12 E-Commerce Overview.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
Cryptography and Network Security
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Transaction Security (E-Commerce)
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
Supporting Technologies III: Security 11/16 Lecture Notes.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
1 Web Developer Foundations: Using XHTML Chapter 12 E-Commerce Overview Modified by Linda Kenney November, 2006.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
1 E-Commerce Overview Prepared by Terry Morris Kappa Beta Delta Harper College 11/03/04.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
The Secure Sockets Layer (SSL) Protocol
Setting and Upload Products
Unit 3 Section 6.4: Internet Security
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Cryptography Reference: Network Security
Cryptography Reference: Network Security
Section 12.1 Section 12.2 Discuss the functions of a Web site
Chapter 8 Building the Transaction Database
Web Development & Design Foundations with HTML5 8th Edition
BY GAWARE S.R. DEPT.OF COMP.SCI
Copyright (c) 2007Prentice-Hall. All rights reserved.
E-Commerce Security.
Using SSL – Secure Socket Layer
Cryptography and Network Security
Web Development & Design Foundations with HTML5
Pooja programmer,cse department
Cryptography and Network Security
Web Development & Design Foundations with H T M L 5
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Web Development & Design Foundations with H T M L 5
Unit 8 Network Security.
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

12 E-Commerce Overview

Learning Outcomes Define E-commerce Identify Benefits & Risks of E-Commerce Describe E-Commerce Business Models Describe E-Commerce Security & Encryption Describe Issues Related to E-Commerce

E-Commerce In Relation to the Sale of Goods & Services: Allow Individuals & Organizations to Exchange Information Integrate Communications, Data Management, & Security Major Functionality: Buying of Goods Selling of Goods Performance of Financial Transactions over the Internet.

Advantages Business Consumer Reduced Costs Increased Customer Satisfaction More Effective Data Management Potentially Higher Sales Consumer Convenience Easier Comparison Shopping Wider Selection of Goods

Risks Business Consumer Need for a Robust, Reliable Web Site Fraudulent Transactions Customer Reluctance to Purchase Online Increased Competition Consumer Possible Security Issues Possible Privacy Issues Purchasing from Photos & Descriptions

Issues Intellectual Property Security Fraud Taxation International Commerce

Trends Positive Negative Bigger Product Images More Robust Reviews Glean More Detail More Robust Reviews Useful Coupons Negative Smaller and Hidden Product Descriptions Fail to Give Feedback After Adding Items to the Cart

E-Commerce Business Models B2C (Business-to-Consumer) B2B (Business-to-Business) C2C (Consumer-to-Consumer) B2G (Business-to-Government)

Web Services Transmit Data Between Companies Using the Internet Software System Support Interoperable Machine-to-machine Interaction Other Systems Interact Using HTTP with XML

Security Encryption Decryption Ensures Privacy within Organization & on Internet Converts Data into an Unreadable Format Ciphertext Decryption Process of Converting Ciphertext Back into its Original Form Plaintext or Cleartext Encrypt/Decrypt Process Requires Algorithm & Key

Symmetric-Key Encryption AKA Single-key Encryption Encryption & Decryption Use Same Key Sender & Receiver Must Know Key Before Communicating Using Encryption Advantage: Speed

Asymmetric-Key Encryption AKA Public-key Encryption Two Keys are Created at the Same Time Public Key Private Key Much Slower than Symmetric-key Encryption

Hash Encryption Purpose is to Verify Integrity of Information Hash Algorithm Transforms String of Characters Creates “Digest” Shorter Fixed-length Value or Key that Represents Original String One-way Encryption For Information that Will Not be Read or Decrypted

Secure Sockets Layer (SSL) Protocol that Allows Data to be Privately Exchanged Over Public Networks Developed by Netscape Encrypts Data Sent Between Client & Server Utilizes Both Symmetric & Asymmetric Keys https Protocol Browsers Display a “Lock” Icon

Secure Sockets Layer (SSL) Server & (Optionally) Client Digital Certificates For Authentication Symmetric-key Cryptography Using a "Session Key" for Bulk Encryption Public-key Cryptography for Transfer of Session Key Hash Encryption to Verify Integrity of Transmission

Digital Certificate Form of an Asymmetric Key Used by SSL to Authenticate Identity of Web Server Contents of a Digital Certificate Include: Public Key Effective Date of Certificate Expiration Date of Certificate Details About Certificate Authority (Issuer) Details About Certificate Holder A Digest of Certificate Content

Digital Certificate Obtaining Request Certificate from a Certificate Authority Pay Application Fee Certificate Authority: Verifies Your Identity Issues Your Certificate Supplies You With a Public/Private Key Pair Store Certificate In Server, Browser, or E-mail Application Certificate Authority Makes Your Certificate Publicly Known