Developing an e-commerce site

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Supporting Technologies III: Security 11/16 Lecture Notes.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Being Ecommerce Sophon Thanasrivilai #100485
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Chapter 7: E-Commerce Security and Payment system
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Electronic Commerce Semester 1 Term 1 Lecture 14.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
The Secure Sockets Layer (SSL) Protocol
TOPIC: HTTPS (Security protocol)
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Web Development & Design Foundations with HTML5 8th Edition
BY GAWARE S.R. DEPT.OF COMP.SCI
E-Commerce Security.
Chapter 9 e-Commerce Systems McGraw-Hill/Irwin
12 E-Commerce Overview.
Cryptography and Network Security
Secure Electronic Transaction (SET) University of Windsor
Unit 8 Network Security.
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

Developing an e-commerce site www.AssignmentPoint.com

E-commerce Electronic commerce, commonly known as e-commerce or e-Commerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet www.AssignmentPoint.com

Ecommerce Management System Inventory Management Systems Profile Management systems Ordering Management Systems Shipping Management System Reporting Systems www.AssignmentPoint.com

Debeloping an ecommerce site Defining a site: Defining a site the first step of developing an ecommerce site is defining a site. That mean we have to define site name and vision, mission and product type and others. We select our product catalog is boos, sports, electronics, gift item, DVDs CDs, toys. Now we define our site name is Haat Bazar.com. Planning a site: The second step is planning site. In this part we make plan about our site. That mean make a plan about site content, menu, navigation, and other usable option that make our site attractive and valuable www.AssignmentPoint.com

Debeloping an ecommerce site Building a site : In the third step we have to build up our site as well as following our planning. We can take help from web master to build up our site. To build up site the main thing is navigation we have to maintain well navigation. Publishing and promoting a site: After Complete build our site we have to publish it. To publish our web site we have to host it in server. We can follow manage hosting and unmanaged hosting. After polish our site we have to promote it. We need to follow proper marketing activities to promote our site. We publish advertise both in online and satellite www.AssignmentPoint.com

Debeloping an ecommerce site Monitoring your site : After publish and promote our site next step is monitor our site. We have to monitor customer satisfaction. We have to identify customer need. Redefining, planning, and rebuilding : After monitoring our site if we identify some problem and demand of customer then we take proper planning to remove our lacking. We have to continue our monitoring and rearranging our site to attack customer and make better profit. www.AssignmentPoint.com

Building an Ecommerce Site Navigation The navigation scheme you set up for your Web site acts as its road map, with clearly marked destinations, roads that intertwine, and even suggested routes. Visitors to your neck of the Net will want to know three things: where they are, where they can go, and how they can get back to where they came from Types of navigation Hierarchical Hierarchical applies to sites that are information-rich and are best organized as a large tree, much like a library. Global Global applies to sites where you can easily and logically jump among all points; this is best if you are presenting information in fewer, broader categories. Local Local navigation sits somewhere in between. This applies when you have depth of information within broader areas. www.AssignmentPoint.com

Building an Ecommerce Site The navigation bar There's no hard-and-fast rule about how and where to put a navigation bar. Many sites put it along the left side. Others, such as Microsoft's put it on the top. A few daring www.AssignmentPoint.com

Building an Ecommerce Site The navigation bar www.AssignmentPoint.com

Building an Ecommerce Site Site maps: Site maps are usually pages that contain links to all (or most) of the pages on a site. Often these are outline-like text pages, but they also can contain graphic image maps to help people understand the layout of a site www.AssignmentPoint.com

Building an Ecommerce Site Shopping cart: A shopping cart is a cart supplied by a shop, especially a supermarket, for use by customers inside the shop for transport of merchandise to the check-out counter during shopping, and often to the customer's car after paying as well. www.AssignmentPoint.com

Building an Ecommerce Site Search Engine : Online Support E-mail Text Chat Short Message Service (SMS) Fax The telephone Video Chat www.AssignmentPoint.com

Building an Ecommerce Site Home Page of Haat Bazar.com www.AssignmentPoint.com

Building an Ecommerce Site www.AssignmentPoint.com

Building an Ecommerce Site www.AssignmentPoint.com

Building an Ecommerce Site www.AssignmentPoint.com

Security Security is one kind of process that is providing reliable protection to protect threat Types of security: Physical security including such devices as alarms, fireproof doors, security fences, vaults. Logical security is non-physical protection. www.AssignmentPoint.com

Security Security System Firewall Database Security Data Transmission Security Certificates Ciphers Message Digests Password Security Cryptography Digital envelope Digital signature www.AssignmentPoint.com

Security Secure Sockets Layer Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. Process works in the following steps: The client makes a connection to the secure port (an “https” connection instead of an “http” connection). Along wit the request, it sends its SSL version and some other data. When the server receives this information, it sends back its own SSL version and its certificate. It may also request the client’s certificate if client authentication is required. the client receives the certificate and checks its validity. It checks whether or not the certificate has expired and whether it was issued by a trusted CA. Clients maintain a list of trusted CA certificates to determine whether the received certificate should be trusted. The client now creates a “premaster secret” to be used in this session. This secret is encrypted using the Public Key retrieved from the server’s certificate and then sent to the server. The server uses its Private Key to decrypt the premaster secret and then creates a master secret. The client also creates a master secret using the premaster secret. The master secret is used by both to created keys for encrypting and decrypting information, as well as to detect any changes made by somebody during data transmission. The client informs the server that it has been read and that it will encrypt messages using the Session Key. The server also sends a similar message to the client. www.AssignmentPoint.com

Payment System Credit Card : Credit cards are the most popular payment method for cyberspace consumer shopping today. Process of Using Credit Card Issue a credit card to a potential cardholder The cardholder shows the card to a merchant whenever he or she needs to pay for a product or service. The merchant then asks for approval from the brand company, and the transaction is paid by credit. The merchant keeps a sales slip. The merchant sells the slip to the acquiring bank and pays a fee for the service. This is called a capturing process. The acquiring bank requests the brand to clear for the credit amount and gets paid. Then brand asks for clearance to the issuer bank. The amount is transferred from issuer to brand. The same amount is deducted from the cardholder’s account in the issuing band. www.AssignmentPoint.com

Payment System Security Schemes in Electronic Payment Systems Authentication: a method to verify the buyer’s identity before payment is authorized Encryption: a process of making messages indecipherable except by those who have an authorized decryption key. Integrity: ensuring that information will not be accidentally or maliciously altered or destroyed during transmission. No repudiation: protection against customers’ denial of orders placed and against merchants’ denial of payments made. www.AssignmentPoint.com

THE END www.AssignmentPoint.com