You are on page 1of 2

Information security activities that protect info systems data procedures

EC securitymanagement product IN

Terminology
Business continuity plan keeps thebusiness runningafter a disaster
Cybercrime
criminal
Cyber
Exposure UnintentionalThreats
Fraud HumanError
Malware Environmental Hazards
Phishing Malfunctions in the computer system
Risk
social engineering
Spam
Venerability
computers underthe control
Zombie of a hacker
EC Security Requirements
Authentication whatyou do
Authorisation who you are
Auditing websitequeries
Availability
Nonrepudiation stopsusers denyingCfasely theirpurchaseetc

Technical Malware Attack Methods


Virus spreads andfor damages
Worm can replicate itself devices
many
Trojan Horse looks harmless
Cryptolocker ransomware trojan
bug
Dos Attack flooding
Botnet like a mean proxy
Malvertising internet advertising

Nontechnical methods
socialengineeringand fraud
phishing
idtheft
id fraud

DefendingInformationSystems and E Commerce


Access control encryption and PKI
in e commerce networks
Security
General controls spam popups SE

Encryption Plaintext Ciphertext encryption algorithm key keyspace

encrypt and decrypt


Symmetrickey Encryption same
key to in plaintext
Public two keys public and private Cowner
keyencryption key
also digital signatures CA's

Security in e Commerce
Firewalls
VPN's
IntrusionDetection System IDs

controls

Physical controls
Administrative Controls
Protecting Against Spam
ProtectingAgainst Phishing
Protecting Against Malvertising
ProtectingAgainst spyware

You might also like