Prepared: Kurateva E.. According to the UN Committee on Crime Prevention and Control, computer crime has reached the level of one of the international.

Презентация:



Advertisements
Похожие презентации
«MODERN IT TRENDS IN THE PROFESSIONAL SPHERE». What is information? The word "information" is used in many different ways. Originally, it comes from a.
Advertisements

Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Copyright 2003 CCNA 4 Chapter 22 Developing Network Security and Network Management Strategies By Your Name.
Telecommunication and Networks Group Akhmedov Ilkhom.
WEB SERVICES Mr. P. VASANTH SENA. W EB SERVICES The world before Situation Problems Solutions Motiv. for Web Services Probs. with Curr. sols. Web Services.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Ensuring the Reliability of Data Delivery Understanding How UDP and TCP Work.
Internet Structure. 1. The Definition Internet, WAN, connect, networks, are built, by different principles Internet, WAN, connect, networks, are built,
Students: Veselkova DA 4th year student NIU "MGSU-IISS" IGES Galkin MV 4th year student NIU "MGSU-IISS" ISA Scientific adviser: Ph.D., Associate Professor.
GROUP 33-1 NAME : DIANA SURNAME : SHEVKETOVA Networks.
Copyright 2003 CCNA 4 Chapter 23 Virtual Private Networks By Your Name.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Building a Simple Serial Network Understanding the OSI Model.
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Cisco IOS Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Secured Connectivity Introducing IPsec.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 3 Cisco PIX Firewall Technology and Features.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Applying Security Policies to Network Switches.
Electronic Mail Security. Why Study Security? After web browsing, is the most widely used network-reliant application. Mail servers, after.
Copyright 2003 CCNA 4 Chapter 16 Introduction to Network Administration By Your Name.
Electronic TRIAL MASTER FILETAILORED FOR YOU. MANAGE HIGH VOLUME OF DOCUMENTS Online file sharing & versioning Automatic capture of Metadata Quality Control.
© 2006 Cisco Systems, Inc. All rights reserved.ONT v Implement the DiffServ QoS Model Implementing QoS Preclassify.
Транксрипт:

Prepared: Kurateva E.

According to the UN Committee on Crime Prevention and Control, computer crime has reached the level of one of the international problems. Therefore, it is extremely important to achieve an effective solution to the problems of securing commercial information in the global Internet and related Intranet networks, which in their technical essence are not fundamentally different and differ mainly in scale and openness.

There have been a number of committees on the Internet for a long time, mostly from volunteer organizations, who are cautiously pursuing proposed technologies through the standardization process. These committees, which form the main part of the Internet Engineering Task Force (IETF), have standardized several important protocols, accelerating their implementation on the Internet. The immediate results of the IETF effort include protocols such as the TCP / IP data transfer family, SMTP (Simple Mail Transport Protocol) and POP (Post Office Protocol) for , and Simple Network Management Protocol (SNMP) for network management.

SSL (Secure Socket Layer) is a popular network protocol with data encryption for secure transmission over the network. It allows you to establish a secure connection, monitor the integrity of data and solve various related tasks. The SSL protocol provides data protection between service protocols (such as HTTP, FTP, etc.) and transport protocols (TCP / IP) using modern cryptography. The SSL protocol is discussed in detail in Chapter 11.

The SET (Security Electronics Transaction) protocol is a promising standard for secure electronic transactions on the Internet, designed to organize electronic commerce via the Internet. The SET protocol is based on the use of d As mentioned earlier, the basic tasks of protecting information are to ensure its accessibility, confidentiality, integrity and legal relevance. SET, in contrast to other protocols, allows you to solve these tasks to protect information in general. igital certificates for the X.509 standard.

In particular, it provides the following special requirements for the protection of e-commerce transactions: confidentiality of payment data and confidentiality of order information transmitted along with data on payment; maintaining the integrity of payment data. Integrity of payment information is provided by means of a digital signature; special cryptography with a public key for authentication; credit card holder authentication. It is provided by the use of digital signature and cardholder certificates; authentication of the seller and his ability to accept payments on plastic cards using digital signature and certificates of the seller.