1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
CP3397 ECommerce.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Cryptography and Network Security
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Transaction Security (E-Commerce)
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Chapter 11 E-Commerce.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
1 Web Developer Foundations: Using XHTML Chapter 12 E-Commerce Overview Modified by Linda Kenney November, 2006.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
1 E-Commerce Overview Prepared by Terry Morris Kappa Beta Delta Harper College 11/03/04.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
1 Chapter 11 Understanding Computers, 11 th Edition 11 E-Commerce TODAY AND TOMORROW 11 th Edition CHAPTER.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Types of Electronic Infection
Index Definition E-commerce : is the buying and selling of goods and services on the Internet, especially the World Wide Web. E-commerce has many.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Internet, The Web, and Electronic Commerce Chapter 2.
Lecture 10 John Hurley, CS 120, WInter Class Evaluations 2.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Web Development & Design Foundations with HTML5 8th Edition
Copyright (c) 2007Prentice-Hall. All rights reserved.
E-Commerce Security.
12 E-Commerce Overview.
Web Development & Design Foundations with HTML5
Web Development & Design Foundations with H T M L 5
The Secure Sockets Layer (SSL) Protocol
Web Development & Design Foundations with H T M L 5
Electronic Payment Security Technologies
Presentation transcript:

1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts

© 2007 Pearson Education 2 Learning Outcomes In this chapter, you will learn how to: –Describe E-Commerce –Identify benefits and risks of E-Commerce –Describe E-Commerce business models –Describe E-Commerce Security and Encryption –Describe EDI (Electronic Data Interchange) –Describe trends and projections for E-Commerce –Describe issues related to E-Commerce –Describe order and payment processing –Describe E-Commerce solution options

© 2007 Pearson Education 3 What is E-Commerce? The integration of communications, data management, and security technologies to allow individuals and organizations to exchange information related to the sale of goods and services. Major functions of E-Commerce include: –the buying of goods, –the selling of goods, and –performance of financial transactions on the Internet.

© 2007 Pearson Education 4 E-Commerce Advantages for Businesses Reduced Costs Increased Customer Satisfaction More Effective Data Management Potentially Higher Sales

© 2007 Pearson Education 5 E-Commerce Advantages for Consumers Convenience Easier Comparison Shopping Wider Selection of Goods

© 2007 Pearson Education 6 E-Commerce Risks for Businesses Need for a robust, reliable web site Fraudulent transactions Customer reluctance to purchase online Increased competition

© 2007 Pearson Education 7 E-Commerce Risks for Consumers Possible Security Issues Possible Privacy Issues Purchasing from photos & descriptions Possible difficulty with returns

© 2007 Pearson Education 8 E-Commerce Business Models B2C – Business-to-Consumer B2B – Business-to-Business C2C – Consumer-to-Consumer B2G – Business-to-Government

© 2007 Pearson Education 9 Electronic Data Interchange (EDI) EDI is the transfer of data between different companies using networks. This facilitates the exchange of standard business documents including purchase orders and invoices. EDI is not new; it has been in existence since the 1960s. Organizations that exchange EDI transmissions are called trading partners. Newer technologies such as XML and Web Services are replacing traditional EDI by allowing trading partners virtually unlimited opportunities to customize their information exchange over the Internet.

E-Commerce Statistics Source:Forrester Research as reported on

© 2007 Pearson Education 11 Typical Internet User A recent study by Harris Interactive discussed on Clickz.com ( ) found that the typical Internet user in the U.S. now mirrors the U.S. population. Male 49% Female 51% Household Income $40,816 Adults %

© 2007 Pearson Education 12 E-Commerce Issues Intellectual Property Security Fraud Taxation International Commerce

© 2007 Pearson Education 13 E-Commerce Security Encryption –Used to ensure privacy within an organization and on the Internet. –The conversion of data into an unreadable form, called a ciphertext. This ciphertext cannot be easily understood by unauthorized individuals. Decryption –The process of converting the ciphertext back into its original form, called plaintext or cleartext, so it can be understood. The encryption/decryption process requires an algorithm and a key.

© 2007 Pearson Education 14 E-Commerce Security Encryption Types Secure E-Commerce transactions make use of the encryption technologies below: Symmetric-key Encryption Asymmetric-key Encryption Hash Encryption These technologies are used as part of SSL (Secure Sockets Layer) – the technology that helps to make commerce on the Internet secure.

© 2007 Pearson Education 15 E-Commerce Security Types of Encryption(1) Symmetric-Key Encryption Also called single-key encryption. Both the encryption and decryption use the same key. Since the key must be kept secret from others, both the sender and receiver must know the key before communicating using encryption. An advantage of symmetric-key encryption is speed.

© 2007 Pearson Education 16 E-Commerce Security Types of Encryption(2) Asymmetric-Key Encryption Also called public-key encryption. There is no shared secret. Instead, two keys are created at the same time. This key pair contains a public key and a private key. Public-key encryption is much slower than symmetric-key encryption.

© 2007 Pearson Education 17 E-Commerce Security Types of Encryption(3) Hash Encryption A hash algorithm transforms a string of characters into a usually shorter fixed- length value or key that represents the original string, called a digest. Hash encryption is one-way encryption. Hash encryption is used for information that will not be read or decrypted. The function of hash encryption is to verify the integrity of information.

© 2007 Pearson Education 18 Secure Sockets Layer (SSL) SSL is a protocol that allows data to be privately exchanged over public networks. SSL was developed by Netscape and is used to encrypt data sent between a client (usually a web browser) and a web server. SSL utilizes both symmetric and asymmetric keys. SSL uses the “ https ” protocol instead of the “ http ” protocol Most browsers display a “ lock ” icon when SSL is being used.

© 2007 Pearson Education 19 Secure Sockets Layer (SSL) SSL provides secure communication between a client and server by using: –Server and (optionally) client digital certificates for authentication –Symmetric-key cryptography using a "session key" for bulk encryption –Public-key cryptography for transfer of the session key –Message Digests (hash encryption) to verify the integrity of the transmission

SSL in Action

© 2007 Pearson Education 21 SSL & Digital Certificate SSL enables two computers to securely communicate by using a digital certificate for authentication. A digital certificate is a form of an asymmetric key that also contains information about the certificate, the holder of the certificate, and the issuer of the certificate.

© 2007 Pearson Education 22 Digital Certificate The contents of a digital certificate include: –The public key –Effective date of the certificate –Expiration date of the certificate –Details about the Certificate Authority -- the issuer of the certificate –Details about the certificate holder –A digest of the certificate content

© 2007 Pearson Education 23 Certificate Authority A Certificate Authority is a trusted third-party organization or company that issued digital certificates. Well-known Certificate Authorities: –Verisign –Thawte

© 2007 Pearson Education 24 Obtaining a Digital Certificate Request a certificate from a Certificate Authority and pay the application fee. The Certificate Authority: –verifies your identity, –issues your Certificate, –and supplies you with a public/private key pair. Store the certificate in your software - such as a web server, web browser, or e- mail application. The Certificate Authority makes your certificate publicly known.

© 2007 Pearson Education 25 SSL & Digital Certificates When you visit an e-commerce site that uses SSL, a number of steps are involved in the authentication process. –The web browser and web server go through initial handshaking steps using the server certificate and keys. –Once trust is established, the web browser encrypts the single secret key (symmetric key) that will be used for the rest of the communication. –From this point on, all data is encrypted using the secret key.

© 2007 Pearson Education 26 Checkpoint Describe three advantages of e- commerce for an entrepreneur just starting a business. 2.Describe three risks that businesses face when engaging in e-commerce. 3.Define SSL. Describe how an online shopper can tell that an e- commerce site is using SSL.

© 2007 Pearson Education 27 Order & Payment Processing E-Commerce Payment Models: –Cash –Check –Credit –Smart Card –Micropayments

Credit Card Order Processing Flow

© 2007 Pearson Education 29 E-Commerce Storefront Solutions Instant Online Storefront –Yahoo!, Bigstep, Earthstores, FreeMerchant Off-The-Shelf Shopping Cart Software –Miva Merchant, Mercantec Custom Built Solution –IBM's WebSphere Commerce Suite, Microsoft's Commerce Server –Visual Studio.NET, Macromedia Dreamweaver MX, IBM’s WebSphere Commerce Studio Semi-Custom Built Solutions on a Budget E-Commerce add-ons for FrontPage and Dreamweaver Paypal order processing Free shopping cart scripts

© 2007 Pearson Education 30 Checkpoint List three payment models commonly used on the Web. Which one is the most popular, why? 2.Have you purchased online? If so, think of the last item that you purchased. 1.Why did you purchase it online instead of at a store? 2.Did you check to see if the transaction was secure? Why or why not? 3.How will your shopping habits be different in the future? 3.Describe three types of e-commerce solutions available. Which provides the easiest entry to e-commerce? Explain.

© 2007 Pearson Education 31 Summary This chapter introduced you to basic e-ommerce concepts and implementations. Consider taking an E-Commerce course to continue your study of this dynamic and growing area of web development.