Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Payment Gateway Onno W. Purbo Issu Utama Payment Method Security Certificate Authority Cyberlaw.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
CE80N Introduction to Networks & The Internet Dr. Chane L. Fullmer UCSC Winter 2002.
Electronic Commerce Security Presented by: Chris Brawley Chris Avery.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
ON LINE BANKING ON LINE BANKING b You have the option of doing virtually all of your banking without leaving home 24 hours a day. b OB transforms your.
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Traditional and Electronic Payment Methods Chapter 3.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10 E-Commerce Security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Unit 19 INTERNET SECURITY
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Internet Security facilities for secure communication.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Internet Security for Small & Medium Business Week 6
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
Traditional and Electronic Payment Methods Chapter 3.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Types of Electronic Infection
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Payment Systems Unit 34: E-commerce M2 - Compare two different payment systems used in e-commerce systems.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models Storefront.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
SECURITY ON THE WEB SITE Miguel Angel Vazquez Gonzalez.
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
E-Commerce Infrastructure. Learning Objectives 1. Understand the major components of EC infrastructure. 2. Understand the importance and scope of security.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Chapter 40 Internet Security.
Lecture 5. Security Threats
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Chapter 17 Risks, Security and Disaster Recovery
Onno W. Purbo Payment Gateway Onno W. Purbo
BY GAWARE S.R. DEPT.OF COMP.SCI
Unit 8 Network Security.
Presentation transcript:

Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping, online banking, invesing, bill paying Security Made E-commerce Possible (shopping cart) Secure Sockets (SSL) Public Key Encryption Provides Authenticity –Public key encryption is surprisingly general -- in addition to guaranteeing that messages remain confidential, it can be used to verify authenticity. –Encryption Software Needs a Key

Chapter 30 - Electronic Commerce and Business Digital Signatures –A digital signature consists of a special form of encrypted message; the encryption technology guarantees that a digital signature cannot be forged. Certificates Contain Public Keys What is Digital Money? (like a debit card) Digital Cash Is Not Widely Available –micropayments Business and E-commerce A Business Must Protect Its Networks Firewalls Protect Networks

Chapter 30 - Electronic Commerce and Business A Firewall Filters Packets Firewalls Guard Against Trojan Horses –A firewall is placed between a company and the Internet to restrict access to the company from the outside. To prevent a Trojan horse attack, the firewall also restricts access to the Internet from within the company. DEFINITIONS OF VIRUSES AND OTHER COMPUTER "VERMIN"

Chapter 30 - Electronic Commerce and Business Terms –e-commerce –e-business –shopping cart –sockets –public key encryption –digital signature –digital money –firewall –Trojan horse –virus –worm