Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Weighing the Risks and Benefits of Online Financial Transactions
Chapter 3 E-Payment Systems eb-course.weebly.com.
CP3397 ECommerce.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Payment Gateway Onno W. Purbo Issu Utama Payment Method Security Certificate Authority Cyberlaw.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
SET – Secure Electronic Transaction Setting The Stage For Safe Internet Shopping -Jignesh Shah- -Riyaz Malbari-
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Summary of Reading Assignments: Credits and Debits on the Internet & New Payment Systems Hope To Cash In Dr. Deepak Khazanchi.
Chapter 8 Web Security.
“Electronic Payment System”
Accepting Credit Cards on your Website. If you are building an online shop, you will need to address the question of taking payments for orders. You can,
Digital Payment Systems
Conceptual Design of an E- commerce System Min Ding Smeal College of Business Administration Pennsylvania State University.
Traditional and Electronic Payment Methods Chapter 3.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
Web Payments via Christopher Woods Aaron Buma. Agenda  Introduction  About it  Why to use it  Services they Provide  Seller Protection  Ebay Aspect.
Supporting Technologies III: Security 11/16 Lecture Notes.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Chapter 10 E- Payment.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Traditional and Electronic Payment Methods Chapter 3.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
Trusted source for all your payment processing needs.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Cryptography and Network Security
Cryptography and Network Security
Electronic Commerce.
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

Chapter 4 Getting Paid

Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain what transaction processors are Know what shopping cart software does

Payment Method Traditional Credit card Electronic payment

Stored Account Electronic Fund Transfer look-alike Funds are debited via a clearinghouse Easily traced transactions Complete record of your transactions – consumer profile developed Consumer privacy issues

Stored Value E-cash Instantaneous transaction Can be used for small payments easier that stored accounts Less secure for the seller, more secure for the buyer Physical token acquired and value added to it Token kept on the system unit Breaches – physically or via protocol method

Obtaining a Merchant Account Open with the bank Similar to a loan application process Bank must trust you! Verify: Card Not Present or Mail Order Telephone Order Authonly Bank’s transaction process

Merchant Account Provides Verification of the credit card Process the transaction Deposit the result into your account

Merchant Account Costs Internet discount rate – 2-3% Transaction fee per transaction Monthly fees and minimums Holdbacks and charge backs Setup and equipment

Payment Processing Service Real time transactions Verifies the consumer’s transaction Sometimes tied to the shopping cart solution used Gateways – the bridge between the web site and the credit card processor Separate communications channel for the transaction

Shopping Cart Software Lists your products Let’s the consumer pick and choose their purchases Place choices in a virtual basket Check out and complete the order

Security SSL SET

SSL - Secure Socket Layer From the customer's computer to the business server Provide privacy and reliability Server and client authenticate to each other with cryptographic keys - 40 and 128 bit Client server sessions: Server authentication – digital certificate who I say I am Client authentication The customer is who they say they are Confidentiality No unauthorized entity

Secure Electronic Transactions Visa and MasterCard initiated Purposes: Keeps information confidential Authenticate the identity of the other party Via digital certificates Certificate Authority