收藏 分销(赏)

informationsecurity.pptx

上传人:可**** 文档编号:1685332 上传时间:2024-05-07 格式:PPTX 页数:34 大小:1.66MB
下载 相关 举报
informationsecurity.pptx_第1页
第1页 / 共34页
informationsecurity.pptx_第2页
第2页 / 共34页
informationsecurity.pptx_第3页
第3页 / 共34页
informationsecurity.pptx_第4页
第4页 / 共34页
informationsecurity.pptx_第5页
第5页 / 共34页
点击查看更多>>
资源描述

1、InformationsecurityforE-commerceWSCOursecuritycompanyistrustedbythousandsofresidential,businessandmajorpublicsectorcustomersincludinghospitals,schoolsandpolice.Wehavemodernandeffectiveelectronicsecuritysystems,basedonthelatesttechnology,withthemostreliable,comprehensivemonitoringfacilities,allbacked

2、byourspecialistserviceteam.Asasecuritycompanyourfocusisaverypersonalunderstandingyourneeds,advisingandrecommendationinstallingeverythingwithminimaldisruptiontoyourhomeoryourbusinessandprovidingthehighest-qualitymaintenance,supportandassistance.3.Threats for E-commerce4.Attack defensesOUTLINE1.Backgr

3、ound of security2.What is information securityBackgroundofsecurityWorldWarIIbroughtaboutmanyadvancementsininformationsecurityandmarkedthebeginningoftheprofessionalfieldofinformationsecurity.About seventy years ago,fewpeoplehadaccesstoacomputersystemornetwork,companiesdidnotconductbusinessacrosstheIn

4、ternet.Informationsecuritymeasures:ComputerswerekeptinlockedcentralroomsAccesswasgrantedonlytoselectindividualsNoonecouldremotelyaccessthemachine Now,personalcomputersareubiquitous.Millionsofpeopleperformonlinetransactioneveryday.CompaniesrelyontheInternettooperateandconductbusiness.Moderninformatio

5、nsecuritymeasures:RemoteprocessingElectronictransmissionofinformationWidespreaduseoftheInternetWhat is information securityIngenerally,informationsecurityistheprotectionofassetsfromunauthorizedaccess,use,alteration,ordestruction.Itprotectsbusinessinformationoncomputer.Effectiveinformationsecuritysys

6、temsincorporatearangeofpolicies,securityproducts,technologiesandprocedures.Softwareapplicationswhichprovidefirewallinformationsecurityandvirusscannersarenotenoughontheirowntoprotectinformation.Therearetwotypesofsecurity:Physical securityincludingsuchdevicesasalarms,fireproofdoors,securityfences.Logi

7、cal securityconsistsofsoftwaresafeguardsforanorganizationssystems,includinguseridentificationandpasswordaccess,authentication,accessrightsandauthoritylevels.Threat for E-commerceThreatanalysisE-commercesecurityisbeginningwiththeconsumerandendingwiththecommerceserver.Thisanalysisproducesathreepartstr

8、ucture:ClientCommunicationchannelServerThreatsMaliciousSoftwareAttacksCommunicationchannelServerVirusesWormsTrojan horsesLogic bombsBotnetsMaliciousSoftwareVirusesAcodethatinsertedinthecomputerprogramtodamageordestroythecomputerdataandfunctionFile-infecting virusInfectsexecutablefiles(.com,.exe,.drv

9、,.dll)Spreadthroughe-mailandfiletransferScript virusesWritteninscriptinglanguages(VBScript,JavaScript)Activatedbyclickinga.vbsor.jsfileWormsVirusesareoftencombinedwithaworm.Awormisdesignedtospreadfromcomputertocomputerratherthanfromfiletofile.Awormdoesnotnecessarilyneedtobeactivatedbyauserorprogramf

10、orittoreplicate.TrojanhorseATrojan horseisaprogramhiddeninsideanotherprogramorWebpagethatmasksitstruepurpose.LogicBombsApieceofcodethatsitsdormantforaperiodoftimeuntilsomeeventinvokesitsmaliciouspayloadOfteninstalledbyauthorizedusersBotnetsHackerscreatearmiesofmachinesbyinstallingmalwareagentsonthem

11、achines,andcontrolledinlargenetworks,calledbotnets.Usedtoconductotherattacks,spreadspamandothermalwareCDoSTCP/IP HijackingMan-in-the-Middle AttackAttacksDenial-of-service attacksAdenial-of-service attack(DoS attack)isanattempttomakeacomputerresourceunavailabletoitsintendedusers.ItpreventanInternetsi

12、teorservicefromfunctioningefficientlyoratall,temporarilyorindefinitely.Lead to a server overloadMake the targete servers to reset,or consuming its resourcesZombieMan-in-the-middleAttacksIsaformofactiveeavesdroppinginwhichtheattackermakesindependentconnectionswiththevictimsandrelaysmessagesbetweenthe

13、m,makingthembelievethattheyaretalkingdirectlytoeachotheroveraprivateconnection,wheninfacttheentireconversationiscontrolledbytheattacker.ExampleTCP/IPHijackingAsecurityattackonausersessionoveraprotectednetwork.-BecometheMan-in-the-middle.-Whattheattackerneedtodoisfirsttoimpersonatethelegitimateclient

14、andthendisconnectthelegitimateclient.-Iftheattackerhijackingthesessionoftheadministrator,hethendoesnotrequireanyauthenticationinformationtodowhathewantstodo.Attacks defenseMalwaredefensesMalwareinallformvirus,worm,spyware,botnetandsooncanbedefendedagainstinacoupleofsimplesteps:Use an antivirus progr

15、am Keep your software up to dateDenial-of-serviceattacksDefenseTopreventaDDoSattack,wemusteitherbeabletointerceptorblocktheattackmessagesorkeeptheDDoSnetworkfrombeingestablishinginthefirstplace.AfinaloptionweshouldconsiderthatwilladdressseveralformsofDoSandDDoSattacksistoblockICMPpacketsatborder,sin

16、cemanyattackersrelyonICMP.CiphersystemsCryptosystemsaredigital;thealgorithmsarebasedontheindividualbitsofamessageratherthanlettersofthealphabet.Computerinformationisstoredasbinarystrings,sequencesof0sand1s.Encryptionanddecryptionkeysarebinarystringsofagivenkeylength.TypesofcryptosystemsTherearetwoma

17、intypesofcryptosystems:Private-key cryptographyAlsoknownassymmetric or secret-keyencryption,itusesasinglekeytobothencryptanddecipherthemessage.Public-key cryptographyAlsoknownasasymmetricencryption,itusesapublickeytoencryptmessagesandaprivatekeytodeciphermessages.Public-keycryptographyPublic-keycryp

18、tographyusestworelatedkeys.Theprivate keyiskeptsecretbyitsowner.Thepublic keyisfreelydistributed.WhensomeonewishestocommunicatewithAlicetheyuseAlicespublickeytoencodetheirmessage.Alicethenusesherprivatekeytodecodethemessage.Private-keycryptographySupposethatAlicewishestosendBobamessage:Theyexchangeasecretkey.Aliceencodesthemessageusingthesecretkey.TheciphertextissenttotheBob.Bobdecodesthemessageusingthesecretkey.ConclusionThankyou!

展开阅读全文
相似文档                                   自信AI助手自信AI助手
猜你喜欢                                   自信AI导航自信AI导航
搜索标签

当前位置:首页 > 包罗万象 > 大杂烩

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        获赠5币

©2010-2024 宁波自信网络信息技术有限公司  版权所有

客服电话:4008-655-100  投诉/维权电话:4009-655-100

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :gzh.png    weibo.png    LOFTER.png 

客服