TAILIEUCHUNG - Lecture E-Commerce - Chapter 10: E-commerce technology solution, management policies and payment systems

In this chapter, the learning objectives are: Describe how various forms of encryption technology help protect the security of messages sent over the internet, identify the tools used to establish secure internet communications channels, identify the tools used to protect networks, servers, and clients, appreciate the importance of policies, procedures, and laws in creating security. | CSC 330 E-Commerce Teacher Ahmed Mumtaz Mustehsan GM-IT CIIT Islamabad Virtual Campus, CIIT COMSATS Institute of Information Technology T1-Lecture-10 . Mustehsan T1-Lecture-10 E Commerce Technology Solution, Management policies and Payment Systems Chapter-04 Part-II For Lecture Material/Slides Thanks to: Copyright © 2010 Pearson Education, Inc . Mustehsan Objectives Describe how various forms of encryption technology help protect the security of messages sent over the Internet. Identify the tools used to establish secure Internet communications channels. Identify the tools used to protect networks, servers, and clients. Appreciate the importance of policies, procedures, and laws in creating security. T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Tools Available to Achieve Site Security Figure , Page 287 T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Encryption Transforms data into cipher text readable only by sender and receiver Secures stored information and information transmission Provides 4 of 6 key dimensions of e-commerce security: Message integrity Nonrepudiation Authentication Confidentiality T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Dimensions of E-commerce Security T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Symmetric Key Encryption Sender and receiver use same digital key to encrypt and decrypt message Requires different set of keys for each transaction Strength of encryption Length of binary key used to encrypt data Advanced Encryption Standard (AES) Most widely used symmetric key encryption Uses 128-, 192-, and 256-bit encryption keys Other standards use keys with up to 2,048 bits T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Public Key Encryption Uses two mathematically related digital keys Public key (widely disseminated) Private key (kept

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.