E business ict security
Download
1 / 22

E-Business / ICT Security - PowerPoint PPT Presentation


  • 127 Views
  • Uploaded on

E-Business / ICT Security. Borek BOISSY System, Network & Security Engineer. 02 / 22. E-Business / ICT Security. 3 – ICT Security Risks Protections. 2 – E-Business B C G E links Front, Middle, Back. 1 – Introduction Definitions. 03 / 22. Introduction.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' E-Business / ICT Security' - damisi


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
E business ict security

E-Business /ICT Security

Borek BOISSY

System, Network & Security Engineer


E business ict security1

02 / 22

E-Business /ICT Security

3 – ICT Security

Risks

Protections

2 – E-Business

B C G E links

Front, Middle, Back

1 – Introduction

Definitions


Introduction

03 / 22

Introduction

  • Information & Communication Technologies

    • Networks

    • Terminals

      • Computers

      • Phones

      • Pads

    • Broadcasting

    • Etc.


Introduction1

04 / 22

Introduction

  • Whatis ICT security ?

Confidentiality

Art of hiding

Encryption

Integrity

Unalterable data

Protect a content

Availability

Accesslevel

Avoid D.O.S.


Introduction2

05 / 22

Introduction

  • Whatis E-Business ?

    • ICT tools for business activities

    • Securedtools :

      • Confidentiality

      • Authenticity

      • Integrity

      • Availability


E business

06 / 22

E-Business


E business1

07 / 22

E-Business

  • Categories links

B2C

Business

Customer

G2B

G2C

B2E

Employee

Government


E business2

08 / 22

E-Business

  • E-Business implementation :

    • Online shopping : B2C

    • Online auction : C2C

    • Intranet : B2E


Ict security

09 / 22

ICT Security


Ict threats

10 / 22

ICT Threats

  • Equipment destruction

    • Access control

    • Natural disasters protection

    • Robbery


Ict threats1

11 / 22

ICT Threats

  • Social engineering

    • Gathering and using datas

    • Hostile situation

    • Familiarity exploit

    • Get a job there


Ict threats2

12 / 22

ICT Threats

  • Network attacks

    • Sniffing

    • Denial Of Service

    • Spoofing


Ict threats3

13 / 22

ICT Threats

  • Password cracking

    • Dictionary

    • Brute force

    • Social engineering


Ict threats4

14 / 22

ICT Threats

  • Malwares

    • Virus

    • Worms

    • Trojan

    • Keylogger


Ict threats5

15 / 22

ICT Threats

  • Email exploits

    • Spam

    • Phishing

    • Hoax


Ict protections

16 / 22

ICT Protections

  • Business Continuity Planning

    • Recovery Point Objective

    • Recovery Time Objective

    • Maximum TolerablePeriod of Disruption

    • Threats and RisksAnalysis

      • Terrorism

      • Sabotage (external or internal)

      • War

      • Theft


Ict protections1

17 / 22

ICT Protections

  • Passwordpolicies

    • Complexityreinforcement

    • Reducevalidity time

    • One Time Passwords


Ict protections2

18 / 22

ICT Protections

  • Availabilitymeasurement


Ict protections3

19 / 22

ICT Protections

  • Symmetric key encryption

What'syour pin code ?

  • ROT13

  • DES

  • TDEA

  • AES

Jung'flbhecvapbqr ?


Ict protections4

20 / 22

ICT Protections

  • Asymmetriccryptography

Martin Hellman

Secret

  • RSA

  • DSA

  • GnuPG

  • PGP

Private Key

Public Key

WhitfieldDiffie


Ict protections5

21 / 22

ICT Protections

  • Redundancy

QUERY


Questions

22 / 22

Questions


ad