Chapter 8 Building the Transaction Database

Slides:



Advertisements
Similar presentations
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Advertisements

Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Electronic Transaction Security (E-Commerce)
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Webinar Today: eCommerce Solutions Shopping Carts Online Bill Payment Event Registration And more! Problems? Please
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
CSCI 6962: Server-side Design and Programming
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Session 11: Security with ASP.NET
Human-Computer Interface Course 5. ISPs and Internet connection.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
JavaScript, Fourth Edition
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Copyright 2000 eMation SECURITY - Controlling Data Access with
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
1 Apache and Virtual Sites and SSL Dorcas Muthoni.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Dr. Mustafa Cem Kasapbaşı Security in ASP.NET. Determining Security Requirements Restricted File Types.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
WEB SERVER SOFTWARE FEATURE SETS
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
TOPIC: HTTPS (Security protocol)
Web Security CS-431.
Setting and Upload Products
Chapter 5 Electronic Commerce | Security Threats - Solution
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
SSL Certificates for Secure Websites
Encryption 1-way String Encryption Rainbows (a.k.a. Spectrums)
Secure Sockets Layer (SSL)
Unit 11 Using the Internet & Browsing the Web
Section 12.1 Section 12.2 Discuss the functions of a Web site
Unit 12 Using the Internet & Browsing the Web
Jim Fawcett CSE686 – Internet Programming Summer 2005
Chapter 5 Electronic Commerce | Security Threats - Solution
Web Services Security.
BY GAWARE S.R. DEPT.OF COMP.SCI
How to Check if a site's connection is secure ?
IBM Certified WAS 8.5 Administrator
E-Commerce Security.
Using SSL – Secure Socket Layer
12 E-Commerce Overview.
Topic 5: Communication and the Internet
Easy Tutorial Quick Installation Guide Create your 1st Playlist.
Configuring Internet-related services
Installation & User Guide
Building Security into Your System
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

Chapter 8 Building the Transaction Database Objective: Database Tables used for Transaction. Registering Users. Gracefully Handling Form Errors. Using the Secure Sockets Layer.

Transaction Database Tables User Table – Used o store user Information Cart Table – Used to store customer shopping cart. Order Table – Holds information of all the products that that have been ordered in addition to information about the status of an order.

User Table schema User_id User_name User_pwd User_email User_street User_city User_zip User_state User_cctype User_ccexpires User_ccname

Registering Users Before customer can add items to their shopping cart, they must first register. Instead of entering address and payment information every time a new item is bought, the customer can enter this information once. It enables customers to retain a shopping cart over many visits to your Web site.

Gracefully Handling Form Errors The Error Form displays an error message and asks the user to return to the previous page to correct the mistake. When the user clicks the return button all the original data that the user entered into the HTML form is passed back to the form. Bcoz the information is passed back to the form, there is no need to start filling out the form again.

Secure Socket layer During Registration the user enter the credit card information in the form. This information is transmitted across the internet in plain text, which is dangerous. The information in internet passes through various intermediate connections.

An individual with impure intensions could teal the information while it is on its way to destination. To protect the customer’s credit card information, you must use the Secure Socket Layer(SSL). SSL is a technology originally developed by Netscape that enables you o transfer information securely across the internet.

It provides solution to three distinct security problems: Encryption Authentication Data Integrity Information that flows between Web Server & Web Browser is encrypted by encoding the information with a publicly known encryption algorithm and a secret session encryption key.

The number of bits in the session key determines the strength of the encryption. Two standard key sizes are 40 bit & 128 bit key. 40 bit key is hacked but 128 is considered unbreakable with current technology. SSL is also used to authenticate a Web server.

To enable SSL on your Web server, server certificate should be installed. This server certificate prevents other web site from pretending to be your web site. Server certificate contains information about your Web site, your organization & the issuer of the certificate. Finally SSL protects the integrity of the data as it is transmitted across the internet by including MCA (Message Authentication code) with the data as it is transmitted.

Enabling SSL on your Web Server SSL is used with IIS and not PWS. Enabling SSL is time consuming & Expensive. Ex VeriSign charges $349 for 40 bit SSL key & $895 for 128 bit key.

To enable SSL with IIS Server the following are the three steps: Generate a certificate Request File and an Encryption Key pair file using MS Key Manager. Apply for a Server Certificate from a certificate authority by providing your Certificate Request File. Install your server certificate by using MS Key Manager.

Generating the Certificate Request File Use MS Key Manager to create Certificate Request File also called Certificate Signing Request (CSR). To access MS Key manage, Launch Internet Service manager, select key, Create New key. This creates wizard that will guide you through the task of creating the CRF

Following Information is supplied to create CRF Request File Key name Password Key size Organization Organizational Unit Common Name Country/Region State/Provision Locality Your Name Email Address Phone Number

Applying for a Server certificate The CRF should be sent to a certificating authority to get your server certificate. The three popular authorities are: VeriSign Inc. Thawte Counselting GTE CyberTrust Solutions

To apply for VeriSign server certificate go to http://www. verisign To apply for VeriSign server certificate go to http://www.verisign.com and choose Secure Server ID. Provide VerSign with identifying information about your organization then submit the you CRF through an online form. After your information is verified, an email is sent to you instructing o download the new Server certificate.

Installing Server Certificate Last step is to install server certificate, that is received from the certifying authority. To install the server certificate launch the Internet Service Manager and select MS Key manager. Next Choose Key, install Key certificate. Open the new certificate file file from the hardware and supply the same password as used in CRF. Next specify the IP address and port to use SSL.

The Server certificate lasts for a period of time. The exact expiry date is given in the right frame of MS Key manager. Can be renewed before expiry.

Using SSL in ASP Page After installing your Server Certificate, you can request any page from he web site securely. O request a page using SSL, the address must begin with protocol https:// rather than http://. To force user to use SSL, you can use Internet Service Manager to configure a directory to require SSL.

To do this, launch the Internet Service Manager and open the property sheet for one of the directories within your website. Next click Edit button under Secure Communications & choose Require Secure Channel When access this resource. SSL should be enabled during registration in online store.