In this chapter, the learning objectives are: Describe how various forms of encryption technology help protect the security of messages sent over the internet, identify the tools used to establish secure internet communications channels, identify the tools used to protect networks, servers, and clients, appreciate the importance of policies, procedures, and laws in creating security. | CSC 330 E-Commerce Teacher Ahmed Mumtaz Mustehsan GM-IT CIIT Islamabad Virtual Campus, CIIT COMSATS Institute of Information Technology T1-Lecture-10 . Mustehsan T1-Lecture-10 E Commerce Technology Solution, Management policies and Payment Systems Chapter-04 Part-II For Lecture Material/Slides Thanks to: Copyright © 2010 Pearson Education, Inc . Mustehsan Objectives Describe how various forms of encryption technology help protect the security of messages sent over the Internet. Identify the tools used to establish secure Internet communications channels. Identify the tools used to protect networks, servers, and clients. Appreciate the importance of policies, procedures, and laws in creating security. T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Tools Available to Achieve Site Security Figure , Page 287 T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Encryption Transforms data into cipher text readable only by sender and receiver Secures stored information and information transmission Provides 4 of 6 key dimensions of e-commerce security: Message integrity Nonrepudiation Authentication Confidentiality T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Dimensions of E-commerce Security T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Symmetric Key Encryption Sender and receiver use same digital key to encrypt and decrypt message Requires different set of keys for each transaction Strength of encryption Length of binary key used to encrypt data Advanced Encryption Standard (AES) Most widely used symmetric key encryption Uses 128-, 192-, and 256-bit encryption keys Other standards use keys with up to 2,048 bits T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Public Key Encryption Uses two mathematically related digital keys Public key (widely disseminated) Private key (kept | CSC 330 E-Commerce Teacher Ahmed Mumtaz Mustehsan GM-IT CIIT Islamabad Virtual Campus, CIIT COMSATS Institute of Information Technology T1-Lecture-10 . Mustehsan T1-Lecture-10 E Commerce Technology Solution, Management policies and Payment Systems Chapter-04 Part-II For Lecture Material/Slides Thanks to: Copyright © 2010 Pearson Education, Inc . Mustehsan Objectives Describe how various forms of encryption technology help protect the security of messages sent over the Internet. Identify the tools used to establish secure Internet communications channels. Identify the tools used to protect networks, servers, and clients. Appreciate the importance of policies, procedures, and laws in creating security. T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Tools Available to Achieve Site Security Figure , Page 287 T1-Lecture-9 Ahmed Mumtaz Mustehsan Copyright © 2010 Pearson Education, Inc 1- Encryption Transforms data into cipher text