Friday, September 20, 2019

Cyber Security Securing E-Commerce

Securing method for E-Commerce:

Electronic medium through all transactions will happen, so ensure that electronic medium is safer for transactions is important. 

Business-Businesses connection and security:

  • For this business process both the company are connected with dedicated circuits.
  • And this circuit ensures that QOS (Quality of service )  with the Internet speed of 45 Mbps link.
  • Service providers or carriers ensures that data transmit through optical network like OC48. 

Business-Consumer security :
Business-Consumer is a transaction happens between consumer and company. In this type of transaction TLS encryption is used. 

Transport Layer Security:(TLS):

  • TLS encryption is used to ensure the transactions are secure. TLS uses public key cryptology. Encryption and decryption used in source and destination addresses.
  • TLS used primary public key encryption. 

Public Key/Private key:
  • If anything sending from source address encrypted by public key only decrypted by private key in destination end. 
  • If you send anything from source end encrypted by private key only decrypted by public key. 

How In Bank transactions, public and private key created:

  • Bank uses third party company to create a certificate for authentication using bank domain. 
  •  When transaction initiated bank receives a new public key like a notary stamp, good for three years, certificate is fully encrypted. 

For example :
  • Sam - >TLS port->Sam connects to xxx bank using TLS. 
  • Xxx bank send certificate of public key to Sam. 
  • Verification sign public key is used by third party send to Sam and encrypts key and send to bank TLS protocol. Sam sends a symmetric key to bank TLS protocol.
  • TLS is used by self certification and replaced by SSL. 

Complaince:
Data-at-rest is a important to encrypt the identity. 

Data- at-rest:

  • In each organisation they will give priority to data at transit that in production network. And their second priority always will be data at rest, so data at rest will lack of security.
  • For Hackers data at rest is more attractive to them. 
  • This type of attack mostly the victim will be government office personnel system. 
To protect from this type of attack data at rest needs to be encrypted.

Hills Station view :



Blog for securing you from modern threats from hackers:

1 comment:

felisha green said...


If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

Email: cybergoldenhacker at gmail dot com

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....