Chapter 5 Online Security and Payment Systems 1. Teaching Objectives Describe different types of payment systems. Describe different E-commerce payment.

Slides:



Advertisements
Similar presentations
E-commerce business. technology. society. Kenneth C. Laudon
Advertisements

Traditional Types of Payment Systems
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
E-Commerce Payment Systems
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2013 Pearson Education, Inc.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
E-commerce: business. technology. society.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 5 Security and Encryption
Chapter 6 E-commerce Payment Systems
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © 2007 Pearson Education, Inc. Slide 6-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Copyright © 2015 Pearson Education, Inc.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
E-commerce business. technology. society. Kenneth C. Laudon
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
© Gene Yelle - & Prentice-Hall All rights reserved. CHAPTER 11 E-Commerce Payment Systems.
Chapter 5 E-commerce Security and Payment Systems.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Digital Payment Systems
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2010 Pearson Education, Inc. E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Sixth Edition.
Copyright © 2012 Pearson Education, Inc.
Securing Information Systems
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
CSC 330 E-Commerce Teacher Ahmed Mumtaz Mustehsan Ahmed Mumtaz Mustehsan GM-IT CIIT Islamabad GM-IT CIIT Islamabad CIIT Virtual Campus, CIIT COMSATS Institute.
Electronic Payment Systems
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
PART THREE E-commerce in Action Norton University E-commerce in Action.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright © 2007 Pearson Education, Inc. Slide 6-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Copyright © 2004 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Payment Systems.
Copyright © 2009 Pearson Education, Inc. Slide 5-1 Chapter 5 Online Security and Payment Systems.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Online Security and Payment Systems
MGT 3225: E-Business Lecture 5: E-commerce Security and Payment Systems Md. Mahbubul Alam, PhD.
E-commerceEssentials Kenneth C. Laudon Carol Guercio Traver first edition Copyright © 2014 Pearson Education, Inc.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
1 'According to the 2007 Internet Crime Report, Internet Crime Complaint Center (IC3) received 206,884 complaints of Internet crimes More than 90,000.
Copyright © 2016 Pearson Education, Ltd.
Chapter 4 E-commerce Security and Payment.
Five Types of Payment Systems Cash Checking Transfer Credit Card Stored Value Accumulating Balance.
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
Copyright © 2010 Pearson Education, Inc. E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Sixth Edition.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
E-commerce Pay-pal and other concepts PayPal: The Money’s in the Class Discussion Why was it difficult for individuals to accept credit card payments.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Fourth Edition.
Chapter 5 Electronic Commerce | Payment Methods
Securing Information Systems
E-commerce Payment Systems
Lesson 05-I E-commerce Payments
E-Commerce Payment System
E-commerce business. technology. society. Kenneth C. Laudon
Copyright © 2013 Pearson Education, Inc.
Copyright © 2015 Pearson Education, Inc.
Securing Information Systems
Chapter 4 E-commerce Security and Payment.
Chapter 5 Online Security and Payment Systems
Chapter 5 Electronic Commerce | Payment Methods
Types of Traditional Payment Systems
Presentation transcript:

Chapter 5 Online Security and Payment Systems 1

Teaching Objectives Describe different types of payment systems. Describe different E-commerce payment systems. Introduce E-commerce security including technology solution and management policies. Slide 2

Types of Payment Systems  Cash  Checking Transfer  Credit Card  Stored Value  Accumulating Balance Slide 3

Cash  Legal tender  Most common form of payment in terms of number of transactions  Instantly convertible into other forms of value without intermediation  Portable, requires no authentication  “Free” (no transaction fee), anonymous, low cognitive demands  Limitations: easily stolen, limited to smaller transaction, does not provide any float Slide 4

Checking Transfer  Funds transferred directly via signed draft/check from a consumer’s checking account to merchant/ other individual  Most common form of payment in terms of amount spent  Can be used for small and large transactions  Some float  Not anonymous, requires third-party intervention (banks)  Introduces security risks for merchants (forgeries, stopped payments), so authentication typically required Slide 5

Credit Card  Represents account that extends credit to consumers; allows consumers to make payments to multiple vendors at one time  Credit card associations:  Nonprofit associations (Visa, MasterCard) that set standards for issuing banks  Issuing banks:  Issue cards and process transactions  Processing centers (clearinghouses):  Handle verification of accounts and balances Slide 6

Stored Value  Accounts created by depositing funds into an account and from which funds are paid out or withdrawn as needed  Examples: Debit cards, gift certificates, prepaid cards, smart cards Slide 7

Accumulating Balance  Accounts that accumulate expenditures and to which consumers make period payments  Examples: Utility, phone, American Express accounts Slide 8

Evaluating payment systems  Different stakeholders (consumers, merchants, financial intermediaries, government regulators) have different priorities in payment system dimensions (refutability, risk, anonymity, etc.) Slide 9

Dimensions of Payment Systems Slide 10

E-commerce Payment Systems  Credit cards are dominant form of online payment, accounting for around 60% of online payments in 2008  Other e-commerce payment systems:  Digital wallets  Digital cash  Online stored value payment systems  Digital accumulating balance systems  Digital checking Slide 11

How an Online Credit Transaction Works Slide 12

Limitations of Online Credit Card Payment Systems  Security:  Neither merchant nor consumer can be fully authenticated  Cost:  For merchants, around 3.5% of purchase price plus transaction fee of 20 – 30 cents per transaction  Social equity:  Many people do not have access to credit cards Slide 13

Digital Wallets  Seeks to emulate the functionality of traditional wallet  Most important functions:  Authenticate consumer through use of digital certificates or other encryption methods  Store and transfer value  Secure payment process from consumer to merchant  Early efforts to popularize have failed  Newest effort: Google Checkout Slide 14

Slide 15

Digital Cash  One of the first forms of alternative payment systems  Not really “cash”  Form of value storage and value exchange using tokens that has limited convertibility into other forms of value, and requires intermediaries to convert  Most early examples have disappeared; protocols and practices too complex Slide 16

Digicash: How First Generation Digital Cash Worked Slide 17

Online Stored Value Systems  Permit consumers to make instant, online payments to merchants and other individuals  Based on value stored in a consumer’s bank, checking, or credit card account  PayPal most successful system  Peer-to-peer payment systems Slide 18

Slide 19

Online Stored Value Systems cont.  Smart cards  Contact smart cards: Require physical reader Mondex  Contactless smart cards: Use RFID EZPass Octopus Slide 20

How Ecount.com Works: A Stored Value System Slide 21

Digital Accumulating Balance Payment Systems  Allows users to make micropayments and purchases on the Web  Users accumulate a debit balance for which they are billed at the end of the month  Valista’s PaymentsPlus  Clickshare Slide 22

Digital Checking Payment Systems  Extends functionality of existing checking accounts for use as online shopping payment tool  Example: PayByCheck Slide 23

Wireless Payment Systems  Use of mobile handsets as payment devices well-established in Europe, Japan, South Korea  Japanese mobile payment systems  E-money (stored value)  Mobile debit cards  Mobile credit cards  Not as well established yet in U.S, but with growth in Wi-Fi and 3G cellular phone systems, this is beginning to change Slide 24

Electronic Billing Presentment and Payment (EBPP)  Online payment systems for monthly bills  50% of households in 2008 used some EBPP; expected to grow to 75% by 2012  Two competing EBPP business models:  Biller-direct: Dominant model  Consolidator: Third party aggregates consumer’s bills  Both models are supported by EBPP infrastructure providers Slide 25

Growth of the EBPP Market Slide 26

Major Players in the EBPP Marketspace Slide 27

What Is Good E-commerce Security? To achieve highest degree of security – New technologies – Organizational policies and procedures – Industry standards and government laws Other factors – Time value of money – Cost of security vs. potential loss – Security often breaks at weakest link Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 28

The E-commerce Security Environment Figure 5.1, Page 252 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Table 5.3, Page 254 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

The Tension Between Security and Other Values Ease of use – The more security measures added, the more difficult a site is to use, and the slower it becomes Public safety and criminal uses of the Internet – Use of technology by criminals to plan crimes or threaten nation-state Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 31

Security Threats in the E-commerce Environment Three key points of vulnerability in e- commerce environment: 1. Client 2. Server 3. Communications pipeline (Internet communications channels) Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 32

A Typical E-commerce Transaction Figure 5.2, Page 256 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Vulnerable Points in an E-commerce Transaction Figure 5.3, Page 257 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall

Most Common Security Threats in the E-commerce Environment Malicious code (malware, exploits)  Drive-by downloads  Viruses  Worms  Ransomware  Trojan horses  Backdoors  Bots, botnets  Threats at both client and server levels Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 35

Most Common Security Threats (cont.) Potentially unwanted programs (PUPs)  Browser parasites  Adware  Spyware Phishing  Social engineering  scams  Spear-phishing  Identity fraud/theft Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 36

Most Common Security Threats (cont.) Hacking  Hackers vs. crackers  Types of hackers: White, black, grey hats  Hacktivism Cybervandalism:  Disrupting, defacing, destroying Web site Data breach  Losing control over corporate information to outsiders Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 37

Most Common Security Threats (cont.) Credit card fraud/theft Spoofing and pharming Spam (junk) Web sites (link farms) Identity fraud/theft Denial of service (DoS) attack  Hackers flood site with useless traffic to overwhelm network Distributed denial of service (DDoS) attack Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 38

Most Common Security Threats (cont.) Sniffing  Eavesdropping program that monitors information traveling over a network Insider attacks Poorly designed server and client software Social network security issues Mobile platform security issues  Vishing, smishing, madware Cloud security issues Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 39

Insight on Technology: Class Discussion Think Your Smartphone Is Secure? What types of threats do smartphones face? Are there any particular vulnerabilities to this type of device? What did Nicolas Seriot’s “Spyphone” prove? Are apps more or less likely to be subject to threats than traditional PC software programs? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 40

Technology Solutions Protecting Internet communications – Encryption Securing channels of communication – SSL, VPNs Protecting networks – Firewalls Protecting servers and clients Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 41

A Security Plan: Management Policies Worldwide, companies spend more than $65 billion on security hardware, software, services Managing risk includes: – Technology – Effective management policies – Public laws and active enforcement Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 42

A Security Plan: Management Policies Risk assessment Security policy Implementation plan – Security organization – Access controls – Authentication procedures, including biometrics – Authorization policies, authorization management systems Security audit Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 43

Developing an E-commerce Security Plan Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 44