Internet Security for Small & Medium Business Week 6

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

The Digital Business is the present and the future
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Unit 28- Website Development Assignment 1- THEORY P3
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
E-Business – Technology and Networks Teodora Bakardjieva Prof. Dr., Varna Free University Varna Free University.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Chapter 6 E-Commerce. Agenda What is E-Commerce? Business to Business Business to Customer Business to employee Infrastructure Problems.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Understand Internet Security LESSON Security Fundamentals.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Online Security Myths & Challenges HIGHER COLLEGES OF TECHNOLOGY Abeer Nijmeh Account Manager April 14, 2002.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
Electronic Banking & Security Electronic Banking & Security.
Securing Interconnect Networks By: Bryan Roberts.
Business Applications– Using Java _____ Presented by Priya Saha.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
BY GAWARE S.R. DEPT.OF COMP.SCI
Unit 8 Network Security.
Electronic Payment Security Technologies
Module 4 System and Application Security
Presentation transcript:

Internet Security for Small & Medium Business Week 6

Internet technologies –valuable tool in improving the efficiency and profitability of their businesses. The aim of Trusting the Internet –helping Australian small and medium businesses understand the key issues of Internet security –browsing a website, sending s, conducting, e- commerce transactions, dealing with government agencies online and conducting e-business activities. –the first component for accelerate the uptake of e- commerce

Why do I need e-security? The potential of the Internet – and World Wide Web –500 million people being connected to the Internet –The benefit of doing business over the Internet Increased potential costumer base, Reduced paperwork and administration, Reduced time to receive orders, supply goods and make and receive payments, and Access to great range of supplies

–You may consider E-banking E-shopping E-tailing Sending and receiving orders to and from partners Loading your tax return or business activity statements or conducting other transactions with government agencies.

Why security is an issue on the Internet? –The Internet carrying risk –By FBI last year, more than 1 million credit card numbers stolen via the Internet –Information transmitted over Internet can be intercepted at any point Overview of security needed –Businesses need to consider The basic applications such as How to go about buying and selling online How to protect computer system and The legal issues surrounding e-business.

E-security technologies Four basic security principles –Authenticity –Security –Non-repudiation –Privacy or confidentiality

Authentication technologies –Authentication technoligies rely on Something you know Something you possess Something you are a unique physical quality –Password systems for authenticating identities and communications: Secure sockets layer (SSL) technologies Public key infrastructure (PKI) Virtual private network (VPN) Secure managed services

Secure access Secure connection Secure interconnection PKI in action Secure personal connection (PGP) Secure networking (VPNs) Secure managed services E-security and the real world Choosing the right option

The pyramid of Authentication Technologies. PKI Plus Biometrics Digital Signature Certificate - PKI Digital Signature Certificate - PGP Passwords + SSL Password / Tokens High level of security offered. For highly valued information Lower level of security offered. For less valuable information

How to send securely? network Web-based server Intranet server Mail Server Mail Server Mail Server Users

Secure Web –Web-based service is a sensible choice Dedicated encryption –Use public key and PGP Secure gateways Secure versus postal mail –Secure envelope –Inside being signed and authenticated

How to conduct secure transaction online? SSL and e-commerce SSL limitation –Data transmitted using SSL –SSL offering strong authentication –A secure envelope –A guarantee to your destination –Signature on envelope

How to deal with other e-security threats? Viruses Hacking Denials of services Dumping Port scanning and sniffing Method of protection - firewall

Securing your own PC –file sharing –browser security The importance of the real world security –ensure your workplace IT equipment is stored in a secure and lockable location –Keeping up-to-data logs of all equipment.

Privacy - important issue for e-security The privacy act and e-security Website privacy policies Cookies and Web bugs Monitoring stuff online

Laws applying to e-business Electronic Transaction Act 1999 (ETA) –giving information in writing –providing a signature –producing a document in material form and –recording or retaining information

Privacy Amendment (Private Sector) Act 2000 –Choose to `opt-in’ valuntarily –Trade in personal information –Provide a heath service and hold health information or –provide contractual services to the Commonwealth Cybercrime Act 2001