E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.

Slides:



Advertisements
Similar presentations
CP3397 ECommerce.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Electronic Transaction Security (E-Commerce)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Telecommunication, Internet, and E-Commerce. Communication Channel Media Bandwidth: The speed at which information is transmitted over a communication.
E-Commerce. Introduction to Internet A network of networks that connects computers across the world. It is growing rapidly: –Host computers –Users –Information.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
E-Commerce. Internet It is a network that follows the TCP/IP protocol. –Transmission Control Protocol – handles communications between applications. A.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
E-Tailing Electronic Retailing or E-Tailing - is the sale of goods or services through the internet. This can include: business-to-business sales (B2B)
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
June 2009 Memory Reed Harris County High School What is E-Commerce? MKT-EM-2.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
1 Web Developer Foundations: Using XHTML Chapter 12 E-Commerce Overview Modified by Linda Kenney November, 2006.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
© 2004 Ken Baldauf, All rights reserved. E-commerce Transaction Processing Overview of Electronic and Mobile Commerce E-commerce Applications E-commerce.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
7/19: Internet & eCommerce How companies use the Internet –Collaboration (internal & external) –Communication (internal & external): , etc. –Gather.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Index Definition E-commerce : is the buying and selling of goods and services on the Internet, especially the World Wide Web. E-commerce has many.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Public Key Encryption.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Systems that support electronically executed business transactions.
The Internet, The Web, and Electronic Commerce Chapter 2.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Systems that support electronically executed business transactions.
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Chapter 5 – E-commerce and Enterprise Systems
Web Development & Design Foundations with HTML5 8th Edition
E-Commerce Security.
12 E-Commerce Overview.
Web Development & Design Foundations with HTML5
Internet.
Electronic Payment Security Technologies
Presentation transcript:

E-Commerce

Buying and selling, and marketing and servicing of products and services, and information via computer networks.

Broad Band & Economy According to the study released by Connected Nation, A 7 percent increase in broadband adoption would: –create 2.4 million jobs across the U.S; –save $6.4 billion in vehicle mileage –U.S. residents would save 3.8 billion hours a year by conducting transactions online, at a cost-savings of $35.2 billion, according to the study. – U.S. is behind other nations – FCC chairman: Broadband access should be universal-- Wednesday, November 25, 2009 – bin/article.cgi?f=/n/a/2009/11/25/financial/f051435S42.DTL

E-Commerce Models B2C: Storefront model –E-tailing (electronic retailing) –Shopping cart, on-line shopping mall B2B: –Electronic Data Interchange (EDI) –Electronic Exchange: An electronic forum where manufacturers, suppliers, and competitors buy and sell goods. Example: Global Sources and WorldWide Retail Exchange (WWRE) C2C: –Auction model: e-Bay Etc.

B2C System Model

Channel Conflict For example, a manufacturing company may have a large, established dealer network. The channel conflict exists, when the companies tries to open another channel, such as an online store where customers can purchase goods directly from the company. This may alienate existing dealers, since they may feel that they are bypassed. Web presence without online store –Anthon Berg Chocolate

E-Payment Methods Online credit card transaction: –Card-not-present transaction PayPal: Google Checkout: –

M-Business E-Business enabled by wireless communication. –Cell phone, PDA

Location Based Services Location-Identification Technologies: –Geocode: Longitude, latitude Global Positioning System (GPS) Cell phone –Angle of Arrival (AOA)

E-Learning Electronic learning or eLearning is a general term used to refer to computer-enhanced learning. Many higher education, for-profit institutions, now offer on-line classes. The Sloan report, based on a poll of academic leaders, says that students generally appear to be at least as satisfied with their on-line classes as they are with traditional ones. Example: GIS online course – p

e-Government It refers to government’s use of information technology to exchange information and services with citizens, businesses, and other arms of government.

Increase Traffic to Website Search engine optimization: – – cret_weapon/ Tips: – Grow your business with Google –Google AdWords Yahoo!'s Open Search Platform –

Internet Security Authenticity: Is the sender/receiver of a message who they claim to be? Privacy: Are the contents of a message secret and only known to the sender and receiver? Integrity: Have the contents of a message been modified during transmission? Nonrepudiation: Can the sender of a message deny that they actually sent the message?

Encryption (Cryptography) Plain text: the original message in human- readable form. Ciphertext:the encrypted message Encryption algorithm: the mathematical formula used to encrypt the plain text. Key: the secret key used to encrypt and decrypt a message.

Public Key Encryption Uses two different keys: a public and a private key. Receiver’s public key must be delivered in advance. Sender uses receiver’s public key to encrypt the message and receiver uses private key to decrypt the message (Sender can be sure the receiver is the true receiver) Example: –RSA (Rivest, Shamir, and Adelman) algorithm with 512-bit to 1024-bit key. Note: Although the two keys are mathematically related, deriving one from the other is “computationally infeasible”.

Certificate A certificate is a digital document issued by a trusted third-party certificate authority (CA). A certificate contains records such as a serial number, user’s name, owner’s public key, name of CA, etc. Example of CA: VeriSign, U.S. Postal Service.

Online Transaction Security Protocol Secure Sockets Layer (SSL) –Developed by Netscape –SSL implements public key technology using the RSA algorithm and digital certificate to authenticate the server in a transaction and protect private information.

Tech heavyweights join OpenID Foundation board IBM, Google, Microsoft, Yahoo and VeriSign have joined the board of the OpenID Foundation, which puts consumers a little closer to being able to use a single sign-on when they surf the Web. It is simpler: People no longer have to remember multiple passwords or re-enter their personal information every time they visit a new site. It is also more secure because it protects against certain types of online attacks.

Cookies Designed to hold information about a user. –Personalized web page Created by a web site and saved on the visitor’s machine. It contains: –Web site that sets the cookie. –One or more pieces of data. –Expiration date for this cookie. Cookies directory: Browser sends cookie with the URL when you visit the site that issued the cookie.