2
Most read
5
Most read
10
Most read
E-commerce- Security & Encryption
Dimensions of E-commerce Security
Integrity.
Non denial.
Authenticity.
Confidentiality.
Privacy.
Availability.
Security Threats in the E-commerce
Malicious Code.
Phishing.
Hacking.
Credit card fraud.
Spoofing.
Technology Solutions
Protecting Internet communications (encryption)

Securing channels of communication (SSL, S-HTTP,
VPNs)
Protecting networks (firewalls)
Protecting servers and clients
Protecting Internet Communications:
Encryption
Encryption: The process of transforming plain text or data
into cipher text that cannot be read by anyone other than
the sender and receiver.
Purpose: Secure stored information and information
transmission.
Provides:
Message integrity
Non Denial
Authentication
Confidentiality
Symmetric Key Encryption
Also known as secret key encryption.
Both the sender and receiver use the same
digital key to encrypt and decrypt message.
Requires a different set of keys for each
transaction.
Public Key Encryption
Public key cryptography solves symmetric key
encryption problem of having to exchange secret key
Uses two mathematically related digital keys – public
key (widely disseminated) and private key (kept secret
by owner)
Both keys are used to encrypt and decrypt message
Once key is used to encrypt message, same key
cannot be used to decrypt message
Digital Envelopes
Addresses weaknesses of public key encryption
(computationally slow, decreases transmission
speed, increases processing time) and symmetric
key encryption (faster, but more secure)

Uses symmetric key encryption to encrypt
document but public key encryption to encrypt
and send symmetric key
Securing Channels of Communication
Secure Sockets Layer (SSL): Most common
form of securing channels of communication.
S-HTTP: Alternative method; provides a secure
message-oriented communications protocol.

Virtual Private Networks (VPNs): Allow remote
users to securely access internal networks via
the Internet, using Point-to-Point Tunneling
Protocol (PPTP).
Protecting Networks: Firewalls and Proxy
Servers
Firewall: Hardware or software filters
communications packets and prevents some packets
from entering the network based on a security policy.
Proxy servers: Software servers that handle all
communications originating from or being sent to the
Internet (act as “spokesperson” or “bodyguard” for
the organization).
Protecting Servers and Clients
Operating system controls: Authentication
and access control mechanisms.
Anti-virus software: Easiest and least
expensive way to prevent threats to system
integrity.

More Related Content

PPT
E-Commerce Security
PPTX
E business.ppt
PDF
Chapter 4 software project planning
PPTX
Internal trade
PPT
1 - Introduction to PL/SQL
PPSX
I way - Network Infrastructure for e-Commerce
PPT
Electronic Payment System
PPTX
Volleyball powerpoint
E-Commerce Security
E business.ppt
Chapter 4 software project planning
Internal trade
1 - Introduction to PL/SQL
I way - Network Infrastructure for e-Commerce
Electronic Payment System
Volleyball powerpoint

What's hot (20)

PPTX
Data and Message Security
PPTX
Security in e commerce
PPT
E commerce security
PDF
Network security for E-Commerce
PPTX
Security Threats in E-Commerce
PPTX
Security issues in e commerce
PPTX
Digital signatures and e-Commerce
PPTX
PPTX
E commerce business models
PPTX
6. electronic payment systems
PPTX
Electronic Payment Systems in E Commerce
PPTX
Security in E-commerce
PDF
Client Server Network Security
PPTX
e-Commerce
PPT
Introduction to E-Commerce
PPTX
Frame work of e commerce
PPTX
INFORMATION SECURITY
PPTX
e commerce ppt
PPT
Advantages and disadvantages of e commerce
PPT
Cryptography and E-Commerce
Data and Message Security
Security in e commerce
E commerce security
Network security for E-Commerce
Security Threats in E-Commerce
Security issues in e commerce
Digital signatures and e-Commerce
E commerce business models
6. electronic payment systems
Electronic Payment Systems in E Commerce
Security in E-commerce
Client Server Network Security
e-Commerce
Introduction to E-Commerce
Frame work of e commerce
INFORMATION SECURITY
e commerce ppt
Advantages and disadvantages of e commerce
Cryptography and E-Commerce
Ad

Viewers also liked (10)

PPTX
Electronic fund transfer
PPTX
Security for e commerce
ODP
Encryption presentation final
PPTX
Internet, intranet and extranet
PPT
TCP/IP Basics
PPTX
Electronic Fund Transfer (EFT)
PPTX
Lan, man and wan ppt final
PPT
The Internet, Intranet and Extranet
PPTX
ELECTRONIC FUND TRANSFER
PPT
E commerce
 
Electronic fund transfer
Security for e commerce
Encryption presentation final
Internet, intranet and extranet
TCP/IP Basics
Electronic Fund Transfer (EFT)
Lan, man and wan ppt final
The Internet, Intranet and Extranet
ELECTRONIC FUND TRANSFER
E commerce
 
Ad

Similar to E-commerce- Security & Encryption (20)

PPTX
Secrity project keyvan
PPTX
ebusiness digital,E business signature .
PPT
Computersystemssecurity 090529105555-phpapp01
PPT
Computer Systems Security
PPT
Security
PPTX
ENCRYPTION.pptx
PPTX
fundamental of network security
PPTX
cns unit 1.pptx
PPTX
Network Security and Cryptography
PPTX
Encryption in Cryptography
PPTX
Cryptography and Network Security Principles.pptx
PPTX
Fundamental Concept of Cryptography in Computer Security
PPTX
Security in Data Communication and Networking
PPT
Cryptography
PPT
Cyber security Unit 3 Cryptography and Network security
PPT
Network Security Chapter 7
PPTX
Cryptographic Tools Week#11 Lecture #01,02.pptx
PPT
Cryptography
PPTX
Network security and cryptography
PDF
Vulnerabilities of the SSL/TLS Protocol
Secrity project keyvan
ebusiness digital,E business signature .
Computersystemssecurity 090529105555-phpapp01
Computer Systems Security
Security
ENCRYPTION.pptx
fundamental of network security
cns unit 1.pptx
Network Security and Cryptography
Encryption in Cryptography
Cryptography and Network Security Principles.pptx
Fundamental Concept of Cryptography in Computer Security
Security in Data Communication and Networking
Cryptography
Cyber security Unit 3 Cryptography and Network security
Network Security Chapter 7
Cryptographic Tools Week#11 Lecture #01,02.pptx
Cryptography
Network security and cryptography
Vulnerabilities of the SSL/TLS Protocol

Recently uploaded (20)

PPTX
Diploma pharmaceutics notes..helps diploma students
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PPTX
Why I Am A Baptist, History of the Baptist, The Baptist Distinctives, 1st Bap...
PPT
hemostasis and its significance, physiology
PDF
Compact First Student's Book Cambridge Official
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PDF
African Communication Research: A review
PDF
anganwadi services for the b.sc nursing and GNM
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PPTX
Macbeth play - analysis .pptx english lit
PDF
Chevening Scholarship Application and Interview Preparation Guide
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
Hospital Case Study .architecture design
Diploma pharmaceutics notes..helps diploma students
Disorder of Endocrine system (1).pdfyyhyyyy
Why I Am A Baptist, History of the Baptist, The Baptist Distinctives, 1st Bap...
hemostasis and its significance, physiology
Compact First Student's Book Cambridge Official
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PLASMA AND ITS CONSTITUENTS 123.pptx
Everyday Spelling and Grammar by Kathi Wyldeck
African Communication Research: A review
anganwadi services for the b.sc nursing and GNM
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
hsl powerpoint resource goyloveh feb 07.ppt
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
Macbeth play - analysis .pptx english lit
Chevening Scholarship Application and Interview Preparation Guide
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Theoretical for class.pptxgshdhddhdhdhgd
Nurlina - Urban Planner Portfolio (english ver)
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Hospital Case Study .architecture design

E-commerce- Security & Encryption

  • 2. Dimensions of E-commerce Security Integrity. Non denial. Authenticity. Confidentiality. Privacy. Availability.
  • 3. Security Threats in the E-commerce Malicious Code. Phishing. Hacking. Credit card fraud. Spoofing.
  • 4. Technology Solutions Protecting Internet communications (encryption) Securing channels of communication (SSL, S-HTTP, VPNs) Protecting networks (firewalls) Protecting servers and clients
  • 5. Protecting Internet Communications: Encryption Encryption: The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and receiver. Purpose: Secure stored information and information transmission. Provides: Message integrity Non Denial Authentication Confidentiality
  • 6. Symmetric Key Encryption Also known as secret key encryption. Both the sender and receiver use the same digital key to encrypt and decrypt message. Requires a different set of keys for each transaction.
  • 7. Public Key Encryption Public key cryptography solves symmetric key encryption problem of having to exchange secret key Uses two mathematically related digital keys – public key (widely disseminated) and private key (kept secret by owner) Both keys are used to encrypt and decrypt message Once key is used to encrypt message, same key cannot be used to decrypt message
  • 8. Digital Envelopes Addresses weaknesses of public key encryption (computationally slow, decreases transmission speed, increases processing time) and symmetric key encryption (faster, but more secure) Uses symmetric key encryption to encrypt document but public key encryption to encrypt and send symmetric key
  • 9. Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels of communication. S-HTTP: Alternative method; provides a secure message-oriented communications protocol. Virtual Private Networks (VPNs): Allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocol (PPTP).
  • 10. Protecting Networks: Firewalls and Proxy Servers Firewall: Hardware or software filters communications packets and prevents some packets from entering the network based on a security policy. Proxy servers: Software servers that handle all communications originating from or being sent to the Internet (act as “spokesperson” or “bodyguard” for the organization).
  • 11. Protecting Servers and Clients Operating system controls: Authentication and access control mechanisms. Anti-virus software: Easiest and least expensive way to prevent threats to system integrity.