e commerce security
DESCRIPTION
E-Commerce SecurityTRANSCRIPT
![Page 1: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/1.jpg)
E-Commerce Security
Seyyed Mojtaba Mousavi
E-Commerce Student
Noore Touba Virtual University
8861084
![Page 2: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/2.jpg)
E-Commerce Security
Chapter I
![Page 3: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/3.jpg)
Threats - Risk
Vulnerability
Information Security Chapter I
![Page 4: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/4.jpg)
Security Policy Chapter I
![Page 5: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/5.jpg)
Security Services
Authentication
Data Confidentiality
Authorization
Non-repudiation
Data Integrity
Security Services
Chapter I
![Page 6: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/6.jpg)
Security Services
Authentication
Excuse me : You ?
Chapter I
![Page 7: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/7.jpg)
Security Services
Authorization
You Can just see the lectures and Nothing Else
Chapter I
![Page 8: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/8.jpg)
Security Services
Data Confidentiality
Chapter I
![Page 9: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/9.jpg)
Security Services
Data Integrity
Chapter I
![Page 10: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/10.jpg)
Security Services
Non-Repudation
Chapter I
![Page 11: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/11.jpg)
E-Commerce Security
Chapter II
![Page 12: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/12.jpg)
Security Services
Cryptography
Chapter II
![Page 13: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/13.jpg)
Security Services
Symmetric Method
Chapter II
![Page 14: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/14.jpg)
Security Services
Symmetric Method
Sync Stream Mode
Stream CipherBlock Cipher
Chapter II
![Page 15: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/15.jpg)
Security Services
NKey Generator
Self-Sync Stream Mode
Symmetric Method
Stream CipherBlock Cipher
Chapter II
![Page 16: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/16.jpg)
Security Services
Symmetric Method
Stream CipherBlock Cipher
DES Algorithm
Chapter II
![Page 17: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/17.jpg)
Security Services
AES Algorithm
Symmetric Method
Stream CipherBlock Cipher
Chapter II
![Page 18: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/18.jpg)
Security Services
Symmetric Method Vulnerabilities
Chapter II
![Page 19: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/19.jpg)
Security Services
Symmetric Method Vulnerabilities
Chapter II
![Page 20: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/20.jpg)
Security Services
A-Symmetric Method
Chapter II
![Page 21: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/21.jpg)
Security Services
A-Symmetric Algorithm
Chapter II
![Page 22: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/22.jpg)
E-Commerce Security
Chapter III
![Page 23: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/23.jpg)
Data Integrity & Authentication
Data Integrity & Authentication
Chapter III
![Page 24: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/24.jpg)
Data Integrity & Authentication
Data Integrity & Authentication
Hash Function
Chapter III
![Page 25: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/25.jpg)
Data Integrity & Authentication
Data Integrity & Authentication
Chapter III
Hash Function
Message Authentication Code
Useful for Authentication
![Page 26: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/26.jpg)
Data Integrity & Authentication
Data Integrity & Authentication
Chapter III
Hash Function
Secure Hash Standard
Useful for Data Integrity
![Page 27: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/27.jpg)
Data Integrity & Authentication
Access Control Mechanism
Chapter III
Identity-Base
You Can use just from this resource
OK . Thanks
![Page 28: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/28.jpg)
Data Integrity & Authentication
Access Control Mechanism
Chapter III
Rule-BaseYou Can use just from this resource And You Can just view and print the
documents
OHHHH
How Strict
![Page 29: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/29.jpg)
E-Commerce Security
Chapter IV
![Page 30: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/30.jpg)
Public Key Infrastructure
Public Key Infrastructure
Chapter IV
![Page 31: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/31.jpg)
Public Key Infrastructure
Public Key Infrastructure
Chapter IV
![Page 32: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/32.jpg)
Public Key Infrastructure
Public Key Infrastructure
Chapter IV
Digital Certificate
![Page 33: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/33.jpg)
Public Key Infrastructure
Public Key Infrastructure
Chapter IV
Public Key & Private Key
![Page 34: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/34.jpg)
Public Key Infrastructure
Public Key Infrastructure
Chapter IV
PKI Components
![Page 35: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/35.jpg)
E-Commerce Security
Chapter V
![Page 36: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/36.jpg)
Electronic Payment Systems
Electronic Payment Systems
Chapter V
![Page 37: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/37.jpg)
Electronic Payment Systems
Electronic Payment Systems
Chapter V
Electronic Payment Systems methods
![Page 38: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/38.jpg)
Electronic Payment Systems
Electronic Payment Systems
Chapter V
Payment types
Debit CardCredit Card
![Page 39: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/39.jpg)
Electronic Payment Systems
Electronic Payment Systems
Chapter V
Payment types
Electronic chque
![Page 40: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/40.jpg)
Electronic Payment Systems
Electronic Payment Systems
Chapter V
Payment types
Electronic Cash
![Page 41: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/41.jpg)
Electronic Payment Systems
Electronic Payment Systems
Chapter V
Electronic Wallet
![Page 42: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/42.jpg)
E-Commerce Security
Chapter VII
![Page 43: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/43.jpg)
Security Payment Transaction
Security Payment Transaction
Chapter VII
![Page 44: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/44.jpg)
Security Payment Transaction
Security Payment Transaction
Chapter VII
User Anonymity
![Page 45: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/45.jpg)
Security Payment Transaction
Security Payment Transaction
Chapter VII
Location Anonymity
![Page 46: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/46.jpg)
Security Payment Transaction
Security Payment Transaction
Chapter VII
ChaUm’s mixes
![Page 47: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/47.jpg)
Security Payment Transaction
Security Payment Transaction
Chapter VII
Dual Signature
![Page 48: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/48.jpg)
Security Payment Transaction
Security Payment Transaction
Chapter VII
Electronic Payment Framework
![Page 49: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/49.jpg)
Security Payment Transaction
Security Payment Transaction
Chapter VII
Electronic Payment Framework
![Page 50: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/50.jpg)
E-Commerce Security
Chapter IIX
![Page 51: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/51.jpg)
Communication Security
Communication Security
Chapter IIX
![Page 52: E commerce security](https://reader036.vdocuments.net/reader036/viewer/2022081404/559928d11a28ab45298b46dd/html5/thumbnails/52.jpg)
Communication Security
Communication Security
Chapter IIX
Malicious Programs
Bacteria
Logical Bomb
Trojan