E-C OMMERCE S ECURITY Presented by SAGAR CHAKRABORTY.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Security Controls and Systems in E-Commerce
CP3397 ECommerce.
Cryptography and Network Security
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
Cryptography and Network Security Chapter 17
EMTM 553 Electronic Commerce Systems
EMTM 553 Electronic Commerce Systems
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Building E-Commerce and E-Learning Models Hassanin M. Al-Barhamtoshy
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Management Information system E-commerce E-business Supervised by: Miss : Rasha Ragheb Atallah Presentation provided by: Salah Imad AlQady Ramzy Shafeeq.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Internet Security for Small & Medium Business Week 6
Electronic Commerce Systems. Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. – Marketing,
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models Storefront.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Computer and Network Security - Message Digests, Kerberos, PKI –
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
E C OMMERCE AND E LECTRONIC P AYMENTS ON THE I NTERNET.
Cryptography and Network Security
Chapter 5 Electronic Commerce | Security
BY GAWARE S.R. DEPT.OF COMP.SCI
Cryptography and Network Security
Chapter 5 Electronic Commerce | Security
EMTM 553 Electronic Commerce Systems
Unit 8 Network Security.
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

E-C OMMERCE S ECURITY Presented by SAGAR CHAKRABORTY

W HAT IS C OMMERCE AND E-C OMMERCE ? Commerce --Commerce refers to all the activities the purchase and sales of goods or services. --Marketing, sales, payment, fulfillment customer service E-Commerce --Electronic commerce (E-Commerce) is doing commerce with the use of computers, networks and commerce-enabled software (more than just online shopping)

A PPLICATIONS OF E-C OMMERCE Online Shopping Supply chain management Video on demand Remote banking Procurement and purchasing Online marketing and advertisement Auctions

Increased sales Reach narrow market segments in geographically dispersed locations Create virtual communities Decreased costs Handling of sales inquiries Providing price quotes Determining product availability A DVANTAGES OF E LECTRONIC C OMMERCE

D ISADVANTAGES OF E LECTRONIC C OMMERCE Loss of ability to inspect products from remote locations Rapid developing pace of underlying technologies Difficult to calculate return on investment Cultural and legal impediment Payment Security

E-C OMMERCE : C HALLENGES Trusting others electronically --E-Commerce infrastructure Security threats – the real threats and the perceptions Network connectivity and availability issues --Better architecture and planning Global economy issues --Flexible solutions

T RUSTING OTHERS ELECTRONICALLY : Q UESTIONS Am I connected to the correct web site? Is the right person using the other computer? Did the appropriate party send the last ? Did the last message get there in time, correctly?

E-C OMMERCE : S OLUTIONS T RUSTING O THERS Public-Key Infrastructure (PKI) Distribute key pairs to all interested entities Certify public keys in a “trusted” fashion --The Certificate Authority Secure protocols between entities Digital Signatures, trusted records and non- repudiation

E-C OMMERCE : S ECURITY T HREATS Authentication problems Privacy problems Integrity problems Repudiation problems

S ECURE P ROTOCOLS How to communicate securely: SSL – “the web security protocols” SET – “credit card transaction security protocol” IPSEC – “the IP layer security protocol” SMIME – “the security protocol”

S ECURE S OCKET L AYER (SSL) Authenticate Client and Server to each other. Operates between application and transport layers TCP/IP SSL HTTPNNTP Web Applications FTP Future Apps Etc.Telnet

C ONTD ….. Negotiates and employs essential functions for secure transactions Mutual Authentication Data Encryption Data Integrity Data Privacy Send Session messages

S ECURED E LECTRONIC T RANSACTIONS (SET) Developed by VISA & MasterCard SET Specifications: Digital Certificates (Identification) Public Key (Privacy) On-Line Shopping Steps: C.H. Obtain Digital Wallets C.H. Obtain Digital Certificates C.H. & Merchants conduct Shopping Dialog Authentication & Settlement Process

E-C OMMERCE : C HALLENGES C ONNECTIVITY AND AVAILABILITY Issues with variable response during peak time Guaranteed delivery, response and receipts Spoofing attacks Attract users to other sites Denial of service attacks Prevent users from accessing the site Tracking and monitoring networks

E-C OMMERCE : C HALLENGES G LOBAL E CONOMY Variable connectivity levels and cost Variable economies and cultures Taxation and intellectual property issues Interoperability between different economies

R EFERENCES [1] David J. Olkowski, Jr., “Information Security Issues in ECommerce”, SANS GIAC Security Essentials, March26,2001. [2] Paul A. Greenberg, “In E-Commerce We Trust … Not “, Ecommerce Time, February 2, 2001, URL: [3] William Stallings, “Cryptography and network Security”, 3rd edition, Prentice Hall,2003. [4] Michall E. Whitman and Herbert J. Maiiord, “Information Security”, Thomson, Inc., [5] Dave Chaffey, “E-Business and E-Commerce”, 2nd, Prentice Hall, 2005 [6] Mark Merkow. Jim Breithaupt, "Information Security Principles and Practices", Pearson Prentice Hall, 2006.

T HANK Y OU ……..