You are on page 1of 3

Prepared by:

GROUP 6
Magbanua, Jamaica
Landicho, Patricia
Mora, Justin Jared
Llegue, Jana
Mercado, Jorge Amiel
Reporter: Jorge Amiel Mercado

SECRET KEY

ENCRYPTION
In private key encryption, data is
encrypted using a single same key that
only the sender and receiver know. That
is why private key encryption is also
called Symmetric key Encryption, because
the same key is used during both the
encryption and decryption of the data.

EXAMPLE of SECRET
KEY ENCRYPTION

2 METHODS OF SYMMETRIC ENCRYPTION

Stream mode means each Block mode ciphers


STREAM MODE bit is independently BLOCK MODE encrypt blocks of data
CIPHER encrypted in a CIPHER each round.
“stream”.

SOME NOTABLE BLOCK CIPHERS INCLUDE:

DES (Data Encryption Standard)


Triple DES
IDEA (International Data Encryption Algorithm)
RC5 (Rivest Cipher 5)
AES (Advanced Encryption Standard)
Blowfish

Reporter: Jana LLegue and Justin Jared Mora

IMPLEMENTATION AND MANAGEMENT ISSUES


Here are some common secret-key encryption implementation issues:

Weak Key Generation


If the secret key is not generated securely, it may be weak and vulnerable to attack. For example, if the key is
generated using a predictable algorithm, it could be easily guessed by an attacker.

Poor Key Management


The secret key must be carefully managed to ensure that it remains confidential. If the key is compromised,
an attacker could use it to decrypt all data encrypted with that key.
Insecure encryption algorithms
Not all encryption algorithms are created equal. Some algorithms are more secure than others, and some
have known weaknesses. It is important to choose a secure encryption algorithm for your needs.

Implementation errors
Even if the secret key is generated securely and managed properly, implementation errors can still introduce
vulnerabilities. For example, if the encryption algorithm is not implemented correctly, it may be possible for an
attacker to exploit this weakness to decrypt data

Management Issues of Secret-key Encryption


The “security by obscurity” includes hiding the details of encryption methods to
make them more difficult for threat actors to decipher, although it frequently relies on
using poor cryptography.
A crucial element of the security of cryptographic systems is the encryption keys,
which need to be carefully guarded.

Heterogeneitic Governance Availability

Complexity Security

Consequences of Poor Management


Data breaches Increased likelihood of data Failure to meet compliance Unusable or Compromised
breach or loss audit requirements unmaintainable encryption key
encryption system

Reporter: Jamaica Magbanua

WORLD WIDE WEB and SECURITY

The World Wide Web is a system for exchanging information over the Internet. The Web
is constructed from specially written programs called Web servers that make
information available on the network. Other programs, called Web browsers , can be
used to access the information that is stored in the servers and to display it on the
user's screen.
Request for Request for
web page web page

Internet
Web page Web page
HTML file HTML file

Web browser Web server


(Client)
A few common web security methods include:

Two-factor Use a virtual private


authentication (2FA) network (VPN)
SECURITY
Strong passwords Training to detect
protect corporate data and the phishing
environment from malware. Even with
Technology used in Web Security
the best cybersecurity infrastructure in
Web Application Firewall
place, organizations can implement Fuzzing tools
(WAF)
common, simple strategies to stop
threats. Vulnerability scanners Black box testing tools

Password-cracking tools White box testing tools


E C TRONI C
Reporter: Patricia Landicho
E L PAYMENT SYSTEM
Electronic payments allow customers to pay for goods and services electronically. This is
without the use of checks or cash. Normally e-payment is done via debit cards, credit cards
or direct bank deposits. But there are also other alternative payment methods such as e-
wallets and cryptocurrencies.

HOW DOES ELECTRONIC PAYMENT


SYSTEM WORK?
MERCHANT’S THE CARD CREDIT UNION BANK
BANK NETWORK

TYPES OF
ELECTRONIC PAYMENT SYSTEM
Digital cash
Systems that generate a private form of currency that can be spent at e-commerce sites

Online stored value systems


Systems that rely on prepayments, debit cards, or checking accounts to create value in an account that can be used
for e-commerce -> shopping

Digital cash
Systems that generate a private form of currency that can be spent at e-commerce sites

Digital credit accounts


Systems that extend the online functionality of existing credit card payment systems

Digital checking
Systems that create digital checks for e-commerce remittances and extend the
functionality of existing bank checking systems

REFERENCES
What is web security? - definition, importance & more: Proofpoint us. Proofpoint. (2023, September 19). https://www.proofpoint.com/us/threat-reference/web-security

Spafford, S. G. & G. (1999, February 4). Practical Unix & Internet Security. документация - unix.org.ua. https://docstore.mik.ua/orelly/networking/puis/ch18_01.htm

YouTube. (2018). YouTube. Retrieved September 22, 2023, from https://www.youtube.com/watch?v=2ytjZCtnwWg.

Junior, E. G. (n.d.). Unveiling the unprotected: Assessing the impact of unencrypted files. LinkedIn. https://www.linkedin.com/pulse/unveiling-unprotected-assessing-impact-unencrypted-guilherme-junior

Tobias, E. (2022, February 22). 5 common key management challenges (part 1 of 6). Ubiq. https://www.ubiqsecurity.com/5-common-key-management-challenges/
York, M. (2015, September 4). Electronic payment systems. ppt video online download. https://slideplayer.com/amp/6398076/

(2017). YouTube. Retrieved September 22, 2023, from https://youtu.be/vk3py9M2IfE?si=BHzsLE_-qEIT0GnR.

Symmetric Encryption. Symmetric Encryption - an overview | ScienceDirect Topics. (n.d.).https://www.sciencedirect.com/topics/computer-science/symmetric


encryption#:~:text=Symmetric%20encryption%20uses%20a%20single,kept%20secret%20from%20third%20parties

You might also like