Sie sind auf Seite 1von 23

E-COMMERCE

SATHEESH KUMAR.P 10CESF27

Objectives

Electronic Commerce Defined Types of Electronic Commerce Benefits of Electronic Commerce Drawbacks of Electronic Commerce Technology Behind the Web Security in the Web

Electronic Commerce Defined

In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. Capabilities that contribute to e-commerce: Communication transport Data management Security

Types of Electronic Commerce Business-to-business (B2B) Electronic commerce that takes place between businesses is referred to as business-to-business or B2B. Business-to-consumer (B2C) Electronic commerce that takes place between businesses and consumers, on the other hand, is referred to as business-to-consumer or B2C.

Benefits of Electronic Commerce

Reduced paperwork Reduced time Easier entry into new markets New business opportunities Improved market analysis Improved product analysis

Drawbacks of Electronic Commerce Confidentiality issues Taxation issues Credit card fraud Security issues Trust issues

Technology Behind the Web

Electronic Data Interchange (EDI) Open Trading Protocol (OTP) Web services Credit Card Processing

Designing the Site Hierarchy


Landing Page Product Catalog Category Page Product Page Product Page Shopping Cart Shipping/ Payment Confirm Order Thank You Category Page Category Page Home Page Customer Service

Log on Content Pages

Log on/ Register

Electronic Data Interchange (EDI) Goals: Handle many repetitive standard transactions Reduce the amount of data capture and number of transcriptions Improve processes by reducing errors, delays, and expenses related to incorrectly formatted or unformatted data Ensure faster handling of transactions to increase cash flow

EDI Concepts

Open Trading Protocol (OTP) Provides trading protocol options to control how the trade occurs Provides a record of a trade Supports real and virtual delivery of goods and services Supports encrypted communication using IPs

Web Services A Web-based server application Data sent to and received from a Web service is formatted as XML Identify security issues for e-commerce sites Ongoing customer service management Customer service feedback Surveys

Credit Card Processing Set up an online merchant Install or connect to payment gateway software Prepare the server and e-commerce site Card companies also monitor your card activity to check for suspicious or out of ordinary purchases. They will contact you to verify it is you creating the usually break in the purchasing pattern.

Credit Card Processing Behind the Scenes


Authorization Process

Security - Purposes Security should be designed using a layered method that includes the following checks: privacy: information must be kept from unauthorized parties. integrity: message must not be altered or tampered with. authentication: sender and recipient must prove their identities to each other. non-repudiation: proof is needed that the message was indeed received

Protecting Against Attacks Disable unnecessary services Close unnecessary ports on computer and in firewall Limit how users can connect for management and content updates Limit number of accounts with administrative permission Ensure servers are physically secure Keep operating system and all applications up-to-date with security patches

Secure Electronic Transactions (SET) User installs a wallet that has digital certificates Digital certificates are used to encrypt payment data Digital signatures meet the need for authentication and integrity.

Authentication Based on User ID and Password Requires user to provide protected information in order to be authenticated Advantages Authenticates users not hosts Users can migrate from host to host No problems with Web proxies or DHCP

Cont Disadvantages Users share passwords, forget passwords, do not keep passwords private, or choose poor passwords passwords can be hacked if transmitted over a network

Firewalls and Kerberos Firewalls (software or hardware) protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol which uses symmetric secret key cryptography to restrict access to authorized employees.

References
www.CIWcertified.com E-Com Designer. www.Wikipedia.com www.ecommerce-digest.com www.dynamicwebs.com

Any Queries??????

Das könnte Ihnen auch gefallen