SlideShare a Scribd company logo
E-Commerce Development
Mohammad Ashfaqur Rahman
ITIL-F, CPCISI, HP-CSA, NCDA, OCP-OSSA
ashfaq.saphal@gmail.com
 Introduction
 Threats and Attacks
 CIA Concept
 Securing the components
 Operating System
 Application Server
 Database
 Application
 Preventive Measures
 The protection of information and its critical
elements, including systems and hardware that
use, store, and transmit that information
 Information Security is also known as Cyber
Security
● Old Caesar Cipher
● Invoked immediately after the first mainframes
were developed
● Code-breaking computations during World War II
● WikiLeaks, Anonymous, Lulzsec
– Bangladesh Cyber Army
– Bangladesh Black Hat Hackers
● Hacking
● Hacker
● White Hat
● Black Hat
● Gray Hat
● HackTivist
● Compromise
● Cyber Law
Malware :
viruses, spyware,
ransomware, etc
Social
Engineering
Password
Attack
Man-in-the-
middle attack
Denial-of-service
attack
SQL injection
Cross-site
scripting
reconnaissance
scanning
gaining
access
marinating
access
covering
track
Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) development
Confidentiality
!
Disclosure
Integrity
!
Alternation
Availability
!
Destruction
Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) development
 Introduction
 Threats and Attacks
 CIA Concept
 Securing the components
 Operating System
 Application Server
 Database
 Application
 Preventive Measures
• User disable
• Password Expire
User Management
• FTP, TELNET, Mail
• NFS/RPC/SAMBA
Disable Service
• X11 interface
Remove S/W
• Antivirus/Default Firewall
• IPTables
OS Firewall
• Schema Management
• Grant Minimal Access
Unauthorized access
• Default port
• Improper Procedure
SQL injection
• High cost query
Overloads
• DBA privilege
Data corruption and/or
loss
• Encryption
Disclosure from Backup
create profile developer_profile
limit
session_per_user 2
cpu_per_session 10000
idle_time 60
connect_time 480
failed_login_attemps 3
password_life_time 30
password_reuse_time 30
password_grace_time 5;
• Apache HTTPD
• Apache TomCat
Apache
• Oracle Application Server
• WebLogic
Oracle
• IBM WebSphere
• IBM HTTP Server
IBM
• Jboss
• GlashFish
Others
• Reduce Module
• Third Party CMS/Code
Installation
• Invalid
SSL
• Version
• Default Password
Web-Press
• Sensitive Information
File Listing
● Apache
– httpd.conf
ServerSignature Off
ServerTokens Prod
Options -indexes
# mod_imap # mod_include
# mod_info
# mod_userdir # mod_autoindex
User
Group
Options -FollowSymLinks
Options -ExecCGI
Secure SSL certificate
● Ensure network firewall
● Deny all
● Traffic Pattern
● Reverse Proxy
● Share Certification
● Single Sign On
● URL Redirection
https://services.nidw.gov.bd/
https://magna-hungaria.co.uk/_wpeprivate/
https://www.iitk.ac.in/aero/akg/index.php?page=/etc/passwd%00
gray-world.net/etc/passwd/
Cyber Security For E-commerce (Infrastructure) development

More Related Content

PPTX
Network security
PDF
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PDF
4. Mitigating a Cyber Attack
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
PDF
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
PPTX
network security
PPTX
Cyber security
Network security
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
4. Mitigating a Cyber Attack
01 Application Security Fundamentals - part 1 - introduction and goals
Cybersecurity Five Facts in Five Minutes - IOD - London - 20161129
network security
Cyber security

What's hot (20)

PPTX
Konica Arora
PPTX
Types of Cyber-Attacks
PPTX
Cybersecurity service provider
PPTX
What is network security and Types
PDF
Presentation on Network Security
PPTX
Attack lecture #2 ppt
PPTX
Security
PPTX
Cyber attack
PPT
What are various types of cyber attacks
PDF
8 Types of Cyber Attacks That Can Bother CISOs in 2020
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PDF
Securign siem for small business
PDF
DRC -- Cybersecurity concepts2015
PPT
Mule anypoint enterprise security
PPT
Anypoint enterprise security
PPTX
Types of attacks
PDF
Network Security - Defense Through Layered Information Security
PPTX
Protection from hacking attacks
PPTX
Network Security
PPTX
Web appsec and it’s 10 best SDLC practices
Konica Arora
Types of Cyber-Attacks
Cybersecurity service provider
What is network security and Types
Presentation on Network Security
Attack lecture #2 ppt
Security
Cyber attack
What are various types of cyber attacks
8 Types of Cyber Attacks That Can Bother CISOs in 2020
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Securign siem for small business
DRC -- Cybersecurity concepts2015
Mule anypoint enterprise security
Anypoint enterprise security
Types of attacks
Network Security - Defense Through Layered Information Security
Protection from hacking attacks
Network Security
Web appsec and it’s 10 best SDLC practices
Ad

Similar to Cyber Security For E-commerce (Infrastructure) development (20)

PPTX
Website Security
PPTX
Web Application Security Session for Web Developers
PPTX
Security Threats which security threat is any potential danger that can explo...
PPT
E-Commerce Security
PPTX
Network security and firewalls
PPT
ec-160905073212 (1).ppthttps://youtu.be/JepLZh_dMeY?si=aAWl7Fi7l0qJJFv4
PDF
user Computer Security in ecommerce.pdf
PPT
Chapter three e-security
PDF
Web Security
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
PPTX
PDF
Information Security
PPTX
Cyber security
PPTX
Ecommerce security
PPTX
Cyber security
DOCX
E commerce security 4
PDF
E security and payment 2013-1
PDF
Securing and Managing the Oracle HTTP Server - White Paper
Website Security
Web Application Security Session for Web Developers
Security Threats which security threat is any potential danger that can explo...
E-Commerce Security
Network security and firewalls
ec-160905073212 (1).ppthttps://youtu.be/JepLZh_dMeY?si=aAWl7Fi7l0qJJFv4
user Computer Security in ecommerce.pdf
Chapter three e-security
Web Security
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
Information Security
Cyber security
Ecommerce security
Cyber security
E commerce security 4
E security and payment 2013-1
Securing and Managing the Oracle HTTP Server - White Paper
Ad

More from Mohammad Ashfaqur Rahman (20)

PDF
Cyber Security Considerations for 4IR in Bangladesh
PPTX
Cyber Awareness : Perspective Bangladesh & Covid-19
PPT
Cyber Security Awareness - file 1 of 2
PPT
Cyber Security Awareness - file 2 of 2
PPT
009.itsecurity bcp v1
PPT
008.itsecurity bcp v1
PPT
007.itsecurity bcp v1
PPT
006.itsecurity bcp v1
PPT
005.itsecurity bcp v1
PPT
002.itsecurity bcp v1
PPT
001.itsecurity bcp v1
PPT
000.itsecurity bcp v1
PDF
Business Continuty Planning and Disester Recovry Planning
PPT
013.safetymanagement v3
DOC
013.safetymanagement v3
PPT
012.safetymanagement v3
DOC
012.safetymanagement v3
PPT
011.safetymanagement v3
DOC
011.safetymanagement v3
PPT
010.safetymanagement v3
Cyber Security Considerations for 4IR in Bangladesh
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Security Awareness - file 1 of 2
Cyber Security Awareness - file 2 of 2
009.itsecurity bcp v1
008.itsecurity bcp v1
007.itsecurity bcp v1
006.itsecurity bcp v1
005.itsecurity bcp v1
002.itsecurity bcp v1
001.itsecurity bcp v1
000.itsecurity bcp v1
Business Continuty Planning and Disester Recovry Planning
013.safetymanagement v3
013.safetymanagement v3
012.safetymanagement v3
012.safetymanagement v3
011.safetymanagement v3
011.safetymanagement v3
010.safetymanagement v3

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing

Cyber Security For E-commerce (Infrastructure) development