Please enable JavaScript.
Coggle requires JavaScript to display documents.
The E-commerce Environment (Internet connection channel (Secrecy threats…
The E-commerce Environment
Internet connection channel
Secrecy threats
is the prevention of unauthorized information disclosure
Sniffer programs
Backdoor
Integrity threats
Active wiretapping when an unauthorized party alters message information stream
Cyber vandalism
Masquerading (spoofing)
Phishing expeditions
Necessity threats
Delay, denial, and denial-of-service (DoS) attacks that disrupt or deny normal computer processing
physical threats
Internet’s packet-based network design precludes it from being shut down by attack on single communications link
destroy user's internet link
solutions
encryptions
Security policy Document
Written statement of assets to protect and why, who is responsible for protection and acceptable and unacceptable behaviors
Addresses physical and network security, access
authorizations, virus protection, disaster recovery
Once policy is written and approved resources are
committed to implement the policy.
Comprehensive security plan protects system’s privacy, integrity, availability and authenticates users
Selected to satisfy Secrecy, Integrity, Availablity, Key Management. Nonrepudiation, Authentication
Provides a minimum level of acceptable security
All security measures must work together to prevent
unauthorized disclosure, destruction, or modification
of assets