e business ict security n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
E-Business / ICT Security PowerPoint Presentation
Download Presentation
E-Business / ICT Security

Loading in 2 Seconds...

play fullscreen
1 / 22

E-Business / ICT Security - PowerPoint PPT Presentation


  • 144 Views
  • Uploaded on

E-Business / ICT Security. Borek BOISSY System, Network & Security Engineer. 02 / 22. E-Business / ICT Security. 3 – ICT Security Risks Protections. 2 – E-Business B C G E links Front, Middle, Back. 1 – Introduction Definitions. 03 / 22. Introduction.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

E-Business / ICT Security


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. E-Business /ICT Security Borek BOISSY System, Network & Security Engineer

    2. 02 / 22 E-Business /ICT Security 3 – ICT Security Risks Protections 2 – E-Business B C G E links Front, Middle, Back 1 – Introduction Definitions

    3. 03 / 22 Introduction • Information & Communication Technologies • Networks • Terminals • Computers • Phones • Pads • Broadcasting • Etc.

    4. 04 / 22 Introduction • Whatis ICT security ? Confidentiality Art of hiding Encryption Integrity Unalterable data Protect a content Availability Accesslevel Avoid D.O.S.

    5. 05 / 22 Introduction • Whatis E-Business ? • ICT tools for business activities • Securedtools : • Confidentiality • Authenticity • Integrity • Availability

    6. 06 / 22 E-Business

    7. 07 / 22 E-Business • Categories links B2C Business Customer G2B G2C B2E Employee Government

    8. 08 / 22 E-Business • E-Business implementation : • Online shopping : B2C • Online auction : C2C • Intranet : B2E

    9. 09 / 22 ICT Security

    10. 10 / 22 ICT Threats • Equipment destruction • Access control • Natural disasters protection • Robbery

    11. 11 / 22 ICT Threats • Social engineering • Gathering and using datas • Hostile situation • Familiarity exploit • Get a job there

    12. 12 / 22 ICT Threats • Network attacks • Sniffing • Denial Of Service • Spoofing

    13. 13 / 22 ICT Threats • Password cracking • Dictionary • Brute force • Social engineering

    14. 14 / 22 ICT Threats • Malwares • Virus • Worms • Trojan • Keylogger

    15. 15 / 22 ICT Threats • Email exploits • Spam • Phishing • Hoax

    16. 16 / 22 ICT Protections • Business Continuity Planning • Recovery Point Objective • Recovery Time Objective • Maximum TolerablePeriod of Disruption • Threats and RisksAnalysis • Terrorism • Sabotage (external or internal) • War • Theft

    17. 17 / 22 ICT Protections • Passwordpolicies • Complexityreinforcement • Reducevalidity time • One Time Passwords

    18. 18 / 22 ICT Protections • Availabilitymeasurement

    19. 19 / 22 ICT Protections • Symmetric key encryption What'syour pin code ? • ROT13 • DES • TDEA • AES Jung'flbhecvapbqr ?

    20. 20 / 22 ICT Protections • Asymmetriccryptography Martin Hellman Secret • RSA • DSA • GnuPG • PGP Private Key Public Key WhitfieldDiffie

    21. 21 / 22 ICT Protections • Redundancy QUERY

    22. 22 / 22 Questions