Professional Documents
Culture Documents
Introduction to e-commerce
E Commerce (Electronic Commerce) is any form of business transaction in which the parties interact electronically over the Internet rather than by physical exchange or conduct. Use of electronic communications and digital information processing technology in business transactions to create, transform, and redefine relationships for value creation among organizations, and between organizations and individuals.
EVOLUTION OF TECHNOLOGIES
EFT (Electronic Fund Transfer)
Electronic transmissions of account exchange information over private communications networks .
E-Commerce: Challenges
Trusting others electronically
E-Commerce infrastructure
Security threats the real threats and the perceptions Network connectivity and availability issues
Better architecture and planning
continue
Trusting others electronically
Authentication Handling of private information Message integrity Digital signatures and non-repudiation Access to timely information
Purpose of Cryptography
Secure stored information - regardless if access obtained by unauthorized disclosure. Secure transmitted information - regardless if transmission has been monitored.
Digital Signatures
Digital Envelopes
secure delivery of secret keys
Message Digests
short bit string hash of message
Secure Channels
Encryption can be used to create secure channels over private or public networks
9
Secure Protocols
How to communicate securely:
SSL the web security protocols IPSEC the IP layer security protocol SMIME the email security protocol SET credit card transaction security protocol Others
SSL
TCP/IP
Digital envelope
13
Gateway (Bastion)
Proxies
Internet
19
Gateway (Bastion)
Allowed
Proxies
Allowed
Router Internet
Private Net Outside
20
Web Server
Gateway (Bastion)
LAN
Router Router
Internet
Private Net
Demilitarized Zone
21
Securing Private Networks Software that is used are proxies and filters that allow or deny network traffic access to either network Proxy programs
application-level circuit-level
Filters
packet filtering
22
Conclusion
Electronic commerce is growing rapidly. A number of technologies have converged to facilitate the proliferation of e-commerce. E Commerce is more secure than most business we conduct everyday and is getting better every minute. Knowing various hacking techniques on the Internet and having built an eCommerce package.
References
Kalakota R, Whinston A B 1999 Frontiers of e-commerce (Reading, MA: Addison-Wesley/Longman) Mazumdar C, BarikMS, Das S, Roy J, BarkatMA2003 e-Commerce security. www.upu.int/security/en/ecommercesecurityen.pdf