E C OMMERCE AND E LECTRONIC P AYMENTS ON THE I NTERNET.

Slides:



Advertisements
Similar presentations
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Advertisements

Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
E-Commerce Michael Andrianus – Vincentius
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
E-C OMMERCE S ECURITY Presented by SAGAR CHAKRABORTY.
 E-Commerce (electronic commerce) is the buying and selling of goods and services on the Internet.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Laudon & Laudon: Canadian Edition
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
CHAPTER-4 THE DIGITAL FIRM: E-COMMERCE AND E- BUSINESS.
Digital Signatures and Digital Certificates Monil Adhikari.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
E-commerce: Digital Markets, Digital Goods
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Ecommerce Application Development For Online Selling Via Web and Mobile Application Electronic commerce, commonly known as e-commerce, is a type of industry.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
10.1 © 2010 by Prentice Hall 3 Chapter E-Commerce: Digital Markets, Digital Goods.
Chapter 5 – E-commerce and Enterprise Systems
Date: March. 30, Monday Evening.
INTRODUCTION E-COMMERCE.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
BY GAWARE S.R. DEPT.OF COMP.SCI
What is Commerce According to Dictionary.com
E-Commerce Security.
12 E-Commerce Overview.
E-commerce Chapter 9 pp
Pooja programmer,cse department
Secure Electronic Transaction (SET) University of Windsor
ELECTRONIC PAYMENT SYSTEM.
Secure Electronic Transactions (SET)
Electronic Payment Security Technologies
Module 4 System and Application Security
ELECTRONIC COMMERCE. CONTEXT: Definition of E-Commerce. History of E-Commerce. Advantages and Disadvantages of E-Commerce. Types of E-Commerce. E-Commerce.
Presentation transcript:

E C OMMERCE AND E LECTRONIC P AYMENTS ON THE I NTERNET

2 eCommerce eCommerce: the use of the Internet and Web to transact business; digitally enabled transactions Began in 1995 and grew exponentially; still growing at an annual rate of 25 percent On the Internet, the barriers of time, distance, and form are broken down, and businesses are able to transact 24 hours a day, 7 days a week, 365 days a year with consumers all over the world

3 E C OMMERCE More than just buying and selling products online Includes the entire online process of developing, marketing, selling, delivering, servicing and paying for products and services eCommerce transactions are carried out on the internetworked global marketplaces (market spaces ) of customers

B ENEFITS OF E C OMMERCE The Internet is ubiquitous, accessible and low cost eCommerce can be accessed through diverse forms of technology, e.g. computers, PDAs, mobile phones, digital TV, kiosks Existing card payment systems can be adapted No geographical constraints Middlemen are eliminated from the supply chain Stock holdings can be minimised or eliminated through JIT manufacturing processes

5 C ATEGORIES OF E C OMMERCE Business-to-Consumer (B2C) – retailing products and services to individual shoppers Examples: Amazon, booksfirst.co.ke, mamamikes.com Business-to-Business (B2B) – sales of goods and services among businesses Examples: Dell Computers Consumer-to-Consumer (C2C) – online auctions where consumers can buy and sell with each other Example: Ebay.com, KenyaMall.com

6 E LECTRONIC P AYMENT P ROCESSES The most common payment medium used in ecommerce transactions is the Credit Card. Web Payment Processes Using electronic cash (eCash) to settle payments Mobile money transfer Payment through mobile money e.g. Mpesa or Zap

E C ASH P AYMENTS Also known as Digital Cash or eMoney. a medium of transaction a technology that uses varied electronic methods to execute financial transactions. is a monetary value stored electronically on a technical device that can be used as a mode of payment during transactions. eCash is an attempt to construct an electronic payment system modelled after the paper cash system. eCash is used over the Internet, , or personal computer to other workstations in the form of secured payments of "cash". It is backed by real currency from real banks.

E C ASH P AYMENTS The designers of electronic cash are trying to replicate the features of paper cash. Paper cash has such features as being: portable (easily carried), recognizable (as legal tender) hence readily acceptable, transferable (without involvement of the financial network), untraceable (no record of where money is spent), anonymous (no record of who spent the money) and has the ability to make "change."

E C ASH P AYMENTS There are two varieties of eMoney: online eMoney With online eMoney, one needs to interact with an intermediary such as a bank or card network to conduct a transaction with a third party. E.g. credit-card transactions offline eMoney One can conduct a transaction without having to directly involve an intermediary. This is true digital cash.

S ECURITY OF E LECTRONIC P AYMENTS The necessary security properties are: Privacy protection against eavesdropping. This is obviously of importance for transactions involving, e.g., credit card numbers sent on the Internet. Authentication protection against impersonation. Any scheme for electronic commerce must require that a user knows with whom he/she is dealing (if only as an alias or credit card number). Nonrepudiation or protection against later denial of a transaction. This necessitates such things as digital receipts and payments.

I NTERNET S ECURITY Data transmission over the Internet Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Individual packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. The Secure Socket Layer

For eCommerce transactions, these data packets need to be secured further. Digital signatures meet the need for authentication and integrity. A plain text message is run through a hash function and given a value referred to as the message digest. This digest, the hash function and the plain text is sent to the recipient. The recipient runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). To provide non-repudiation, the message is time-stamped.

The Public Key Infrastructure (PKI) is used to secure messages by encryption. It is a mathematical code in which each letter is changed to a different letter, number or symbol, creating a page of nonsense and preventing the message from being read even if it is intercepted. The message sent from the client’s computer (i.e. the digest, the hash function and the plain text) is encrypted with the recipient's public key.

The recipient uses a private key to decrypt the message sent from the client. Any changes in the message indicate a breach in security. The public key is widely distributed, but only the recipient has the private key. The sender and recipient use keys that are generated for the particular message by a third body: a key distribution centre.

A Certification Authority (CA) is a third party agency issues digital certificates to uniquely identify merchants. Examples of CAs: Verisign, Thawte Credit card networks use PKI for privacy, and digital certificates to authenticate the three parties involved in the transaction: merchant, customer and bank.

A typical eCommerce transaction proceeds as follows: the client sends a message to the server the server replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.