Professional Documents
Culture Documents
PAYMENT SYSTEMS
BY PUTERI SYAHEERA BINTI JAAFAR
ATIQAH AQILAH BINTI AHMAD MUFIT
NURUL AMIERA SYUHADA BINTI
RAZALI
ENCRYPTION
The process of transforming plain text or data into cipher text that cannot be read by
anyone other than the sender and the receiver
b)
Digital Signature
A close parallel to
handwritten signature
d)
d) Digital
Digital Envelopes
Envelopes
A
A technique
technique that
that uses
uses symmetric
symmetric encryption
encryption for
for large
large documents,but
documents,but public
public key
key
encrypt
encrypt and
and send
send the
the symmetric
symmetric key
key
e)
e) Digital
Digital Certificates
Certificates and
and Public
Public Key
Key Infrastructure
Infrastructure (PKI)
(PKI)
Digital Certificate
PKI
computer of
the merchant is secure
CAs are self-selected organizations seeking
to gain
access to the business of authorization
PGP
Session Key
A unique symmetric encryption key
chosen just for this single secure
session
Virtual Private
Networks (VPNs)
* Allows remote users to securely
access a corporations local area
network via the Internet,using a
variety of VPN protocols
* Use authentication and encryption
to secure information from
unauthorized persons
* Reduces the cost of secure
communications
PROTECTING NETWORKS
1. Firewalls
Refer to either hardware or software that filters
communication packets and prevents some
packets from entering the network based on a
security policy
Controls traffic to and from servers and clients
Forbidding communication from untrustworthy
sources
Allowing other communications from trusted
sources to proceed
Can filter traffic based on packet attributes
Packet filters
Application
gateways
2. Proxy Servers
Software server that handles all communications originating
from or being sent to the Internet
Called dual-home systems because they have two network
interfaces
To internal computers known as the gateway
To external computers known as a mail server or numeric
address
Instrusion prevention
system (IPS)
Has all the functionality of an
IDS,with the additional ability to
take steps to prevent and block
suspicious activities
4.3
4.4
- TECHNOLOGY SOLUTIONS
MANAGEMENT POLICIES,
BUSINESS
PROCEDURES, AND PUBLIC LAWS
-
QUESTIONS
1. List 4 key dimension of e-commerce security
2. Explain what is firewall in protecting network ?
3. List out the steps of developing an ecommerce
security plan.
ANSWERS
1.
.
.
.
.