Who Uses Encryption? Module 7 Section 3.

Slides:



Advertisements
Similar presentations
Chapter 8 Payment Systems: Getting the Money
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Information Assurance Management Key Escrow Digital Cash Week 12-1.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Chapter 17 Controls and Security Measures
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
“Electronic Payment System”
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
Payment Systems for Electronic Commerce
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
3.3 Internet Services. Overview Demonstrate knowledge and understanding of the following internet services and describe the advantages and disadvantages.
Chapter 15 E-Payments: Getting the Money. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Brief History of Money Features of Real-World.
Electronic Commerce Semester 1 Term 1 Lecture 18.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Wiretapping and Encryption More Week 5 cont.. Early Forms of Wiretapping uParty Lines uHuman Operators.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Payment Systems Unit 34: E-commerce M2 - Compare two different payment systems used in e-commerce systems.
2/16/001 E-commerce Systems Electronic Payment Systems.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
TODAY’S AGENDA 1.Budgeting Project review- they are due electronically tomorrow 2.Budgeting Quiz (DVD) and test questions afterwards 3.Ch. 10 Baking 4.Ch.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Marketing Essentials Chapter 16 Section 1.  Most retail sales will use cash, debit, or credit sales for consumer goods.  Sometimes retail sales offer.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Chapter © 2010 South-Western, Cengage Learning Responsibilities and Costs of Credit Using Credit Wisely Costs of Credit 18.
Electronic Banking & Security Electronic Banking & Security.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Key Vocabulary Add the following to your Glossary accessibility augmented reality customer experience home page product promotional techniques retail retailers.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Paypal PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. With a PayPal account, you can send and.
Identity Theft It’s a crime!
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Discover the Boom in Electronic Banking!
ALL ABOUT THE FTC By: Brandon Baldwin.
BY GAWARE S.R. DEPT.OF COMP.SCI
Create Your Own Cryptocurrency Exchange – Know These Benefits.
Information on Types of Electronic Banking
Societal Issues in Computing (COMP466)
Chapter 10 Consumer Education.
Wiretapping and Encryption
ELECTRONIC PAYMENT SYSTEM.
WorldWidePIN Corporation
Secure Electronic Transactions (SET)
Computer Security.
ELC 200 DAY 25 & 26.
Unit 8 Network Security.
Chapter Goals Define cryptography
Presentation transcript:

Who Uses Encryption? Module 7 Section 3

Who Uses Encryption? Banks Industry Professionals National ID cards Criminals .....

Industrial Espionage Knowledge of a company’s cost and price structure Market research Strategic plans Order and customer lists Insider information

National ID Cards Strong encryption can be used to authenticate data Users would have to have a reader with the government’s public key to decrypt Fearful of key “leakage” Accessibility to law enforcement agencies

Criminals Cryptography allows criminals to keep their identities a secret Provides security to law breakers Allows anonymity Don’t use systems that leave trails

Protection from Dossier Society Digital cash made possible by public key encryption Secure financial transactions without a credit card or checking account number

E-Cash No link between payer and recipient Convenience of credit card Anonymity of cash Use on Internet for ordinary shopping Can transfer credentials Can prevent duplicate cash files Back up at home incase card is lost or stolen

E-Cash Not easy to form a consumer profile or dossier Prevent fraud and forgery Protect privacy from mailing lists More control over personal information