220 likes | 403 Views
E-Business / ICT Security. Borek BOISSY System, Network & Security Engineer. 02 / 22. E-Business / ICT Security. 3 – ICT Security Risks Protections. 2 – E-Business B C G E links Front, Middle, Back. 1 – Introduction Definitions. 03 / 22. Introduction.
E N D
E-Business /ICT Security Borek BOISSY System, Network & Security Engineer
02 / 22 E-Business /ICT Security 3 – ICT Security Risks Protections 2 – E-Business B C G E links Front, Middle, Back 1 – Introduction Definitions
03 / 22 Introduction • Information & Communication Technologies • Networks • Terminals • Computers • Phones • Pads • Broadcasting • Etc.
04 / 22 Introduction • Whatis ICT security ? Confidentiality Art of hiding Encryption Integrity Unalterable data Protect a content Availability Accesslevel Avoid D.O.S.
05 / 22 Introduction • Whatis E-Business ? • ICT tools for business activities • Securedtools : • Confidentiality • Authenticity • Integrity • Availability
06 / 22 E-Business
07 / 22 E-Business • Categories links B2C Business Customer G2B G2C B2E Employee Government
08 / 22 E-Business • E-Business implementation : • Online shopping : B2C • Online auction : C2C • Intranet : B2E
09 / 22 ICT Security
10 / 22 ICT Threats • Equipment destruction • Access control • Natural disasters protection • Robbery
11 / 22 ICT Threats • Social engineering • Gathering and using datas • Hostile situation • Familiarity exploit • Get a job there
12 / 22 ICT Threats • Network attacks • Sniffing • Denial Of Service • Spoofing
13 / 22 ICT Threats • Password cracking • Dictionary • Brute force • Social engineering
14 / 22 ICT Threats • Malwares • Virus • Worms • Trojan • Keylogger
15 / 22 ICT Threats • Email exploits • Spam • Phishing • Hoax
16 / 22 ICT Protections • Business Continuity Planning • Recovery Point Objective • Recovery Time Objective • Maximum TolerablePeriod of Disruption • Threats and RisksAnalysis • Terrorism • Sabotage (external or internal) • War • Theft
17 / 22 ICT Protections • Passwordpolicies • Complexityreinforcement • Reducevalidity time • One Time Passwords
18 / 22 ICT Protections • Availabilitymeasurement
19 / 22 ICT Protections • Symmetric key encryption What'syour pin code ? • ROT13 • DES • TDEA • AES Jung'flbhecvapbqr ?
20 / 22 ICT Protections • Asymmetriccryptography Martin Hellman Secret • RSA • DSA • GnuPG • PGP Private Key Public Key WhitfieldDiffie
21 / 22 ICT Protections • Redundancy QUERY
22 / 22 Questions