Unit v Security and Encryption
Unit v Security and Encryption
UNIT-V
Security and Encryption
Definition: -
Ecommerce security is a set of protocols that safely guide ecommerce transactions. Stringent
security requirements must be in place to protect companies from threats like credit card fraud, or they
risk jeopardizing revenue and customer trust, due to the inability to guarantee safe credit card processing.
Ease of use: The more security measures that are added to an e-commerce site, the
more difficult it is to use and the slower the site becomes, hampering ease of use.
Security is purchased at the price of slowing down processors and adding
significantly to data storage demands. Too much security can harm profitability,
while not enough can potentially put a company out of business.
- Malicious code
- Unwanted programs (adware, spyware, etc.)
- Phishing
- Hacking and cyber-vandalism
- Spoofing(Pharming) and Spam(Junk) websites
- Denial of Service attacks
- Sniffing
- Insider jobs
- Poorly designed server and client software
1. Malicious code: Includes a variety of threats such as viruses, worms, Trojan
horses, and “bad applets” . virus is a computer program that has the ability to
replicate or make copies of itself, and spread to other files. worm is designed to
spread from computer to computer. Trojan horse appears to be benign, but then
does something other than expected.
9. Poorly designed server and client software: The increase in complexity and
size of software programs has contributed to an increase in software flaws or
vulnerabilities that hackers can exploit weaknesses.
Technology Solutions
1. Protecting Internet communications (Encryption)
2. Securing channels of communication (SSL, S-HTTP, VPNs)
3. Protecting networks (Firewalls & Proxy Servers)
4. Protecting servers and clients (Operating system & Anti-Virus Software)
Symmetric key encryption (secret key encryption) the sender and the
receiver use the same key to encrypt and decrypt the message. Data Encryption
Standard (DES) is the most widely used symmetric key encryption, developed by
the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key.
Public Key Encryption using Digital Signatures, Hash Digests and Digital envelops
• Digital signature is a “signed” cipher text that can be sent over the
Internet.
• Hash function uses an algorithm that produces a fixed-length number
called a hash or message digest.
• Digital envelop is a technique that uses symmetric encryption for large
documents, but public key encryption to encrypt and send the symmetric
key.
Digital Envelops:
• Addresses weaknesses of public key encryption (computationally
slow, decreases transmission speed, increases processing time) and
symmetric key encryption (faster, but more secure).
• Uses symmetric key encryption to encrypt document but public key
encryption to encrypt and send symmetric key
lOMoARcPSD|28245750