Electronic Payment Security Technologies

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Chapter 8 Web Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
The Secure Sockets Layer (SSL) Protocol
Chapter 7 - Secure Socket Layer (SSL)
Virtual Private Network (VPN)
Unit 3 Section 6.4: Internet Security
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 8 Building the Transaction Database
Visit for more Learning Resources
BY GAWARE S.R. DEPT.OF COMP.SCI
Topic 1: Data, information, knowledge and processing
E-Commerce Security.
Using SSL – Secure Socket Layer
12 E-Commerce Overview.
Cryptography and Network Security
Public Key Infrastructure
Pooja programmer,cse department
Cryptography and Network Security
Secure Electronic Transaction (SET) University of Windsor
The Secure Sockets Layer (SSL) Protocol
Secure Socket Layer (SSL) Transport Layer Security (TLS)
Unit 8 Network Security.
Cryptography and Network Security
Presentation transcript:

Electronic Payment Security Technologies

Authentication Your signature here! Digital signatures A unique code applied to an electronically transmitted message that identifies the sender Uses hashing technology so that changing the code will no longer match with the document Your signature here!

Digital Certificates An electronic document that verifies the sender or receiver’s identify Certificate authority Types and classes of digital certificate Site certificates Personal authority certificates Certifying authority certificates Software publisher certificates

Secure Sockets Layer (SSL) A protocol designed to provide a secure connection between the sender and receiver of information Server name of https://

Functioning of SSL Three basic properties of secure channel The channel is private The channel is authenticated The channel is reliable

Establishing an SSL Secure Connection User browses Web Selects payment screen Request sent to server Server returns payment screen Server returns certificate 6. Browser picks one algorithm Browser creates key pair Browser encrypts secret key Browser sends encrypted key to server Server decrypts Two-way encrypted transmissions can occur

Secure Electronic Transaction (SET) A security protocol designed for handling encrypted electronic payments online Specifications include: Confidentiality of information Payment data integrity Authentication of merchants, cardholders, and clearinghouses Interoperability with other protocols Dual Signature

Digital Wallet Software that encrypts payment information and stores it in a file Opponents suggest serious privacy and security issues