Professional Documents
Culture Documents
Architecture Framework
The core E-Business consists of:
Weekly
Assignment - 3
I. The Common Business Service
Infrastructure
Submitted By: This consists of 6 main elements, which are
Aayush Goyal defined as below:
a. Security
F19-166
Security is one of the major concerns while
Contents conducting business on internet. Majorly,
Components of E-Business Architecture encryption is used to help secure data.
Framework ........................................................ 1 Firewalls, proxies and other services are used
to help protect the applications. Virus
I. The Common Business Service
detection and spam filters are also used.
Infrastructure ................................................ 1
HTTPS (HTTP with SSL) is used to encrypt
II. Messaging and Information Distribution data to ensure its integrity and safety. Secure
Infrastructure ................................................ 2 Sockets Layer (SSL) is a standard for secure
III. Content Development & Publishing interactions use on the Web. It uses a
Infrastructure ................................................ 2 combination of private key encryption and
IV. Deployment & Distribution digital signatures. Concerns remain for e-
Infrastructure ................................................ 2 commerce transactions since there are
numerous examples of data and privacy issues.
V. Application Layer..................................... 3
b. Authentication
Authentication is the security process of
verifying that a user is who he or she says they
1
are. Passwords are the most common type of f. Web Services & Personalization
authentication. Digital signatures are now
A web service is a standardized way of
gaining popularity for authenticating
integrating web-based applications so that
transmitted information. They take place of
organizations can share data transparently.
ordinary signatures in online transactions to
Web services are the basic building blocks of
prove that the sender of message is who he or
the Service Oriented Architecture (SOA). They
she claims to be. They are also sent in
are excellent for integrating systems across
encrypted form to ensure they have not been
organizational boundaries.
forged.
Personalization involves a process of gathering
c. Encryption
user information during interaction with the
Encryption systems translate data into a secret user, which is then used to deliver appropriate
code (multiple types of encryption used). content and services, tailor made to user’s
needs.
Encryption systems include 4 main
components: Plaintext, the unencrypted II. Messaging and Information
message; an encryption algorithm that works Distribution Infrastructure
like the locking mechanism to a safe; a key that This second building block of supporting
works like the safe’s combination; Ciphertext framework for e-commerce includes e-mail,
is produced from the plaintext message by the instant messaging, Voice over IP (VoIP),
encryption function; Decryption is the same point-to-point file transfers (FTP), and
process in reverse but it does not always use groupware though E-mail is still largest use in
the same key or algorithm. this area. ISP (Internet Service Provider)
d. Electronic Payments connects the user to the Internet.
2
b. Packets contain overhead information
including addressing
They are also routed, like mail, all of which
flows across Internet backbones. Newer
Internet access technologies include wireless
access, cable access and DSL.
V. Application Layer
The principal purpose of this layer is to provide
web access to applications supporting the
business processes. E-business applications are
web-based applications that can be
implemented to perform tasks for businesses.
These applications are not just for online
businesses, but also for traditional ones. E-
business applications usually rely on
relationships between company servers and
end user computers. Common e-business
applications provide some way for a company
to interact with consumers on the web or to
perform tasks related to meeting consumer
needs (such as online tracking of postal
shipments).