E commerce security

52
E-Commerce Security Seyyed Mojtaba Mousavi E-Commerce Student Noore Touba Virtual University 8861084

description

E-Commerce Security

Transcript of E commerce security

Page 1: E commerce security

E-Commerce Security

Seyyed Mojtaba Mousavi

E-Commerce Student

Noore Touba Virtual University

8861084

Page 2: E commerce security

E-Commerce Security

Chapter I

Page 3: E commerce security

Threats - Risk

Vulnerability

Information Security Chapter I

Page 4: E commerce security

Security Policy Chapter I

Page 5: E commerce security

Security Services

Authentication

Data Confidentiality

Authorization

Non-repudiation

Data Integrity

Security Services

Chapter I

Page 6: E commerce security

Security Services

Authentication

Excuse me : You ?

Chapter I

Page 7: E commerce security

Security Services

Authorization

You Can just see the lectures and Nothing Else

Chapter I

Page 8: E commerce security

Security Services

Data Confidentiality

Chapter I

Page 9: E commerce security

Security Services

Data Integrity

Chapter I

Page 10: E commerce security

Security Services

Non-Repudation

Chapter I

Page 11: E commerce security

E-Commerce Security

Chapter II

Page 12: E commerce security

Security Services

Cryptography

Chapter II

Page 13: E commerce security

Security Services

Symmetric Method

Chapter II

Page 14: E commerce security

Security Services

Symmetric Method

Sync Stream Mode

Stream CipherBlock Cipher

Chapter II

Page 15: E commerce security

Security Services

NKey Generator

Self-Sync Stream Mode

Symmetric Method

Stream CipherBlock Cipher

Chapter II

Page 16: E commerce security

Security Services

Symmetric Method

Stream CipherBlock Cipher

DES Algorithm

Chapter II

Page 17: E commerce security

Security Services

AES Algorithm

Symmetric Method

Stream CipherBlock Cipher

Chapter II

Page 18: E commerce security

Security Services

Symmetric Method Vulnerabilities

Chapter II

Page 19: E commerce security

Security Services

Symmetric Method Vulnerabilities

Chapter II

Page 20: E commerce security

Security Services

A-Symmetric Method

Chapter II

Page 21: E commerce security

Security Services

A-Symmetric Algorithm

Chapter II

Page 22: E commerce security

E-Commerce Security

Chapter III

Page 23: E commerce security

Data Integrity & Authentication

Data Integrity & Authentication

Chapter III

Page 24: E commerce security

Data Integrity & Authentication

Data Integrity & Authentication

Hash Function

Chapter III

Page 25: E commerce security

Data Integrity & Authentication

Data Integrity & Authentication

Chapter III

Hash Function

Message Authentication Code

Useful for Authentication

Page 26: E commerce security

Data Integrity & Authentication

Data Integrity & Authentication

Chapter III

Hash Function

Secure Hash Standard

Useful for Data Integrity

Page 27: E commerce security

Data Integrity & Authentication

Access Control Mechanism

Chapter III

Identity-Base

You Can use just from this resource

OK . Thanks

Page 28: E commerce security

Data Integrity & Authentication

Access Control Mechanism

Chapter III

Rule-BaseYou Can use just from this resource And You Can just view and print the

documents

OHHHH

How Strict

Page 29: E commerce security

E-Commerce Security

Chapter IV

Page 30: E commerce security

Public Key Infrastructure

Public Key Infrastructure

Chapter IV

Page 31: E commerce security

Public Key Infrastructure

Public Key Infrastructure

Chapter IV

Page 32: E commerce security

Public Key Infrastructure

Public Key Infrastructure

Chapter IV

Digital Certificate

Page 33: E commerce security

Public Key Infrastructure

Public Key Infrastructure

Chapter IV

Public Key & Private Key

Page 34: E commerce security

Public Key Infrastructure

Public Key Infrastructure

Chapter IV

PKI Components

Page 35: E commerce security

E-Commerce Security

Chapter V

Page 36: E commerce security

Electronic Payment Systems

Electronic Payment Systems

Chapter V

Page 37: E commerce security

Electronic Payment Systems

Electronic Payment Systems

Chapter V

Electronic Payment Systems methods

Page 38: E commerce security

Electronic Payment Systems

Electronic Payment Systems

Chapter V

Payment types

Debit CardCredit Card

Page 39: E commerce security

Electronic Payment Systems

Electronic Payment Systems

Chapter V

Payment types

Electronic chque

Page 40: E commerce security

Electronic Payment Systems

Electronic Payment Systems

Chapter V

Payment types

Electronic Cash

Page 41: E commerce security

Electronic Payment Systems

Electronic Payment Systems

Chapter V

Electronic Wallet

Page 42: E commerce security

E-Commerce Security

Chapter VII

Page 43: E commerce security

Security Payment Transaction

Security Payment Transaction

Chapter VII

Page 44: E commerce security

Security Payment Transaction

Security Payment Transaction

Chapter VII

User Anonymity

Page 45: E commerce security

Security Payment Transaction

Security Payment Transaction

Chapter VII

Location Anonymity

Page 46: E commerce security

Security Payment Transaction

Security Payment Transaction

Chapter VII

ChaUm’s mixes

Page 47: E commerce security

Security Payment Transaction

Security Payment Transaction

Chapter VII

Dual Signature

Page 48: E commerce security

Security Payment Transaction

Security Payment Transaction

Chapter VII

Electronic Payment Framework

Page 49: E commerce security

Security Payment Transaction

Security Payment Transaction

Chapter VII

Electronic Payment Framework

Page 50: E commerce security

E-Commerce Security

Chapter IIX

Page 51: E commerce security

Communication Security

Communication Security

Chapter IIX

Page 52: E commerce security

Communication Security

Communication Security

Chapter IIX

Malicious Programs

Bacteria

Logical Bomb

Trojan