Escolar Documentos
Profissional Documentos
Cultura Documentos
Threats
Part-1
Security in Cyberspace
The field of electronic security focuses on designing
measures that can enforce security policies.
Security in e-commerce generally employs
procedures such as authentication, ensuring
confidentiality, and the use of cryptography to
communicate over open systems.
The electronic system that supports e-commerce is
susceptible to abuse and failure in many ways
Security in Cyberspace
The electronic system that supports e-commerce is
susceptible to following threats:
Fraud
Resulting in direct financial loss.
Funds might be transferred from one account to
another, or financial records might simply be
destroyed.
UNIT-II
Security in Cyberspace
Theft
Theft of confidential, proprietary, technological, or
marketing information belonging to the firm or to
the customer.
An intruder may disclose such information to a
third party, resulting in damage to a key customer,
a client, or the firm itself.
Disruption
Disruption of service resulting in major losses to
business or inconvenience to the customer.
Electronic Business MS114
UNIT-II
Security in Cyberspace
Loss
Loss of customer confidence stemming from
illegal intrusion into customer files or company
business, dishonesty, human mistakes, or network
failure.
UNIT-II
Security Issues
Security concerns generally include the following
issues:
Confidentiality
Knowing who can read data.
Ensuring that information in the network remains
private.
This is done via encryption.
Identification and Authentication
Making sure that message sender or principal are
authentic.
Electronic Business MS114
UNIT-II
Security Issues
Availability
System resources are safeguarded from tampering
and are available for authorized users at the time
and in the format needed
Integrity
Making sure that information is not accidental or
maliciously altered or corrupted in transit.
Access Control
Restricting the use of resources to authorized
principals.
Electronic Business MS114
UNIT-II
Security Issues
Nonrepudiation
Ensuring that principal cannot deny that they sent
the message.
Privacy
Individual rights to nondisclosure
Firewalls
A filter between corporate network and the
Internet to secure corporate information and files
from intruders but allowing access to authorized
principals.
Electronic Business MS114
UNIT-II
UNIT-II
UNIT-II
UNIT-II
Malicious Code
Virus It is a software program which attach it self to other
programs without the owner of program being aware of it.
when the main program is executed the virus is spread
causing damage.
Worms
designed to spread from computer to computer
It can spread without any human intervention.
It can propagate through network and can affect hand held
devices.
Trojan horse It is software that appears to perform a desirable function
for the user prior to run or install.
Perhaps in addition to the expected function, steals
Electronic Business MS114
information or harms the system.
UNIT-II
Malicious Code
Bad applets (malicious mobile code) malicious Java applets or ActiveX controls that may be
downloaded onto client and activated merely by surfing to
a Web site
UNIT-II
UNIT-II
UNIT-II
UNIT-II
UNIT-II
UNIT-II
UNIT-II
UNIT-II