Chapter 7: E-Commerce Security and Payment system

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Security Threats to Electronic Commerce
Chapter 5 Security Threats to Electronic Commerce
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Electronic Commerce COMP3210 Dr. Paul Walcott 08/11/04 The Department of Computer Science Mathematics and Physics, University of the West Indies, Cave.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Security+ Guide to Network Security Fundamentals
Chapter 10: Electronic Commerce Security
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 10: Electronic Commerce Security
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Digital Payment Systems
Payment Systems for Electronic Commerce
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
Electronic Commerce Software Chapter 9 Bridgette Batten Susan Harper.
Course code: ABI 204 Course Name: Introduction to E-Commerce
The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.
Chapter 5 Security Threats to Electronic Commerce
BUSINESS B1 Information Security.
Electronic Commerce Payment Systems. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.Understand the shifts that are occurring with.
Invitation to Computer Science 5th Edition
CS28310 E-commerce On-Line Selling  eCatalogues  eMarketplaces  Implement an eCatalogue   Implement On-line Selling  On-line Payments  International.
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Traditional and Electronic Payment Methods Chapter 3.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Dimensions of E – Commerce Security
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
2/16/001 E-commerce Systems Electronic Payment Systems.
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
WEB SERVER SOFTWARE FEATURE SETS
9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CPT 123 Internet Skills Class Notes Internet Security Session B.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Security on the Internet and the Web
Chapter 5 – E-commerce and Enterprise Systems
IT Security  .
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 5 Electronic Commerce | Security
Presentation transcript:

Chapter 7: E-Commerce Security and Payment system CMPD 424 E-Commerce Chapter 7: E-Commerce Security and Payment system

Learning Objective At the end of this chapter students should be able to : Describe Online Security Issues Explain Security for Client Computer Understand Online Payment basics

ONLINE SECURITY ISSUES OVER VIEW Computer Security and Risk Management Computer security is the protection of assets from unauthorized access, use, alteration, or destruction Two general types of security: physical and logical Physical security includes tangible protection devices, such as alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings Protection of assets using nonphysical means is called logical security. Any act or object that poses a danger to computer assets is known as a threat. Countermeasure is the general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat

ONLINE SECURITY ISSUES OVER VIEW Computer Security and Risk Management

ONLINE SECURITY ISSUES OVER VIEW Computer Security and Risk Management That risk management model applies to protecting Internet and electronic commerce assets from both physical and electronic threats People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers or hackers cracker is a technologically skilled person who uses their skills to obtain unauthorized entry into computers or network systems usually with the intent of stealing information or damaging the information, the system’s software, or even the system’s hardware

ONLINE SECURITY ISSUES OVER VIEW Computer Security and Risk Management term hacker was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology Some IT people also use the terms white hat hacker and black hat hacker to make the distinction between good hackers and bad hackers

ONLINE SECURITY ISSUES OVER VIEW Elements of Computer Security Computer security is generally considered to include three main elements: secrecy, integrity, and necessity (also known as denial of service). Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source. Integrity refers to preventing unauthorized data modification. Necessity refers to preventing data delays or denials (removal)

ONLINE SECURITY ISSUES OVER VIEW Security Policy and Integrated Security Any organization concerned about protecting its electronic commerce assets should have a security policy in place A security policy is a written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not policy primarily addresses physical security, network security, access authorizations, virus protection, and disaster recovery

ONLINE SECURITY ISSUES OVER VIEW Five-step creating a security policy Determine which assets must be protected from which threats. E.g Customer Credit Card Number Determine who should have access to various parts of the system or specific information assets (suppliers, customers, and strategic partners) Identify resources available or needed to protect the information assets Using the information gathered in the first three steps, the organization develops a written security policy. Following the written policy, the organization commits resources to building or buying software, hardware, and physical barriers that implement the security policy.

ONLINE SECURITY ISSUES OVER VIEW Requirements for secure electronic commerce

SECURITY FOR CLIENT COMPUTERS Client computers, usually PCs, must be protected from threats that originate in software and data that are downloaded to the client computer from the Internet active content delivered over the Internet in dynamic Web pages can be harmful

SECURITY FOR CLIENT COMPUTERS Cookies The Internet provides a type of connection between Web clients and servers called a stateless connection. In a stateless connection, each transmission of information is independent, no continuous connection (also called an open session) is maintained between any client and server on the Internet Cookies are small text files that Web servers place on Web client computers to identify returning visitors. Cookies also allow Web servers to maintain continuing open sessions with Web client which is necessary to do a number of things that are important in online business activity.

SECURITY FOR CLIENT COMPUTERS Two ways of categorizing cookies by time duration by source Time duration cookie session cookies, which exist until the Web client ends the connection (or “session”), persistent cookies, which remain on the client computer indefinitely. Electronic commerce sites use both kinds of cookies

SECURITY FOR CLIENT COMPUTERS By source cookies Cookies can be placed on the client computer by the Web server site, in which case they are called first-party cookies they can be placed by a different Web site, in which case they are called third-party cookies. These third-party Web sites usually provide advertising or other content that appears on the Web site being viewed The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely

SECURITY FOR CLIENT COMPUTERS Web Bugs Web bug is a tiny graphic that a third-party Web site places on another site’s Web page When a site visitor loads the Web page, the Web bug is delivered by the third-party site, which can then place a cookie on the visitor’s computer A Web bug’s only purpose is to provide a way for a third- party Web site to place cookies from that third-party site on the visitor’s computer

SECURITY FOR CLIENT COMPUTERS Active Content Active content refers to programs that are embedded transparently in Web pages and that cause action to occur Active content is used in electronic commerce to place items into a shopping cart and compute a total invoice amount, including sales tax, handling, and shipping costs Active content elements are programs that run on the client computer, active content can damage the client computer The best-known active content forms are cookies, Java applets, JavaScript, VBScript, and ActiveX controls

ONLINE PAYMENT BASICS How to payment is made using Payment Cards An important function of electronic commerce sites is the handling of payments over the Internet electronic payments are far cheaper than mailing paper checks How to payment is made using Payment Cards The main categories of payment cards are credit cards, debit cards, and charge cards. Programs packaged with electronic commerce software can handle payment card processing automatically, or merchants can contract with a third party to handle payment card processing. The products and services offered by these credit card processing software vendors connect to a network of banks called the Automated Clearing House (ACH) and to credit card authorization companies

ONLINE PAYMENT BASICS

ONLINE PAYMENT BASICS Electronic Cash Micropayments and Small Payments Electronic cash (also called e-cash or digital cash) is a general term that describes any value storage and exchange system created by a private entity that does not use paper documents or coins Micropayments and Small Payments Internet payments for items costing from a few cents to approximately a dollar are called micropayments The term small payments will be used to include all payments of less than $10. Some companies have begun to offer small payment and micropayment services through mobile telephone carriers