e business ict security
Download
Skip this Video
Download Presentation
E-Business / ICT Security

Loading in 2 Seconds...

play fullscreen
1 / 22

E-Business / ICT Security - PowerPoint PPT Presentation


  • 127 Views
  • Uploaded on

E-Business / ICT Security. Borek BOISSY System, Network & Security Engineer. 02 / 22. E-Business / ICT Security. 3 – ICT Security Risks Protections. 2 – E-Business B C G E links Front, Middle, Back. 1 – Introduction Definitions. 03 / 22. Introduction.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' E-Business / ICT Security' - damisi


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
e business ict security

E-Business /ICT Security

Borek BOISSY

System, Network & Security Engineer

e business ict security1

02 / 22

E-Business /ICT Security

3 – ICT Security

Risks

Protections

2 – E-Business

B C G E links

Front, Middle, Back

1 – Introduction

Definitions

introduction

03 / 22

Introduction
  • Information & Communication Technologies
    • Networks
    • Terminals
      • Computers
      • Phones
      • Pads
    • Broadcasting
    • Etc.
introduction1

04 / 22

Introduction
  • Whatis ICT security ?

Confidentiality

Art of hiding

Encryption

Integrity

Unalterable data

Protect a content

Availability

Accesslevel

Avoid D.O.S.

introduction2

05 / 22

Introduction
  • Whatis E-Business ?
    • ICT tools for business activities
    • Securedtools :
      • Confidentiality
      • Authenticity
      • Integrity
      • Availability
e business1

07 / 22

E-Business
  • Categories links

B2C

Business

Customer

G2B

G2C

B2E

Employee

Government

e business2

08 / 22

E-Business
  • E-Business implementation :
    • Online shopping : B2C
    • Online auction : C2C
    • Intranet : B2E
ict threats

10 / 22

ICT Threats
  • Equipment destruction
    • Access control
    • Natural disasters protection
    • Robbery
ict threats1

11 / 22

ICT Threats
  • Social engineering
    • Gathering and using datas
    • Hostile situation
    • Familiarity exploit
    • Get a job there
ict threats2

12 / 22

ICT Threats
  • Network attacks
    • Sniffing
    • Denial Of Service
    • Spoofing
ict threats3

13 / 22

ICT Threats
  • Password cracking
    • Dictionary
    • Brute force
    • Social engineering
ict threats4

14 / 22

ICT Threats
  • Malwares
    • Virus
    • Worms
    • Trojan
    • Keylogger
ict threats5

15 / 22

ICT Threats
  • Email exploits
    • Spam
    • Phishing
    • Hoax
ict protections

16 / 22

ICT Protections
  • Business Continuity Planning
    • Recovery Point Objective
    • Recovery Time Objective
    • Maximum TolerablePeriod of Disruption
    • Threats and RisksAnalysis
        • Terrorism
        • Sabotage (external or internal)
        • War
        • Theft
ict protections1

17 / 22

ICT Protections
  • Passwordpolicies
    • Complexityreinforcement
    • Reducevalidity time
    • One Time Passwords
ict protections2

18 / 22

ICT Protections
  • Availabilitymeasurement
ict protections3

19 / 22

ICT Protections
  • Symmetric key encryption

What\'syour pin code ?

  • ROT13
  • DES
  • TDEA
  • AES

Jung\'flbhecvapbqr ?

ict protections4

20 / 22

ICT Protections
  • Asymmetriccryptography

Martin Hellman

Secret

  • RSA
  • DSA
  • GnuPG
  • PGP

Private Key

Public Key

WhitfieldDiffie

ict protections5

21 / 22

ICT Protections
  • Redundancy

QUERY

ad