You are on page 1of 3

Components of E-Business

Architecture Framework
The core E-Business consists of:

MBA FT- 7601


Managing E-Business

Weekly
Assignment - 3
I. The Common Business Service
Infrastructure
Submitted By: This consists of 6 main elements, which are
Aayush Goyal defined as below:
a. Security
F19-166
Security is one of the major concerns while
Contents conducting business on internet. Majorly,
Components of E-Business Architecture encryption is used to help secure data.
Framework ........................................................ 1 Firewalls, proxies and other services are used
to help protect the applications. Virus
I. The Common Business Service
detection and spam filters are also used.
Infrastructure ................................................ 1
HTTPS (HTTP with SSL) is used to encrypt
II. Messaging and Information Distribution data to ensure its integrity and safety. Secure
Infrastructure ................................................ 2 Sockets Layer (SSL) is a standard for secure
III. Content Development & Publishing interactions use on the Web. It uses a
Infrastructure ................................................ 2 combination of private key encryption and
IV. Deployment & Distribution digital signatures. Concerns remain for e-
Infrastructure ................................................ 2 commerce transactions since there are
numerous examples of data and privacy issues.
V. Application Layer..................................... 3
b. Authentication
Authentication is the security process of
verifying that a user is who he or she says they

1
are. Passwords are the most common type of f. Web Services & Personalization
authentication. Digital signatures are now
A web service is a standardized way of
gaining popularity for authenticating
integrating web-based applications so that
transmitted information. They take place of
organizations can share data transparently.
ordinary signatures in online transactions to
Web services are the basic building blocks of
prove that the sender of message is who he or
the Service Oriented Architecture (SOA). They
she claims to be. They are also sent in
are excellent for integrating systems across
encrypted form to ensure they have not been
organizational boundaries.
forged.
Personalization involves a process of gathering
c. Encryption
user information during interaction with the
Encryption systems translate data into a secret user, which is then used to deliver appropriate
code (multiple types of encryption used). content and services, tailor made to user’s
needs.
Encryption systems include 4 main
components: Plaintext, the unencrypted II. Messaging and Information
message; an encryption algorithm that works Distribution Infrastructure
like the locking mechanism to a safe; a key that This second building block of supporting
works like the safe’s combination; Ciphertext framework for e-commerce includes e-mail,
is produced from the plaintext message by the instant messaging, Voice over IP (VoIP),
encryption function; Decryption is the same point-to-point file transfers (FTP), and
process in reverse but it does not always use groupware though E-mail is still largest use in
the same key or algorithm. this area. ISP (Internet Service Provider)
d. Electronic Payments connects the user to the Internet.

It is a way of making transactions for goods III. Content Development &


and services via electronic medium. Several Publishing Infrastructure
payment methods are used by businesses to It permits organization to publish a full range
make and receive payments on the Internet. of text and multimedia. There are three key
These methods are basically the equivalent of elements of web, URL, Network Protocol
off-line payment methods. A few of the most and Standard Mark-up Language
popular types: Credit Cards, E-Cash, Virtual (HTML). E.g. of materials transported
Terminals, Transaction Processors, Internet include Audio, Video, Graphics, Text, Photos,
Checking, Electronic Funds Transfer, etc. Applications, etc.

e. Search Engines IV. Deployment & Distribution


Infrastructure
Search engines are used to index the contents The lowest level of building block of
of the Internet to locate specific information. supporting framework for e-business includes
Each search engine performs 3 tasks: Crawling, data communications circuits over which
Indexing and Creating Results. Managers information travels. It consists of:
should pay attention to search engines as they
provide useful and extensive access to a. Packet-switched networking
information. They can also provide the (telephony is circuit-switched)
visibility.

2
b. Packets contain overhead information
including addressing
They are also routed, like mail, all of which
flows across Internet backbones. Newer
Internet access technologies include wireless
access, cable access and DSL.
V. Application Layer
The principal purpose of this layer is to provide
web access to applications supporting the
business processes. E-business applications are
web-based applications that can be
implemented to perform tasks for businesses.
These applications are not just for online
businesses, but also for traditional ones. E-
business applications usually rely on
relationships between company servers and
end user computers. Common e-business
applications provide some way for a company
to interact with consumers on the web or to
perform tasks related to meeting consumer
needs (such as online tracking of postal
shipments).

You might also like