e commerce security(without animation)

Download E commerce security(without animation)

If you can't read please download the document

Upload: mmousavi

Post on 16-Apr-2017

1.667 views

Category:

Technology


2 download

TRANSCRIPT

E-Commerce Security

E-Commerce SecuritySeyyed Mojtaba MousaviE-Commerce StudentNoore Touba Virtual University8861084

E-Commerce Security

Chapter I

Threats - Risk

Vulnerability Information Security Chapter I

Security Policy

Chapter I

Security ServicesAuthenticationData ConfidentialityAuthorizationNon-repudiationData IntegritySecurity ServicesChapter I

Security ServicesAuthenticationExcuse me : You ?

Chapter I

Security ServicesAuthorizationYou Can just see the lectures and Nothing Else Chapter I

Security ServicesData Confidentiality

Chapter I

Security Services Data Integrity

Chapter I

Security Services

Non-RepudationChapter I

E-Commerce Security

Chapter II

Security ServicesCryptography

Chapter II

Security Services Symmetric Method

Chapter II

Security Services Symmetric MethodSync Stream Mode

Key Auto Key

Stream CipherBlock Cipher

Chapter II

Security Services N Key Generator Self-Sync Stream Mode

Cipher Text Auto KeySymmetric Method

Stream CipherBlock Cipher

Chapter II

Security ServicesSymmetric Method

Stream CipherBlock Cipher

DES Algorithm

16 56

Chapter II

Security ServicesAES AlgorithmSymmetric Method

Stream CipherBlock Cipher

128 192 256 Chapter II

Security ServicesSymmetric Method Vulnerabilities

Chapter II

Security ServicesSymmetric Method Vulnerabilities

Chapter II

Security ServicesA-Symmetric Method

Chapter II

Security ServicesA-Symmetric Algorithm

Chapter II

E-Commerce Security

Chapter III

Data Integrity & AuthenticationData Integrity & Authentication

Chapter III

Data Integrity & AuthenticationData Integrity & AuthenticationHash Function

Chapter III

Data Integrity & AuthenticationData Integrity & AuthenticationChapter IIIHash FunctionMessage Authentication Code

Useful for Authentication

Data Integrity & AuthenticationData Integrity & AuthenticationChapter IIIHash FunctionSecure Hash Standard

Useful for Data Integrity

Data Integrity & AuthenticationAccess Control MechanismChapter IIIIdentity-Base

You Can use just from this resource

OK . Thanks

Data Integrity & AuthenticationAccess Control MechanismChapter IIIRule-Base

You Can use just from this resource And You Can just view and print the documents

OHHHHHow Strict

E-Commerce Security

Chapter IV

Public Key InfrastructurePublic Key InfrastructureChapter IV

Public Key InfrastructurePublic Key InfrastructureChapter IV

Public Key InfrastructurePublic Key InfrastructureChapter IV

Digital Certificate

Public Key InfrastructurePublic Key InfrastructureChapter IVPublic Key & Private Key

Public Key InfrastructurePublic Key InfrastructureChapter IVPKI Components

E-Commerce Security

Chapter V

Electronic Payment SystemsElectronic Payment SystemsChapter V

Electronic Payment SystemsElectronic Payment SystemsChapter VElectronic Payment Systems methods

Electronic Payment SystemsElectronic Payment SystemsChapter VPayment types

Debit CardCredit Card

Electronic Payment SystemsElectronic Payment SystemsChapter VPayment types

Electronic chque

Electronic Payment SystemsElectronic Payment SystemsChapter VPayment typesElectronic Cash

Electronic Payment SystemsElectronic Payment SystemsChapter VElectronic Wallet

E-Commerce Security

Chapter VII

Security Payment TransactionSecurity Payment TransactionChapter VII

Security Payment TransactionSecurity Payment TransactionChapter VII

User Anonymity

Security Payment TransactionSecurity Payment TransactionChapter VIILocation Anonymity

Security Payment TransactionSecurity Payment TransactionChapter VIIChaUms mixes

Security Payment TransactionSecurity Payment TransactionChapter VII

Dual Signature

Security Payment TransactionSecurity Payment TransactionChapter VIIElectronic Payment Framework

Security Payment TransactionSecurity Payment TransactionChapter VIIElectronic Payment Framework

E-Commerce Security

Chapter IIX

Communication SecurityCommunication SecurityChapter IIX

Communication SecurityCommunication SecurityChapter IIXMalicious Programs

Bacteria

Logical Bomb

Trojan