communicating • and to negotiate a symmetric session key • session key is then used to encrypt data flowing between the parties
  • 28. Secure Socket Layer (SSL) • allows • data/message confidentiality • message authentication codes for message integrity • message authentication • use in applications such as • web browsing • email • Internet faxing • instant messaging • voice-over-IP (VoIP)
  • 29. Protecting Networks - Firewalls • a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts • a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules • establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed to not be secure or trusted • network firewall • host-based firewall
  • 30. Protecting Servers & Clients – OS Controls/Anti-virus Software • Operating system security enhancements • Anti-virus software
  • 31. Policy Solutions • Management Policies • Business Procedures • Public Laws
  • 32. Policy Solutions • An e-commerce security plan would include • a risk assessment • development of a security policy • implementation plan • creation of a security organization • a security audit
  • 33. Policy Solutions • A Implementation may involve • expanded forms of access controls • IDs • passwords • access codes • biometrics • fingerprints • retina scans • speech recognition
  • 35. References • http://www.technologyexecutivesclub.com/Articles/security/artThreatstoEcommerceServers.php • http://www.slideshare.net/Timothy212/ebusiness-environment-and-analysis • http://www.slideshare.net/omvikram/securityecommerce?qid=ae6a3149-f235-4e7d-81f0- 9e45da47bcd5&v=qf1&b=&from_search=4 • http://www.applicure.com/solutions/ecommerce-security • http://www.ecommercetimes.com/story/69577.html • http://www.ehow.com/how_5303365_protect-privacy-internet.html • http://www.slate.com/blogs/future_tense/2013/06/07/how_to_secure_and_encrypt_your_email_and_other_communications_fro m_prism.html • http://www.ecommerce-digest.com/staying-safe.html • http://econ.ucsb.edu/~doug/245a/Papers/ECommerce%20Privacy.pdf • http://www.zurich.ibm.com/pdf/news/Konsbruck.pdf • http://www.slideshare.net/m8817/security-in-ecommerce • http://paws.kettering.edu/~aborcher/articles/CC001.PDF • https://en.wikipedia.org/wiki/Transport_Layer_Security • https://en.wikipedia.org/wiki/Public-key_cryptography
  • 36. Next Up… • Web Payment Systems Sachintha Gunasena MBCS http://lk.linkedin.com/in/sachinthadtg
  • 37. Thank you. Sachintha Gunasena MBCS http://lk.linkedin.com/in/sachinthadtg