Securing method for E-Commerce:
Electronic medium through all transactions will happen, so ensure that electronic medium is safer for transactions is important.
Business-Businesses connection and security:
Business-Consumer security :
Business-Consumer is a transaction happens between consumer and company. In this type of transaction TLS encryption is used.
Transport Layer Security:(TLS):
Public Key/Private key:
How In Bank transactions, public and private key created:
For example :
Complaince:
Data-at-rest is a important to encrypt the identity.
Data- at-rest:
Electronic medium through all transactions will happen, so ensure that electronic medium is safer for transactions is important.
Business-Businesses connection and security:
- For this business process both the company are connected with dedicated circuits.
- And this circuit ensures that QOS (Quality of service ) with the Internet speed of 45 Mbps link.
- Service providers or carriers ensures that data transmit through optical network like OC48.
Business-Consumer is a transaction happens between consumer and company. In this type of transaction TLS encryption is used.
Transport Layer Security:(TLS):
- TLS encryption is used to ensure the transactions are secure. TLS uses public key cryptology. Encryption and decryption used in source and destination addresses.
- TLS used primary public key encryption.
- If anything sending from source address encrypted by public key only decrypted by private key in destination end.
- If you send anything from source end encrypted by private key only decrypted by public key.
How In Bank transactions, public and private key created:
- Bank uses third party company to create a certificate for authentication using bank domain.
- When transaction initiated bank receives a new public key like a notary stamp, good for three years, certificate is fully encrypted.
- Sam - >TLS port->Sam connects to xxx bank using TLS.
- Xxx bank send certificate of public key to Sam.
- Verification sign public key is used by third party send to Sam and encrypts key and send to bank TLS protocol. Sam sends a symmetric key to bank TLS protocol.
- TLS is used by self certification and replaced by SSL.
Data-at-rest is a important to encrypt the identity.
Data- at-rest:
- In each organisation they will give priority to data at transit that in production network. And their second priority always will be data at rest, so data at rest will lack of security.
- For Hackers data at rest is more attractive to them.
- This type of attack mostly the victim will be government office personnel system.
Hills Station view :
ReplyDeleteIf you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest
Email: cybergoldenhacker at gmail dot com