Beruflich Dokumente
Kultur Dokumente
Objectives
Electronic Commerce Defined Types of Electronic Commerce Benefits of Electronic Commerce Drawbacks of Electronic Commerce Technology Behind the Web Security in the Web
In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. Capabilities that contribute to e-commerce: Communication transport Data management Security
Types of Electronic Commerce Business-to-business (B2B) Electronic commerce that takes place between businesses is referred to as business-to-business or B2B. Business-to-consumer (B2C) Electronic commerce that takes place between businesses and consumers, on the other hand, is referred to as business-to-consumer or B2C.
Reduced paperwork Reduced time Easier entry into new markets New business opportunities Improved market analysis Improved product analysis
Drawbacks of Electronic Commerce Confidentiality issues Taxation issues Credit card fraud Security issues Trust issues
Electronic Data Interchange (EDI) Open Trading Protocol (OTP) Web services Credit Card Processing
Electronic Data Interchange (EDI) Goals: Handle many repetitive standard transactions Reduce the amount of data capture and number of transcriptions Improve processes by reducing errors, delays, and expenses related to incorrectly formatted or unformatted data Ensure faster handling of transactions to increase cash flow
EDI Concepts
Open Trading Protocol (OTP) Provides trading protocol options to control how the trade occurs Provides a record of a trade Supports real and virtual delivery of goods and services Supports encrypted communication using IPs
Web Services A Web-based server application Data sent to and received from a Web service is formatted as XML Identify security issues for e-commerce sites Ongoing customer service management Customer service feedback Surveys
Credit Card Processing Set up an online merchant Install or connect to payment gateway software Prepare the server and e-commerce site Card companies also monitor your card activity to check for suspicious or out of ordinary purchases. They will contact you to verify it is you creating the usually break in the purchasing pattern.
Security - Purposes Security should be designed using a layered method that includes the following checks: privacy: information must be kept from unauthorized parties. integrity: message must not be altered or tampered with. authentication: sender and recipient must prove their identities to each other. non-repudiation: proof is needed that the message was indeed received
Protecting Against Attacks Disable unnecessary services Close unnecessary ports on computer and in firewall Limit how users can connect for management and content updates Limit number of accounts with administrative permission Ensure servers are physically secure Keep operating system and all applications up-to-date with security patches
Secure Electronic Transactions (SET) User installs a wallet that has digital certificates Digital certificates are used to encrypt payment data Digital signatures meet the need for authentication and integrity.
Authentication Based on User ID and Password Requires user to provide protected information in order to be authenticated Advantages Authenticates users not hosts Users can migrate from host to host No problems with Web proxies or DHCP
Cont Disadvantages Users share passwords, forget passwords, do not keep passwords private, or choose poor passwords passwords can be hacked if transmitted over a network
Firewalls and Kerberos Firewalls (software or hardware) protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol which uses symmetric secret key cryptography to restrict access to authorized employees.
References
www.CIWcertified.com E-Com Designer. www.Wikipedia.com www.ecommerce-digest.com www.dynamicwebs.com
Any Queries??????