BY GAWARE S.R. DEPT.OF COMP.SCI

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Cryptography and Network Security
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
E-Commerce Tutorial LI Jing Feb 12, 2015.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Collaboration and Trading Online Communities of Interest B2B e-Commerce Web Portals Dependence on Internet- Based Trading Platforms e-Commerce Processes.
Chapter 8 Web Security.
“Electronic Payment System”
Traditional and Electronic Payment Methods Chapter 3.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Electronic Payment Systems
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Traditional and Electronic Payment Methods Chapter 3.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Electronic Banking & Security Electronic Banking & Security.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Chapter 8 E-Commerce Security. Objectives Understand the basic elements of EC security. Explain the basic types of network security attacks.
Paypal PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. With a PayPal account, you can send and.
ELECTRONIC PAYMENT SYSTEM
TOPIC: HTTPS (Security protocol)
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
E-Commerce Basics You know your excited.
Chapter 5 Electronic Commerce | Security
12 E-Commerce Overview.
Cryptography and Network Security
Chapter 5 Electronic Commerce | Security
EMTM 553 Electronic Commerce Systems
Secure Electronic Transaction (SET) University of Windsor
ELECTRONIC PAYMENT SYSTEMS
Chinese wall model in the internet Environment
Unit 8 Network Security.
Electronic Payment Security Technologies
Module 4 System and Application Security
Cryptography and Network Security
Presentation transcript:

BY GAWARE S.R. DEPT.OF COMP.SCI E-COMMERCE BY GAWARE S.R. DEPT.OF COMP.SCI

INTRODUCTION: E-Commerce or Electronics Commerce is a methodology of modern business, which addresses the requirements of business organizations. It can be broadly defined as the process of buying or selling of goods or services using an electronic medium such as the Internet. Ecommerce refers to the paperless exchange of business information using the following ways − Electronic Data Exchange (EDI) Electronic Mail (e-mail) Electronic Bulletin Boards Electronic Fund Transfer (EFT) Other Network-based technologies

Features: E-Commerce provides the following features − Non-Cash Payment − E-Commerce enables the use of credit cards, debit cards, smart cards, electronic fund transfer via bank's website, and other modes of electronics payment. 24x7 Service availability − E-commerce automates the business of enterprises and the way they provide services to their customers. It is available anytime, anywhere. Advertising / Marketing − E-commerce increases the reach of advertising of products and services of businesses. It helps in better marketing management of products/services. Improved Sales − Using e-commerce, orders for the products can be generated anytime, anywhere without any human intervention. It gives a big boost to existing sales volumes. Support − E-commerce provides various ways to provide pre-sales and post-sales assistance to provide better services to customers. Inventory Management − E-commerce automates inventory management. Reports get generated instantly when required. Product inventory management becomes very efficient and easy to maintain. Communication improvement − E-commerce provides ways for faster, efficient, reliable communication with customers and partners.

SECURITY: Security is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised. Following are the essential requirements for safe e-payments/transactions − Confidentiality − Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission. Integrity − Information should not be altered during its transmission over the network. Availability − Information should be available wherever and whenever required within a time limit specified. Authenticity − There should be a mechanism to authenticate a user before giving him/her an access to the required information. Non-Repudiability − It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt. Encryption − Information should be encrypted and decrypted only by an authorized user. Auditability − Data should be recorded in such a way that it can be audited for integrity requirements.

Encryption − It is a very effective and practical way to safeguard the data being transmitted over the network. Sender of the information encrypts the data using a secret code and only the specified receiver can decrypt the data using the same or a different secret code. Digital Signature − Digital signature ensures the authenticity of the information. A digital signature is an e-signature authenticated through encryption and password. Security Certificates − Security certificate is a unique digital id used to verify the identity of an individual website or user.

Secure Socket Layer (SSL): It is the most commonly used protocol and is widely used across the industry. It meets following security requirements − Authentication Encryption Integrity Non-reputability Secure Hypertext Transfer Protocol (SHTTP): SHTTP extends the HTTP internet protocol with public key encryption, authentication, and digital signature over the internet. Secure HTTP supports multiple security mechanism, providing security to the end-users. SHTTP works by negotiating encryption scheme types used between the client and the server.

Secure Electronic Transaction: It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the best security protocol. It has the following components − Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure purchases online via point and click interface. Merchant Software − This software helps merchants to communicate with potential customers and financial institutions in a secure manner. Payment Gateway Server Software − Payment gateway provides automatic and standard payment process. It supports the process for merchant's certificate request. Certificate Authority Software − This software is used by financial institutions to issue digital certificates to card holders and merchants, and to enable them to register their account agreements for secure electronic commerce.