Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Summary of Reading Assignments: Credits and Debits on the Internet & New Payment Systems Hope To Cash In Dr. Deepak Khazanchi.
Chapter 8 Web Security.
Chapter 19 Security.
“Electronic Payment System”
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 Chapter 8: Security in Electronic Commerce IT357 Electronic Commerce.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
BY GAWARE S.R. DEPT.OF COMP.SCI
Cryptography and Network Security
Unit 8 Network Security.
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

Vijay V Vijayakumar

 Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s

 High Availability (24*7)  Fast  Efficient  Effective

 Document repository for storage of scanned documents.  Unlimited number of account holders  Straight-through processing of SWIFT Messages  On-Line Banking  Integrate with third party debit and credit card provider  Transaction status notification to client and merchant

 Account summary, transfer & transaction history.  Credit Card account summary & transaction history. Loan account summary & transaction history  Real time access to accounts, profiles and preferences.  Send statements online in a secure messaging environment.  Stop payment, checks re-order & other account management tasks.  Automate debits & transfers. Customer initiated account applications.  Credit Card applications. Loan & mortgage applications.

 User Authentication Most basic Inadequate in current scenario Threats like Phishing, Session Hijacking  Firewalls Prevent attacks from Internet or External Systems Doesn’t prevent from Insider attacks  Encryption All data stored in the server should be encrypted e.g. Triple DES  Hardware Security The actual hardware of the server should be protected against breaches

 Secure ◦ s are generally sent/received in Plain-Text  Secure HTTP ◦ All communication between Server and Client should be encrypted  Secure Electronic Transaction Secure message transfer during Electronic transactions

 Uses TCP port 443  Additional security layer between HTTP and TCP  Provides authentication and encryption  Avoid eavesdropping and man-in-the-middle attacks  Only as secure as the Browser, Web Server and its security

 Administrator must create a public key certificate for the web-server  Certificates signed by Certificate Authority  When browsers access web server they check it using the signing certificate provided by the CA  Only then is a connection established

 Asymmetric Cryptography ◦ Message signed using private key of sender and receiver decrypts using his public key ◦ Users public key is tied to the user by a digital identity certificate issued by a certificate authority ◦ Provides Authentication and Integrity ◦ Authentication - a valid signature shows that the message was sent by that user ◦ Integrity – checks for modification of message after transmission

 Society of World Wide Interbank Telecommunication – includes >200 banks worldwide  Objectives: High availability, Secure transmissions for EFT(Electronic Fund Transfers), financial traffic.  Standardized message format aimed for wide area networking  Proprietary algorithm

 Terminals can connect only thro approved SWIFT mechanisms to the regional Processing Centers.  Secure sequencing procedures, transaction audit trails and delivery acknowledgements  SWIFT II- modular approach to handle more traffic and optimize resources

 Need to develop shared networks with other banks, in the same country, to enable fast money transfers in the local currency.  US banks are supported by the CHIPS, BANKWIRE, and FEDWIRE networks

 Anti-Virus  Anti-Spyware  Anti-Malware  Personal Firewalls  Latest Security Patches

 Data stored is encrypted using Triple DES  Message Authentication Code (MAC) is used to used to prevent tampering of messages.  Vulnerable to Social-Engineering Attacks

  &mnu=12  ary_iso20022.htm

 Questions?