Chapter 18: Doing Business on the Internet Business Data Communications, 4e.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CP3397 ECommerce.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Conceptual Design of an E- commerce System Min Ding Smeal College of Business Administration Pennsylvania State University.
Traditional and Electronic Payment Methods Chapter 3.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Chapter 10 E- Payment.
Internet Security for Small & Medium Business Week 6
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Traditional and Electronic Payment Methods Chapter 3.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
CHAPTER-4 THE DIGITAL FIRM: E-COMMERCE AND E- BUSINESS.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
LOGO Technical English E-commerce. Logo Contents E-commerce companiesE-commerce featuresTransaction securityOnline transactions.
Secure Electronic Transaction
BY GAWARE S.R. DEPT.OF COMP.SCI
Network Security 4/21/2019 Raj Rajarajan.
Electronic Payment Security Technologies
Module 4 System and Application Security
Presentation transcript:

Chapter 18: Doing Business on the Internet Business Data Communications, 4e

2 Security: The Key to E-Commerce 8Communications 8Encryption 8Privacy 8payment systems

Business Data Communications, 4e 3 SSL & TLS 8Secure Socket Layer 8Transport Layer Security 8Protocols that sit between the underlying transport protocol (TCP) and the application

Business Data Communications, 4e 4 Secure Socket Layer (SSL) 8Originated by Netscape 8TLS has been developed by a working group of the IETF, and is essentially SSLv3.1 8Provides security at the “socket” level, just above the basic TCP/IP service 8Can provide security for a variety of Internet services, not just the WWW

Business Data Communications, 4e 5 SSL Implementation 8Focused on the initialization/handshaking to set up a secure channel 8Client specifies encryption method and provides challenge text 8Server authenticates with public key certificate 8Client send master key, encrypted with server key 8Server returns an encrypted master key 8Digital signatures used in initialization are based on RSA; after initialization, single key encryption systems like DES can be used

Business Data Communications, 4e 6 Characteristics of On-Line Payment Systems 8Transaction types 8Means of settlement 8Operational characteristics 8Privacy and security 8Who takes risks

Business Data Communications, 4e 7 Secure Electronic Transactions 8SET is a payment protocol supporting the use of bank/credit cards for transactions 8Supported by MasterCard, Visa, and many companies selling goods and services online 8SET is an open industry standard, using RSA public- key and DES single-key encryption

Business Data Communications, 4e 8 SET Participants & Interactions

Business Data Communications, 4e 9 Ideal Components of Electronic Cash 8Independent of physical location 8Security 8Privacy 8Off-line payment 8No need for third-party vendor 8Transferability to other users 8Divisibility 8“Making change”

Business Data Communications, 4e 10 E-Cash 8Created by David Chaum in Amsterdam in Maintains the anonymity of cash transactions 8Users maintain an account with a participating financial institution, and also have a “wallet” on their computer’s hard drive 8Digital coins, or tokens, are stored in the wallet

Business Data Communications, 4e 11 Electronic Commerce Infrastructure 8Intrabusiness 8Intranet based 8Supports internal transactions and transfers 8Business-to-Business (BTB or B2B) 8Extranet based 8Business-to-Consumer (BTC or B2C) 8Internet based

Business Data Communications, 4e 12 Importance of BTB Commerce

Business Data Communications, 4e 13 Firewalls 8Used to provide security for computers inside of a given network 8All traffic to/from network passes through firewall 8Only authorized traffic is allowed through 8Firewall itself is a secure system 8Firewall performs authentication on users 8Firewall may encrypt transmissions

Business Data Communications, 4e 14 Free Trade Zones (FTZ) 8Area where communication and transactions occur between trusted parties 8Isolated from both the external environment and the enterprise’s internet network 8Supported by firewalls on both ends 8Inside the FTZ, all communications can be in clear mode without any encryption 8Necessary because logical boundaries between BTB and IB are becoming fuzzy.