Information Security 11.2 Web &EC Security Chapter 17 復大软件学院
1 Information Security 11.2 Web & EC Security Chapter 17
Review Cryptography Authentication techniques PKI 復大软件学院
2 Review • Cryptography • Authentication techniques • PKI
Review Cryptography Authentication techniques PKI 系统安全 应用安全 网络安全 安全协议 安全的密码算法 復大软件学院
3 Review • Cryptography • Authentication techniques • PKI 安全的密码算法 安全协议 系统安全 应用安全 网络安全
Review · Security services Confidentiality Integrity Authentication Non-repudiation Availability 復大软件学院
4 Review • Confidentiality • Integrity • Authentication • Non-repudiation • Availability • Security services
Outline Web EC Security Considerations Definitions; web, EC threats Secure Socket Layer(ssL) and Transport Layer Security (TLs) Secure Electronic Transaction (SET) 復大软件学院
5 Outline • Web & EC Security Considerations – Definitions: web, EC – threats • Secure Socket Layer (SSL) and Transport Layer Security (TLS) • Secure Electronic Transaction (SET)