Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Chap. 10 E-commerce Security by Mind Map: Chap. 10 E-commerce Security
5.0 stars - 2 reviews range from 0 to 5

Chap. 10 E-commerce Security

Key Definitions

Computer Security

Threat

Eavesdropper

Cracker/Hacker

White hat hacker

Black hat hacker

Man-in-the-middle exploit

Stateless Connection

Cookie

Session cookies

Persistent cookies

1st party cookies

3rd party cookies

Trojan Horse

Zombie

Java Sandbox

Certification authority

Online Security Issues

Managing Risk

Computer Security Class- ifications

Security Policy and Integrated Security

Types of Security

Physical Security

Logical Security

Security for Client Computers

Cookies

Web Bugs

Active Content

Java Applets

Java Script

Active X control

Graphics and Plug-ins

Viruses, Worms, and Anti- virus software

Digital Certificates

Communication Channel Security

The internet was not designed to be secure, it was truely designed to provide redundancy one or more communication lines were cut. Today, the internet remains relatively uncha- nged from its original state. Therefore, any message being transfered over the internet is subject to threats.

Key Definitions con'd

Key

Steganography

Biometric security device

Privacy

Sniffer programs

Cybervaldalism

Masquerading

Encryption

Session Key

Digital Signature

Trusted

Packet-filter firewall

Proxy server firewall

Personal firewall

Encryption Solutions

Encryption Algorithms

Hash Coding

Asymmetric Encryption

Symmetric Encryption

Secure Sockets Layer Protocol

Security for Server computers

Web server threats

Database threats

Firewalls