If you can't read please download the document
Upload
mmousavi
View
1.667
Download
2
Embed Size (px)
Citation preview
E-Commerce Security
E-Commerce SecuritySeyyed Mojtaba MousaviE-Commerce StudentNoore Touba Virtual University8861084
E-Commerce Security
Chapter I
Threats - Risk
Vulnerability Information Security Chapter I
Security Policy
Chapter I
Security ServicesAuthenticationData ConfidentialityAuthorizationNon-repudiationData IntegritySecurity ServicesChapter I
Security ServicesAuthenticationExcuse me : You ?
Chapter I
Security ServicesAuthorizationYou Can just see the lectures and Nothing Else Chapter I
Security ServicesData Confidentiality
Chapter I
Security Services Data Integrity
Chapter I
Security Services
Non-RepudationChapter I
E-Commerce Security
Chapter II
Security ServicesCryptography
Chapter II
Security Services Symmetric Method
Chapter II
Security Services Symmetric MethodSync Stream Mode
Key Auto Key
Stream CipherBlock Cipher
Chapter II
Security Services N Key Generator Self-Sync Stream Mode
Cipher Text Auto KeySymmetric Method
Stream CipherBlock Cipher
Chapter II
Security ServicesSymmetric Method
Stream CipherBlock Cipher
DES Algorithm
16 56
Chapter II
Security ServicesAES AlgorithmSymmetric Method
Stream CipherBlock Cipher
128 192 256 Chapter II
Security ServicesSymmetric Method Vulnerabilities
Chapter II
Security ServicesSymmetric Method Vulnerabilities
Chapter II
Security ServicesA-Symmetric Method
Chapter II
Security ServicesA-Symmetric Algorithm
Chapter II
E-Commerce Security
Chapter III
Data Integrity & AuthenticationData Integrity & Authentication
Chapter III
Data Integrity & AuthenticationData Integrity & AuthenticationHash Function
Chapter III
Data Integrity & AuthenticationData Integrity & AuthenticationChapter IIIHash FunctionMessage Authentication Code
Useful for Authentication
Data Integrity & AuthenticationData Integrity & AuthenticationChapter IIIHash FunctionSecure Hash Standard
Useful for Data Integrity
Data Integrity & AuthenticationAccess Control MechanismChapter IIIIdentity-Base
You Can use just from this resource
OK . Thanks
Data Integrity & AuthenticationAccess Control MechanismChapter IIIRule-Base
You Can use just from this resource And You Can just view and print the documents
OHHHHHow Strict
E-Commerce Security
Chapter IV
Public Key InfrastructurePublic Key InfrastructureChapter IV
Public Key InfrastructurePublic Key InfrastructureChapter IV
Public Key InfrastructurePublic Key InfrastructureChapter IV
Digital Certificate
Public Key InfrastructurePublic Key InfrastructureChapter IVPublic Key & Private Key
Public Key InfrastructurePublic Key InfrastructureChapter IVPKI Components
E-Commerce Security
Chapter V
Electronic Payment SystemsElectronic Payment SystemsChapter V
Electronic Payment SystemsElectronic Payment SystemsChapter VElectronic Payment Systems methods
Electronic Payment SystemsElectronic Payment SystemsChapter VPayment types
Debit CardCredit Card
Electronic Payment SystemsElectronic Payment SystemsChapter VPayment types
Electronic chque
Electronic Payment SystemsElectronic Payment SystemsChapter VPayment typesElectronic Cash
Electronic Payment SystemsElectronic Payment SystemsChapter VElectronic Wallet
E-Commerce Security
Chapter VII
Security Payment TransactionSecurity Payment TransactionChapter VII
Security Payment TransactionSecurity Payment TransactionChapter VII
User Anonymity
Security Payment TransactionSecurity Payment TransactionChapter VIILocation Anonymity
Security Payment TransactionSecurity Payment TransactionChapter VIIChaUms mixes
Security Payment TransactionSecurity Payment TransactionChapter VII
Dual Signature
Security Payment TransactionSecurity Payment TransactionChapter VIIElectronic Payment Framework
Security Payment TransactionSecurity Payment TransactionChapter VIIElectronic Payment Framework
E-Commerce Security
Chapter IIX
Communication SecurityCommunication SecurityChapter IIX
Communication SecurityCommunication SecurityChapter IIXMalicious Programs
Bacteria
Logical Bomb
Trojan