Download presentation
Presentation is loading. Please wait.
1
security
3
What do we mean by security?
E-commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats. This defense includes detection, prevention and response to threats through the use of security policies, software tools and IT services.
4
The following figure shows the components involved in E-commerce infrastructure.
5
Security Methods for E-commerce
Secure Transport Protocols Secure Hypertext Transfer Protocol Secure Socket Layers The credit card details presented by the cardholder to the merchant. The credit card details passed to the bank for processing. The details of the order and the customer details supplied to the merchant either directly or from the payment gateway credit card processing company.
6
Card security code
7
Printed on card ,it is used as security feature in situation where PIN connot be used.
PIN is not printed on the carde but is manually entered by card holder during POS transaction Suppling CSC in a transaction is intended to verify that the customer has the card in their possession . Knowledge of the code proves that the customer has seen the card
9
Limitations The use of the CSC cannot protect against phishing scams. The growth in phishing has reduced the real-world effectiveness of the CSC as an anti-fraud advice. there is now also a scam where a phinsher has already obtained the card account number Some card issuers do not use the CSC .However ,transaction without CSC are possibly subjected to higher card processing cost to the merchants and fraudulent
10
Secure Electronic Payment protocol
SEEP help fulfilling some of business requirement which are stated as following It enables confidently of payment information Ensures integrity of all the payment data is transmitted Provide authentication that the cared holder is the legitimated owner of the card account
11
Other topic Security of client computers Cookies Web bugs
Active content Control x control Viruses, worms , and anti virus software
12
Prepared by: Angham R. El-Dahdouh Shahira Kh. Khattab Yasmine A
Prepared by: Angham R. El-Dahdouh Shahira Kh. Khattab Yasmine A. Al-Nassan Supervision : Hani abu Amer
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.