E- Commerce transactions And Shopping Cart

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

CP3397 ECommerce.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Cryptography and Network Security
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Warm-up: April 11 What’s the difference between a checking and savings account?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Electronic Transaction Security (E-Commerce)
Microsoft Passport Waldemar Swiercz.
Chapter 8 Web Security.
Credit Card And Prepaid Process Edward M. Kwang President.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Traditional and Electronic Payment Methods Chapter 3.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Secure Electronic Transaction (SET)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Traditional and Electronic Payment Methods Chapter 3.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Electronic Money Lincoln Stein Whitehead Institute/MIT Center for Genome Research.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
On-Line BankCard Center Presentation Cardholder Role During the Presentation click the mouse on this button to move back a slide During the Presentation.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
April 20023CSG11 Electronic Commerce Payment systems John Wordsworth Department of Computer Science The University of Reading
Setting and Upload Products
Security, Social and Legal Issues Regarding Software and Internet
SSL Certificates for Secure Websites
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Secure Sockets Layer (SSL)
Chapter 8 Building the Transaction Database
Parts.cat.com Client training 2016.
BY GAWARE S.R. DEPT.OF COMP.SCI
12 E-Commerce Overview.
Information Security Session October 24, 2005
Shopping experience! Is it safe to pay online? Ian Ramsey
Cryptography and Network Security
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Secure Electronic Transaction (SET) University of Windsor
Installation & User Guide
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

E- Commerce transactions And Shopping Cart ERDEM OZDEN INBS 510 ANNA STORY APRIL 16, 2002

Online Credit Card Fraud Stats Global online purchases will reach $310 billion in 2005. Online credit card fraud will cost $9 billion in 2001. Widespread use of anti-fraud technology will reduce online payment fraud to $5.7 billion by 2005, from a potential $15.5 billion. Fraud was 19 times higher online, than with brick and mortar stores in 2001. Source: Meridien Research

How Consumers View Authentication 47% are now comfortable with registering on web sites by providing personal information. 80% said they would be open to additional authentication measures to make online purchases more secure. 50% said they would be open to using a personal identification number (PIN). 32% said they would be willing to type in a portable password created by a credit card company. 42% said they are “annoyed” at having to remember different passwords for different sites. Source: Jupiter Media Metrix

SHOPPING CYCLE Online Store: The merchant sets up an online store. Bank Account: The merchant registers with a bank to authorize transactions. Product Selection: Customers browse products by product category, or by text search. Shopping Cart: Customers view and change the contents of their shopping cart. Customer Registration: Registration is needed when customers make a purchase. Check Out: The customer may verify or change items, and then proceed with their purchase. Credit Card Authorization: The customer submits credit card information for authorization. Order Processing: After credit card authorization, the merchant sends the product.

Online Credit Card Transaction 1. Customer Proceeds to Check out. Shopping Cart 2. Shipping, tax added for total amount. Calculate Totals 3. Customer’s address, telephone information. Get User Info 5. If the CC is Declined Get New CC. 4. Customer’s credit card information. Enter Credit Card Information No 5. If the CC is Authorized Process Order. Enough Funds Card Refused Yes Failed Card Authorized E-mail Customer E-mail Customer Online Credit Card Transaction

SHOPPING SERVICES One-click Buy : CC data is stored in database, and used for instant purchases. Personalization : Some merchants offer personalized services like special offers, and recommendations, for registered customers. Order Tracking : The customers monitor order status by using the order ID. Save your cart : Customers save their cart and complete the transaction at a later date. E-mail Verification : The customers receive emails about news, special events, recommendations, and the recent order.

SHOPPING CARTS Keep the process simple. Include tax and shipping costs to display the exact charges. Tell customers how many steps are involved. Add gift option before the checkout. Put policy information in pop-up windows. Don’t force registration. Customers lose patience fast. Offer multiple shipping options. Limit the checkout process with five to six steps.

Personalization Homepage Yes No Retrieve Preferences Cookie? User Selects New Or Returning User User Selects New User User Selects Returning User Database User Enters ID Password Cookie Set Return Homepage User Enters User Information Create Personal Page Database No Register User Exists? Yes Cookie Set Return Homepage Personalization

1. Cardholder calls Issuer CHARGE-BACK CARDHOLDER 1. Cardholder calls Issuer Bank for fraud. 4. Issuer Bank gives cardholder’s credit. 2. Issuer Bank calls Acquirer Bank. ISSUER BANK 3. Acquirer Bank debits merchant account. Additional penalty, or cancels agreement. ACQUIRER BANK Merchant Account

FRAUD Lower consumer confidence. Higher cost of transactions and loss of revenue for merchants. Higher costs of services for financial institutions. Image damage to the credit card companies and issuers. “Charge-back fraud has slowed the growth of e-commerce…Nothing is going to happen until credit card companies can positively authenticate every consumer buying from a website.” Theodore Lacobuizo, Senior Analyst, TowerGroup

SECURITY THREAT Employee Theft: Employee steals data. This is the largest threat. Trojan Horse: Can be used for snooping. Frequently used in a virus attack. Hacking : Breaking into a system. Trojan horses used for returning to server. Social Engineering: Hackers act like a network engineer. Buffer Overflow: Cause an overflow condition. May grant root access. Cracking: Breaking into system to steal things. Password Fishing: Trying to log in with common passwords. Snooping: Use of a software program to intercept data. Application Attack: Force application to fall-over, and root access to system. Employee Theft: Employee steals data. This is the largest threat, as usually organizations don’t focus on employee theft. This is the most difficult problem for the organizations. Help desk operators, and system administrators have access to personal data, which makes it too hard to implement a security policy. Hacking : Breaking into a system. Frequently, Trojan horses or other programs are left lying around so the hacker can return to the server using some other method. Social Engineering: Hackers act like a network engineer, and ask for a password. This is the largest problem. Reverse Engineering: Victim calls the hacker for help. When computer is disabled, a new sign appears saying to call a telephone number for IT help. Employee calls hacker for help. Cracking: Breaking into system to steal things. Password Fishing: Trying to log into a system by attempting common passwords. Snooping: Use of a software program to intercept data. Application Attack: Force application to fall-over and acquire ‘root’ access to system. Trojan Horse: Can be used for snooping. Typically a program that diverts information or has some additional functions. Frequently used in a virus attack.

Secure Electronic Transaction (SET) Development of Visa and MasterCard. Certificate-based system. Digital signatures to replace the handwritten signatures. Cardholder software is required. Digital certificates are installed on consumer’s PC. Expensive. Complex structure. Because of its complexity, and cost, SET usage was limited.

Secure Sockets Layer (SSL) Created by Netscape. Simple to implement. Implemented in Transport Layer (TLS). Supports most of the browsers and Web servers. Widely used in Web transactions. Uses digital certificates.

Secure Sockets Layer (SSL) BROWSER 1. Browser sends SSL request massage. SERVER 2. Server responds by sending it’s certificate. 3. Browser verifies that the certificate is valid. 4. Browser sends one time session key. 5. Server decrypts the massage with it’s private key. 6. Source exchanges with symmetric encryption.

Web Server Certificates The certificate, which contains the Web server’s public key, will be used by the browser to: Authenticate the identity of a Web site. Contain the Web server’s public key. Encrypt information for the server using SSL. Certification Authority (CA) Certificates CA Certificates are issued by a trusted third party called a Certification Authority (CA). CA validates the certificate holders’ identity.

Visa Payer Authentication Service (VPAS) New payer authentication service from VISA. Based on a protocol known as 3-D Secure. Announced in 2001. “3-D” refers to the three domains Issuers Acquirers Transaction Communication

How VPAS Works Cardholder Merchant Card Association Directory Merchant 1. Cardholder selects ’buy’. 2. Merchant queries Visa for account data. Cardholder Merchant 3. Visa checks CAD for customer data. Card Association Directory Merchant Requests Authorization Issuer Access Control Server 5. Merchant verifies signature, and sends authorization request. 4. Issuer ACS validates password, digitally signs response, transmits copy to Authentication History Server

MasterCard Secure Payment Application (SPA) MasterCard’s security solution. It requires participation by the card issuer and the merchant. Cardholder has to download a wallet application from the issuer. Deployment of SPA will be through server-based electronic wallets. Wallet will automatically fill out payment information on the online order form. Includes a unique cardholder authentication value for each transaction. Scheduled to the second quarter of 2002.

Address Verification Service (AVS) Designed for mail-order and telephone order environments. Checks first 4 numeric digits of address and zip code. Merchant receives response codes, detailing degree of match. AVS does not guarantee charge-back protection. Data used is not always current. Only used in U.S., U.K., Germany, Austria and Switzerland. May result in false rejection of valid orders.