Ch 5. Security and Encryption - PowerPoint PPT Presentation

1 / 6
About This Presentation
Title:

Ch 5. Security and Encryption

Description:

Malicious Code Viruses, worms, Trojan horses, etc. Examples of Malicious Code Melissa, CodeRed, etc. Hacking and Cybervandalism ... – PowerPoint PPT presentation

Number of Views:35
Avg rating:3.0/5.0
Slides: 7
Provided by: allan8
Category:

less

Transcript and Presenter's Notes

Title: Ch 5. Security and Encryption


1
Ch 5. Security and Encryption
  • E-commerce Crime and Security Problems
  • Key Dimensions of Security
  • Tension Between Security and Other Values
  • Encryption Technologies
  • Communication Channel Tools
  • Network Protection Tools
  • Policies, Procedures, and Laws of Security

2
The Security Issues
  • What is good e-commerce security?
  • Dimensions of security Integrity,
    Non-repudiation, authenticity, confidentiality,
  • privacy, and availability
  • The balance between security and other values

3
Security Threats
  • Malicious Code Viruses, worms, Trojan horses,
    etc.
  • Examples of Malicious Code Melissa, CodeRed,
    etc.
  • Hacking and Cybervandalism
  • Credit Card fraud
  • Spoofing
  • Denial of Service
  • Sniffing
  • Insider Jobs

4
Site Security Tools
  • Encryption
  • Firewalls
  • Security Tools
  • Network Security Protocols
  • Access Controls
  • Virtual Private Networks
  • Authentication
  • Tunneling
  • Proxy/Agent Systems
  • Intrusion Detection

5
E-Commerce Security Legislation
  • Computer Fraud and Abuse Act (1986)Electronic
    Communications Privacy Act (1986)
  • National Information Infrastructure Protection
    Act (1996)
  • Cyberspace Electronic Security Act (2000)

6
Government Efforts
  • Export Restriction
  • Key Recovery Schemes
  • Lawful Access/Forced Disclosure
  • Official Hacking
Write a Comment
User Comments (0)
About PowerShow.com