Identify the main security aspects in the below categories:
1- Need to protect confidentially of data.
Its mean that information should only be seen by those people who are authorized to see it.
Encryption is ICT technique used that confidentiality of data in online systems.
Ordinary data is converted into a secret code and it requires a secret key to decrypt it.
Copyright © 2014 by Mohammed AL-Qubtan
2- Shop security.
User and payment data are encrypted when they are transferred using the Internet.
They are Two types of Key:
1- Public Key: Its a key used to sent massages to everybody.
2- Private Key: Its a key given to an individual person to decryt the encrypted massage sent to him by the Public key.
3- Online Banking.
1- Transaction numbers ( TANs ) : Passwords which are used once.
2- The bank asks the uses to type some parts of his password, so the hacker cannot get the whole password.
3- Providing the customer with a handheld chip and PIN device which generate single-use passwords.
Copyright © 2014 by Mohammed AL-Qubtan
4- Online shopping.
1- Use the Encryption techniques.
2- Use the (Https) secure prefix to their URL to ensure to the customers that they are using a secure online store.
3- Using the Protocols: SSL and TLS in encrypting a massage between a client computer and a server.
References: Apllied ICT book
Copyright © 2014 by Mohammed AL-Qubtan
1- Need to protect confidentially of data.
Its mean that information should only be seen by those people who are authorized to see it.
Encryption is ICT technique used that confidentiality of data in online systems.
Ordinary data is converted into a secret code and it requires a secret key to decrypt it.
Copyright © 2014 by Mohammed AL-Qubtan
2- Shop security.
User and payment data are encrypted when they are transferred using the Internet.
They are Two types of Key:
1- Public Key: Its a key used to sent massages to everybody.
2- Private Key: Its a key given to an individual person to decryt the encrypted massage sent to him by the Public key.
3- Online Banking.
1- Transaction numbers ( TANs ) : Passwords which are used once.
2- The bank asks the uses to type some parts of his password, so the hacker cannot get the whole password.
3- Providing the customer with a handheld chip and PIN device which generate single-use passwords.
Copyright © 2014 by Mohammed AL-Qubtan
4- Online shopping.
1- Use the Encryption techniques.
2- Use the (Https) secure prefix to their URL to ensure to the customers that they are using a secure online store.
3- Using the Protocols: SSL and TLS in encrypting a massage between a client computer and a server.
References: Apllied ICT book
Copyright © 2014 by Mohammed AL-Qubtan
No comments:
Post a Comment