security requirements in ebusiness

26
Security requirements in E-business- overview

Category:

Education


3 download

DESCRIPTION

In this presentation, we will discuss about the security requirement in an e-business, related challenges, risk assessment and threats. We will also talk about the concept of encryption and decryption. To know more about Welingkar School’s Distance Learning Program and courses offered, visit: http://www.welingkaronline.org/distance-learning/online-mba.html

TRANSCRIPT

Page 1: Security Requirements in eBusiness

Security requirements in E-business-overview

Page 2: Security Requirements in eBusiness

security

catchy word for marketing, products vendor, consultant, and consumers of IT

Page 3: Security Requirements in eBusiness

enterprise

needs to be focused in the area of its core competence

Page 4: Security Requirements in eBusiness

Information technology has become the key enabler to an enterprise to meet this challenge

Page 5: Security Requirements in eBusiness

implement an IT governance model within the enterprise

Page 6: Security Requirements in eBusiness

protecting an enterprise information

• stored

• maintained

• monitored

• updated

• transmitted

• weeded using this technology

Page 7: Security Requirements in eBusiness

new challenges

• information theft • electronic frauds • cyber vandalism • legal charges or litigation.

Page 8: Security Requirements in eBusiness

study the information security assurance requirements from the

enterprise perspective

Page 9: Security Requirements in eBusiness

road map

understand how to develop a road map that fit the need for all its stakeholders namely

• shareholders • employees • vendors • customers • regulatory bodies.

Page 10: Security Requirements in eBusiness

Chief security officers

accountable for expenditures should recognize that “information security” is not part of IT infrastructure

Page 11: Security Requirements in eBusiness

Information securityThis includes• Policy• Process• Procedure• Measure• metric

Page 12: Security Requirements in eBusiness

Security life cycle

Page 13: Security Requirements in eBusiness

Risk assessment

• identification and design of IT controls• implementation• use of metrics to measure• monitor and report • bring in changes to protect the enterprise IT

infrastructure.

Page 14: Security Requirements in eBusiness

security threats

There are security threats in India which rank 63 with an attack rate of 1781 attacks per 1,00,000 internet users.

Page 15: Security Requirements in eBusiness

categories of threats• Malicious software • spooling • scanning • snooping • scavenging• spamming• tunneling• malfunction • human error• physical environment

Page 16: Security Requirements in eBusiness

Information harvesting

Technique of without actually breaking into a system, some remotely accessible programs can be exploited to return information that was meant to be available

Page 17: Security Requirements in eBusiness

Denial of service

attacks are commonly launched from one or more points on the internet that are external to the victim own system or network.

Page 18: Security Requirements in eBusiness

Causes of DOS attacks

• TCP floods• ICMP echo• UDP floods• Source IP address• Source destination ports• Other IP header values

Page 19: Security Requirements in eBusiness

ways of propagation

• Central source propagation• Back chaining propagation• Autonomous propagation

Page 20: Security Requirements in eBusiness

Virus, worms and Trojan horses

malicious programs that can damage to your computer and information on your computer

Page 21: Security Requirements in eBusiness

Concept of encryption & decryption

Encryption algorithm

Decryptionalgorithm

Network

Sending device

Receiving device

Page 22: Security Requirements in eBusiness

They can slow down the internet and might even use your computer to

spread themselves to your friends, family ,co-workers and test of the

web.

Page 23: Security Requirements in eBusiness

virus

piece of computer code that attaches itself to a program or file so it can spread from computer to computer, infecting as it travels.

Page 24: Security Requirements in eBusiness

worm

designed to copy itself from one computer to another , but it automatically by taking control of features on the computer that can transport files or information.

Page 25: Security Requirements in eBusiness

Trojan horse

computer programs that appear to be useful software but affect security and cause lot of damage

Page 26: Security Requirements in eBusiness

“Like” us on Facebook: http://www.facebook.com/welearnindia p // /

“Follow” us on Twitter:http://twitter com/WeLearnIndiahttp://twitter.com/WeLearnIndia

Watch informative videos on Youtube: http://www.youtube.com/WelingkarDLP