18-06-2013, 11:38 AM
Electronic Commerce Security
Electronic Commerce.ppt (Size: 1.3 MB / Downloads: 26)
Online Security Issues Overview
Computer security
The protection of assets from unauthorized access, use, alteration, or destruction
Physical security
Includes tangible protection devices
Logical security
Protection of assets using nonphysical means
Threat
Any act or object that poses a danger to computer assets
Managing Risk
Terms --
Countermeasure
General name for a procedure that recognizes, reduces, or eliminates a threat
Eavesdropper
Person or device that can listen in on and copy Internet transmissions
Crackers or hackers
Write programs or manipulate technologies to obtain unauthorized access to computers and networks
Viruses, Worms, and Antivirus Software
Virus
Software that attaches itself to another program
Can cause damage when the host program is activated
Macro virus
Type of virus coded as a small program (macro) and is embedded in a file
Antivirus software
Detects viruses and worms
Communication Channel Security
Recall that --
Secrecy is the prevention of unauthorized information disclosure
Privacy is the protection of individual rights to nondisclosure
Sniffer programs
Provide the means to record information passing through a computer or router that is handling Internet traffic
Tension Between Security and Other Values
Ease of use
Often security slows down processors and adds significantly to data storage demands. Too much security can harm profitability; not enough can mean going out of business.
Public Safety & Criminal Use
claims of individuals to act anonymously vs. needs of public officials to maintain public safety in light of criminals or terrorists.