E-Business Issues In Cyberspace
Presented By:-
Rahul Kumar
Preeti Sachdeva
Security
• To protect data from unauthorised access and virus
(malicious code & trojan horse).
Basic Security Issues
• Authentication
• Authorisation
• Confidentiality
• Integrity
• Non repudiation
Authentication
• The process by which one entity can verifies that
another entity is who.
Authorisation
• The process that ensures that the person has the right
to access certain resources.
Confidentiality
• Keeping private or sensitive information from being
disclosed to unauthorised individuals, entities or
processes.
Integrity
• The ability to protect data from being altered or
destroyed by unauthorised access or accidental
manner.
Non Repudiation
• The ability to limit parties from refusing that
legitimate transaction took place, usually by means
of a signature.
Types of Security Threats
• Denial of Service
• Unauthorized Access
• Theft and Fraud
Denial of Service
Two primary types of DOS attacks:
• Spamming
• Viruses
Spamming
• Sending unsolicited commercial emails to
individuals
• E-mail bombing caused by a hacker targeting one
computer or network, and sending thousands of
email messages to it.
• Surfing involves hackers placing software agents
onto a third-party system and setting it off to send
requests to an intended target.
• DDOS (distributed denial of service attacks)
involves hackers placing software agents onto a
number of third-party systems and setting them off
to simultaneously send requests to an intended target
Viruses
• Self-replicating computer programs designed to
perform unwanted events.
Unauthorized Access
• Illegal access to systems, applications or data
• Passive unauthorized access –listening to communications channel
for finding secrets. May use content for damaging purposes
• Active unauthorized access
 Modifying system or data
 Message stream modification
• Changes intent of messages, e.g., to abort or delay a negotiation on
a contract
• Masquerading or spoofing –sending a message that appears to be
from someone else.
• Impersonating another user at the ―name‖(changing the From
field) or IP levels (changing the source and/or destination IP
address of packets in the network)
• Sniffers–software that illegally access data traversing across the
network.
• Software and operating systems‘ security holes
Theft and Fraud
• Fraud occurs when the stolen data is used or modified.
• Theft of software via illegal copying from company‘s servers.
• Theft of hardware, specifically laptops.
Types Security
• Encryption
• Decryption
• Cryptography
• Virtual Private Network
• Gate
• Biometric Systems
• Digital Signature
• Digital Certificate
• Secure Socket Layer
• Transaction Layer Security
Encryption
• The process of scrambling a message in such a way
that it is difficult, expecting or time consuming for
an unauthorised person to unscramble (decrypt) it.
Decryption
• The process of unscrambling a message in such a
way that it is understand by authorised person.
Cryptography
• It is the process of encryption and decryption of
message or data by using different algorithms or
software's.
Security issues in e business
Virtual Private Network
• A network that uses the public internet to carry
information but remains private by using encryption
to scramble the communications, authentication to
ensure that information has not to been tampered
with, and access control to verify the identity of
anyone using the network.
Security issues in e business
Gateway
• Gateway provide a secure way to do online transactions i.e.
payment of various orders.
Biometric System
• Authentication systems that identify a person by
measurement of a biological characteristics.
• There are various types of biometrics systems:-
1. Physiological Biometrics
2. Behavioural Biometrics
3. Fingerprint Scanning
4. Iris Scanning
5. Voice Scanning
6. Keystroke Monitoring
Digital Signature
• An identifying code that can be used to authenticate
the identity of the sender of a document.
Digital Certificate
• A method for verification that the holder of a public
or a private key is who he or she claim to be.
Secure Socket Layer
• Protocol that utilizes standard certificate for
authentication and data encryption to ensyre privacy
or confidentiality.
Transaction Layer Security
• It work same as Secure Socket Layer (SSL) and it is
another name of SSL after 1996.
Security issues in e business
Security issues in e business
Security issues in e business

More Related Content

PPTX
protection & security of e-commerce ...
PPTX
E-commerce- Security & Encryption
PPT
E commerce security
PPTX
Security in e commerce
PPTX
Security Threats in E-Commerce
PPTX
M commerce ppt
PPTX
Security issues in E-commerce
PPT
E-commerce security.ppt
protection & security of e-commerce ...
E-commerce- Security & Encryption
E commerce security
Security in e commerce
Security Threats in E-Commerce
M commerce ppt
Security issues in E-commerce
E-commerce security.ppt

What's hot (20)

PPT
E-Commerce Security
PPT
Mobile commerce
PPTX
PPTX
Industry framework of e commerce
PDF
E commerce Security
PPTX
PPSX
I way - Network Infrastructure for e-Commerce
PPTX
Digital signatures and e-Commerce
PPTX
overview of electronic payment system
PPT
Ethical, Social, and Political Issues in E-commerce
PPTX
E-commerce Business Models
PPTX
History of E commerce- Brief History
PDF
Network security for E-Commerce
PPT
Changing dynamics
PDF
E Commerce -Security Threats and Challenges
PPTX
Security issues in e commerce
PPT
Cryptography and E-Commerce
PPTX
E - Commerce
PPT
E Procurement
E-Commerce Security
Mobile commerce
Industry framework of e commerce
E commerce Security
I way - Network Infrastructure for e-Commerce
Digital signatures and e-Commerce
overview of electronic payment system
Ethical, Social, and Political Issues in E-commerce
E-commerce Business Models
History of E commerce- Brief History
Network security for E-Commerce
Changing dynamics
E Commerce -Security Threats and Challenges
Security issues in e commerce
Cryptography and E-Commerce
E - Commerce
E Procurement
Ad

Similar to Security issues in e business (20)

PPTX
INTERNETSECURITY with the different threats
PPTX
Ecommerce_Ch4.pptx
PPTX
COMPUTER SECURITY in Information Security
PPTX
Introduction of network security
PDF
wireless networking chapter three WAN.pdf
PPTX
Cryptography and network Security--MOD-1.pptx
PPTX
Computer security concepts
PPTX
Information Security
PPTX
IT.pptx
PPTX
6 security
PPTX
Computer security ppt for computer science student.pptx
PPT
ch1-1.ppt
PPTX
Cybercrime and security.pptx
PPTX
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
PPTX
Cyber Security
PDF
E Commerce security
PDF
Chapter 1 Introduction of Cryptography and Network security
PPTX
Network security & cryptography
PPTX
Network security & cryptography
INTERNETSECURITY with the different threats
Ecommerce_Ch4.pptx
COMPUTER SECURITY in Information Security
Introduction of network security
wireless networking chapter three WAN.pdf
Cryptography and network Security--MOD-1.pptx
Computer security concepts
Information Security
IT.pptx
6 security
Computer security ppt for computer science student.pptx
ch1-1.ppt
Cybercrime and security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
Cyber Security
E Commerce security
Chapter 1 Introduction of Cryptography and Network security
Network security & cryptography
Network security & cryptography
Ad

More from Rahul Kumar (8)

DOC
Jet airways
DOC
DOCX
PPT
Technology acquisition
PPT
E governancee
PPTX
Intranet & Extranet
PPT
Technology Life Cycle With Mobile Generation Example
PPT
Jet Airways 2013
Jet airways
Technology acquisition
E governancee
Intranet & Extranet
Technology Life Cycle With Mobile Generation Example
Jet Airways 2013

Recently uploaded (20)

PDF
Nurlina - Urban Planner Portfolio (english ver)
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
plant tissues class 6-7 mcqs chatgpt.pdf
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
Farming Based Livelihood Systems English Notes
PPTX
Education and Perspectives of Education.pptx
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
M.Tech in Aerospace Engineering | BIT Mesra
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
English Textual Question & Ans (12th Class).pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Nurlina - Urban Planner Portfolio (english ver)
Literature_Review_methods_ BRACU_MKT426 course material
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
Journal of Dental Science - UDMY (2022).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
plant tissues class 6-7 mcqs chatgpt.pdf
Civil Department's presentation Your score increases as you pick a category
Farming Based Livelihood Systems English Notes
Education and Perspectives of Education.pptx
CRP102_SAGALASSOS_Final_Projects_2025.pdf
M.Tech in Aerospace Engineering | BIT Mesra
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
Race Reva University – Shaping Future Leaders in Artificial Intelligence
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
The TKT Course. Modules 1, 2, 3.for self study
English Textual Question & Ans (12th Class).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf

Security issues in e business

  • 1. E-Business Issues In Cyberspace Presented By:- Rahul Kumar Preeti Sachdeva
  • 2. Security • To protect data from unauthorised access and virus (malicious code & trojan horse).
  • 3. Basic Security Issues • Authentication • Authorisation • Confidentiality • Integrity • Non repudiation
  • 4. Authentication • The process by which one entity can verifies that another entity is who.
  • 5. Authorisation • The process that ensures that the person has the right to access certain resources.
  • 6. Confidentiality • Keeping private or sensitive information from being disclosed to unauthorised individuals, entities or processes.
  • 7. Integrity • The ability to protect data from being altered or destroyed by unauthorised access or accidental manner.
  • 8. Non Repudiation • The ability to limit parties from refusing that legitimate transaction took place, usually by means of a signature.
  • 9. Types of Security Threats • Denial of Service • Unauthorized Access • Theft and Fraud
  • 10. Denial of Service Two primary types of DOS attacks: • Spamming • Viruses
  • 11. Spamming • Sending unsolicited commercial emails to individuals • E-mail bombing caused by a hacker targeting one computer or network, and sending thousands of email messages to it. • Surfing involves hackers placing software agents onto a third-party system and setting it off to send requests to an intended target. • DDOS (distributed denial of service attacks) involves hackers placing software agents onto a number of third-party systems and setting them off to simultaneously send requests to an intended target
  • 12. Viruses • Self-replicating computer programs designed to perform unwanted events.
  • 13. Unauthorized Access • Illegal access to systems, applications or data • Passive unauthorized access –listening to communications channel for finding secrets. May use content for damaging purposes • Active unauthorized access  Modifying system or data  Message stream modification • Changes intent of messages, e.g., to abort or delay a negotiation on a contract • Masquerading or spoofing –sending a message that appears to be from someone else. • Impersonating another user at the ―name‖(changing the From field) or IP levels (changing the source and/or destination IP address of packets in the network) • Sniffers–software that illegally access data traversing across the network. • Software and operating systems‘ security holes
  • 14. Theft and Fraud • Fraud occurs when the stolen data is used or modified. • Theft of software via illegal copying from company‘s servers. • Theft of hardware, specifically laptops.
  • 15. Types Security • Encryption • Decryption • Cryptography • Virtual Private Network • Gate • Biometric Systems • Digital Signature • Digital Certificate • Secure Socket Layer • Transaction Layer Security
  • 16. Encryption • The process of scrambling a message in such a way that it is difficult, expecting or time consuming for an unauthorised person to unscramble (decrypt) it.
  • 17. Decryption • The process of unscrambling a message in such a way that it is understand by authorised person.
  • 18. Cryptography • It is the process of encryption and decryption of message or data by using different algorithms or software's.
  • 20. Virtual Private Network • A network that uses the public internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not to been tampered with, and access control to verify the identity of anyone using the network.
  • 22. Gateway • Gateway provide a secure way to do online transactions i.e. payment of various orders.
  • 23. Biometric System • Authentication systems that identify a person by measurement of a biological characteristics. • There are various types of biometrics systems:- 1. Physiological Biometrics 2. Behavioural Biometrics 3. Fingerprint Scanning 4. Iris Scanning 5. Voice Scanning 6. Keystroke Monitoring
  • 24. Digital Signature • An identifying code that can be used to authenticate the identity of the sender of a document.
  • 25. Digital Certificate • A method for verification that the holder of a public or a private key is who he or she claim to be.
  • 26. Secure Socket Layer • Protocol that utilizes standard certificate for authentication and data encryption to ensyre privacy or confidentiality.
  • 27. Transaction Layer Security • It work same as Secure Socket Layer (SSL) and it is another name of SSL after 1996.