Содержание
- 2. Security in the Real World Professionals must address: Specification/Policy Requirements, analysis, planning,… Implementation/mechanisms Algorithms, protocols, components,
- 3. Terms for Activities Related to E-Commerce Security Authentication Identification of a user for access Authorization Defining
- 4. Briefly: Security Policy You should define a security policy document for your site or application A
- 5. What’s Coming in this Unit?
- 6. Authentication Proving a user is who they say they are Methods? Passwords Digital signatures, digital certificates
- 7. Authorization We won’t say much about this Approaches include: Access control lists Capabilities Multi-level security systems
- 8. Non-Repudiation Non-repudiation of origin proves that data has been sent Non-repudiation of delivery proves it has
- 9. Digital Certificates “On the Internet, no one knows you’re a dog.” Or do they? For commerce,
- 10. SSL: Secure Socket Layer A network protocol layer between TCP and the application. Provides: Secure connection
- 12. Скачать презентацию