Chapter 10. e-payments
|
|
|
- Sibyl Bishop
- 10 years ago
- Views:
Transcription
1 Chapter 10 e-payments AIS 360Prentice Hall,
2 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss the players and processes involved in using credit cards online Describe the uses and benefits of purchase cards AIS 360 2
3 Learning Objectives (cont.) Describe different categories and potential uses of smart cards Discuss various online alternatives to credit card payments and identify under what circumstances they are best used Describe the processes and parties involved in e-checking AIS 360 3
4 Electronic Payments Paying with credit cards online Until recently consumers were extremely reluctant to use their credit card numbers on the Web This is changing because: Many of people who will be on the Internet in 2004 have not even had their first Web experience today 85% of the transactions that occur on the Web are B2B rather than B2C (credit cards are rarely used in B2B transactions) AIS 360 4
5 Electronic Payments (cont.) Four parties involved in e-payments Issuer (financial institutions) Customers must obtain e-payment accounts from an issuer Issuers are usually involved in authenticating a transaction and approving the amount involved Customer/payer/buyer Merchant/payee/seller Regulator (govt. agency) AIS 360 5
6 Electronic Payments (cont.) Key issue of trust must be addressed PAIN Privacy Authentication and authorization Integrity Nonrepudiation -non-refundable Characteristics of successful e-payment methods Independence Interoperability and portability Security Anonymity Divisibility Ease of use Transaction fees AIS 360 6
7 Security for E-Payments Public key infrastructure (PKI) a scheme for securing e-payments using public key encryption and various technical components; digital signatures, digital certificates with a network application. PKI is also the foundation of a number of network applications including: Supply chain management Virtual private networks Secure Intranet applications AIS 360 7
8 Security for E-Payments Public key encryption Encryption (cryptography) the process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time consuming for an unauthorized person to unscramble (decrypt) it AIS 360 8
9 Security for E-Payments (cont.) All encryption has four basic parts: Plaintext the original message in humanreadable form Ciphertext a plaintext message after it has been encrypted into unreadable form Encryption algorithm the mathematical formula used to encrypt the plaintext into ciphertext and vice versa Key the secret code used to encrypt and decrypt a message AIS 360 9
10 Security for E-Payments (cont.) Two major classes of encryption systems: Symmetric (private key) Used to encrypt and decrypt plain text Shared by sender and receiver of text Asymmetric (public key) Uses a pair of keys Public key to encrypt the message Private key to decrypt the message AIS
11 Security for E-Payments (cont.) Public key encryption method of encryption that uses a pair of keys a public key to encrypt a message and a private key (kept only by its owner) to decrypt it, or vice versa Private key secret encryption code held only by its owner Public key secret encryption code that is publicly available to anyone AIS
12 Exhibit 10.1 Private Key Encryption AIS
13 Security for E-Payments (cont.) Digital signatures an identifying code that can be used to authenticate the identity of the sender of a message or document Used to: Authenticate/validate the identity of the sender of a message or document Ensure the original content of the electronic message or document is unchanged AIS
14 Security for E-Payments (cont.) Digital Signatures how they work: 1. Create an message with the contract in it 2. Using special software, you hash the message, converting it into a string of digits (message digest) 3. You use your private key to encrypt the hash (your digital signature) AIS
15 Security for E-Payments (cont.) 4. the original message along with the encrypted hash to the receiver 5. Receiver uses the same special software to hash the message they received 6. Company uses your public key to decrypt the message hash that you sent. If their hash matches the decrypted hash, then the message is valid AIS
16 Exhibit 10.3 Digital Signatures AIS
17 Security for E-Payments (cont.) Digital certificates verification that the holder of a public or private key is who he or she claims to be Certificate authorities (CAs) third parties that issue digital certificates Name : Richard key-exchange Key : Signature Key : Serial # : Other Data : Expires : 6/18/04 Signed : CA s Signature AIS
18 Standards for E-Payments Protocols for securing e-payments: Secure socket layer (SSL) protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality. Transport Layer Security (TLS) as of 1996, another name for the Secure Socket Layer protocol AIS
19 Standards for E-Payments (cont.) Secure Electronic Transaction (SET) a protocol designed to provide a complete secure online credit card transactions for both consumers and merchants; developed jointly by Netscape, Visa, MasterCard, and others AIS
20 Electronic Cards and Smart Cards Payment cards electronic cards that contain information that can be used for payment purposes Credit cards provides holder with credit to make purchases up to a limit fixed by the card issuer Charge cards balance on a charge card is supposed to be paid in full upon receipt of monthly statement Debit card cost of a purchase drawn directly from holder s checking account (demand-deposit account) AIS
21 Electronic Cards and Smart Cards (cont.) The Players Cardholder Merchant (seller) Issuer (your bank) Acquirer (merchant s financial institution, acquires the sales slips) Card association (VISA, MasterCard) Third-party processors (outsourcers performing same duties formerly provided by issuers, etc.) AIS
22 Exhibit 10.4 Online Credit Card Processing AIS
23 Electronic Cards and Smart Cards (cont.) Credit card gateway an online connection that ties a merchant s systems to the backend processing systems of the credit card issuer Virtual credit card an e-payment system in which a credit card issuer gives a special transaction number that can be used online in place of regular credit card numbers AIS
24 Electronic Cards and Smart Cards (cont.) Electronic wallets (e-wallets) a software component in which a user stores credit card numbers and other personal information; when shopping online; the user simply clicks the e- wallet to automatically fill in information needed to make a purchase One-click shopping saving your order information on retailer s Web server E-wallet software downloaded to cardholder s desktop that stores same information and allows one-click-like shopping AIS
25 Electronic Cards and Smart Cards (cont.) Security risks with credit cards Stolen cards Reneging by the customer authorizes a payment and later denies it Theft of card details stored on merchant s computer isolate computer storing information so it cannot be accessed directly from the Web AIS
26 Electronic Cards and Smart Cards (cont.) Purchasing cards special-purpose payment cards issued to a company s employees to be used solely for purchasing nonstrategic materials and services up to a preset dollar limit AIS
27 E-Cards (cont.) Benefits of using purchasing cards Productivity gains (more time to focus on relationship with suppliers) Bill consolidation (of small purchases) Payment reconciliation (integrate with GL) Preferred pricing Management reports Control (the unplanned purchases) AIS
28 Exhibit 10.5 Participants & Process of Using a Purchasing Card AIS
29 Smart Cards Smart card an electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card AIS
30 Smart Cards (cont.) Categories of smart cards Contact card a smart card containing a small gold plate on the face that when inserted in a smart-card reader makes contact and so passes data to and from the embedded microchip Contactless (proximity) card a smart card with an embedded antenna, by means of which data and applications are passed to and from a card reader unit or other device AIS
31 Smart Cards (cont.) Securing smart cards Theoretically, it is possible to hack into a smart card Most cards can now store the information in encrypted form Same cards can also encrypt and decrypt data that is downloaded or read from the card Cost to the attacker of doing so far exceeds the benefits AIS
32 Smart Cards (cont.) Important applications of smart card use: Loyalty Financial Information technology Health and social welfare Transportation Identification AIS
33 E-Cash and Innovative Payment Methods E-cash the digital equivalent of paper currency and coins, which enables secure and anonymous purchase of low-priced items Micropayments small payments, usually under $10 AIS
34 E-Coin.net System consists of three participants: User Opens an account with ecoin.com Downloads a special e-wallet to their desktop PC Purchases some ecoins with a credit card Merchant embeds a special ecoin icon in its payment page ecoin server operates as a broker Keeps customer and merchant accounts Accepts payment requests from the customer s e- wallet Computes embedded invoices for the merchant AIS
35 E-Cash and Payment Card Alternatives(cont.) Wireless payments Vodafone m-pay bill system that enables wireless subscribers to use their mobile phones to make micropayments Qpass (qpass.com); micropayment system used to purchase content from news services (New York Times) Charges to qpass account, are charged to a specified credit card on a monthly basis AIS
36 Stored-Value Cards Stores cash downloaded from bank or credit card account Visa cash a stored-value card designed to handle small purchases or micropayments; sponsored by Visa Mondex a stored-value card designed to handle small purchases or micropayments; sponsored by Mondex, a subsidiary of MasterCard AIS
37 E-Loyalty and Reward Programs Loyalty programs online B2C sites spend hundreds of dollars acquiring new customers Payback only comes from repeat customers who are likely to refer other customers to a site Electronic script a form of electronic money (or points), issued by a third party as part of a loyalty program; can be used by consumers to make purchases at participating stores AIS
38 Internetcash.com Teenage market primary reason for going online Communicating with friends via and chat rooms homework Researching information Playing games Downloading music or videos AIS
39 Internetcash (cont.) Why they do not shop online Parents will not let them children their (the parents) credit cards online They cannot touch the products It is difficult to return items purchased on the Web They do not have the money Transaction may be insecure AIS
40 Person-to-Person Payments Person-to-person (P2P) payments epayment schemes (such as paypal.com) that enable the transfer of funds between two individuals Repaying money borrowed Paying for an item purchased at online auction Sending money to students at college Sending a gift to a family member AIS
41 Global B2B Payments Letters of credit (LC) a written agreement by a bank to pay the seller, on account of the buyer, a sum of money upon presentation of certain documents TradeCard (tradecard.com) innovative e- payment method that uses a payment card AIS
42 Electronic Letters of Credit (LC) Benefits to sellers Credit risk is reduced Payment is highly assured Political/country risk is reduced Benefits to the buyer Allows buyer to negotiate for a lower purchase price Buyer can expand its source of supply Funds withdrawn from buyer s account only after the documents have been inspected by the issuing bank AIS
43 TradeCard Payments (alternative to LoC) TradeCard allows businesses to effectively and efficiently complete B2B transactions whether large or small, domestic or cross-border, or in multiple currencies Buyers and sellers interact with each other via the TradeCard system System Checks purchase orders for both parties Awaits confirmation from a logistics company that deliveries have been made and received Authorizes payment completing financial transaction between the buyer and seller AIS
44 E-Checking E-check the electronic version or representation of a paper check Eliminate need for expensive process reengineering and takes advantage of the competency of the banking industry echeck Secure (from vantaguard.com) and checkfree.com provide software that enables the purchase of goods and services with e-checks Used mainly in B2B AIS
45 Summary Crucial factors determining the success of an e-payment method Key elements in securing an e-payment Online credit card players and processes The uses and benefits of purchasing cards Categories and potential uses of smart cards Online alternatives to credit card payments AIS
46 Summary (cont.) E-check processes and involved parties AIS
Chapter 12. Electronic Payment Systems. 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.
Chapter 12 Electronic Payment Systems 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Learning Objectives 1. Understand the shifts that are occurring with regard to noncash
Chapter 12. Learning Objectives. Learning Objectives. Electronic Payment Systems
Chapter 12 Electronic Payment Systems 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Learning Objectives 1. Understand the shifts that are occurring with regard to noncash
Electronic Payment Systems. Dr Sherif Kamel
Electronic Payment Systems Dr Sherif Kamel Payment Evolution Important Factors Interoperability and portability Security Ease of use Transaction fees Regulations and procedures Acceptability and trust
1.Because e-commerce is ubiquitous it reduces A. marketspace. B. transaction costs. C. dynamic pricing. D. price discrimination.
1.Because e-commerce is ubiquitous it reduces A. marketspace. B. transaction costs. C. dynamic pricing. D. price discrimination. 2. The ability of consumers to use the Internet to discover the actual costs
Electronic Commerce and E-wallet
International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: [email protected]
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Smart cards that have erasable memory and are modifiable are. 1) A) EPROM cards B) EEPROM
The e-payment Systems
The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic
Analysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
Payment Systems for E-Commerce. Shengyu Jin 4/27/2005
Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 6-1 E-commerce business. technology. society. Third Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 6-2 Chapter
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
E-Commerce Transaction. PayPal: The Money s in the E-mail. Points of Vulnerability. PayPal: The Money s in the E-mail. Types of Payment Systems
E-Commerce Transaction E-commerce Payment Systems Slides from Ecommerce by Laudon and Traver Copyright 2004 Pearson Education, Inc. Slide 6-1 Points of Vulnerability PayPal: The Money s in the E-mail PayPal:
E-COMMERCE and SECURITY - 1DL018
1 E-COMMERCE and SECURITY - 1DL018 Spring 2009 An introductury course on e-commerce systems alt. http://www.it.uu.se/edu/course/homepage/ehandel/vt09/ Kjell Orsborn Uppsala Database Laboratory Department
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
Internet Usage (as of November 1, 2011)
ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Online Payment Process. Name Kathleen Kaye Acosta Nr. 230431 Course E-Business Technologies SS2008 Professor Dr. Eduard Heindl
Online Payment Process Name Kathleen Kaye Acosta Nr. 230431 Course E-Business Technologies SS2008 Professor Dr. Eduard Heindl Declaration This is to certify that this term paper has been written by me.
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems
CHAPTER 6 E-commerce Payment Created by, David Zolzer, Northwestern State University Louisiana Copyright 2002 Pearson Education, Inc. Slide 6-1 Copyright 2002 Pearson Education, Inc. Slide 6-2 Learning
Electronic Payment Systems. Traditional Methods
Electronic Payment Systems Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Traditional Methods Traditional
Framework of e-commerce
Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
Chapter 5. Online Payment System. Types of Payment Systems. Cash Checking Transfer Credit Card Stored Value Accumulating Balance
Chapter 5 Online Payment System Copyright 2007 Pearson Education, Inc. Slide 5-64 Types of Payment Systems Cash Checking Transfer Credit Card Stored Value Accumulating Balance Copyright 2007 Pearson Education,
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Electronic Cash Payment Protocols and Systems
Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005
Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol
Electronic Payments. EITN40 - Advanced Web Security
Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin
PopimsCard. Franck GUIGAN [email protected] +33 6 14 63 93 36. The magic card. February 16. 2016
PopimsCard The magic card February 16. 2016 Franck GUIGAN [email protected] +33 6 14 63 93 36 We all need to identify other persons, but official documents are not safe: Authenticating an ID card
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
The Definition of Electronic Payment
Part IX: epayment Learning Targets What are the electronic means of payment? What is the difference between pico-, micro- and macro-payment? How can we classify the e-payment systems? How can secure transactions
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Account-Based Electronic Payment Systems
Account-Based Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry Sept., 2000 Topic: Account-Based Electronic
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Java E-Commerce Martin Cooke, 2002 1
Java E-Commerce Martin Cooke, 2002 1 Money, architecture & enterprise Today s lecture Online monetary transactions Tiered architectures Java Enterprise (J2EE) Online monetary transactions* Martin Cooke
On-line Payment and Security of E-commerce
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
Wireless epay Configuration and User Guide (Jave version)
Wireless epay Configuration and User Guide (Jave version) INDEX 1 Section 1 - Installing Cradle/Card Reader to Phone... Page 04 Section 2 - Settings... Page 06 Section 3 - Starting and Login in to Wireless
Electronic Commerce. Chapter Overview
Electronic Commerce Chapter Overview This chapter presents an overview of how e-commerce works, from the perspective of the organization and the customer. Businesses and individuals use e-commerce to reduce
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
TABLE OF CONTENTS INTRODUCTORY THE FOUNDATION OF E & M. 4. E-Commerce & M-Commerce Technologies. (c) Internet Based Research Approaches.
TABLE OF CONTENTS Chapter 1 INTRODUCTORY THE FOUNDATION OF E & M 1. Conceptual Analysis of E-Commerce. 2. Objective of Study. 3. What is M-Commerce. 4. E-Commerce & M-Commerce Technologies. 5. Scope of
Web Security: Encryption & Authentication
Web Security: Encryption & Authentication Arnon Rungsawang [email protected] Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,
Card Payments in ecommerce
Card Payments in ecommerce Mike Burns Visa USA Berkeley, CA / November 3, 1998 Session Agenda Introduction Visa Organization Definitions & Concepts Card Products Overview Consumer vs. Commercial Marketplace
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
This tutorial takes adopts a simple and practical approach to explain the governing principles of e-commerce.
About the Tutorial E-Commerce or Electronics Commerce is a methodology of modern business, which addresses the requirements of business organizations. It can be broadly defined as the process of buying
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
The World of Emerging Payment Systems A Brief Introduction
The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management
Introduction to E-commerce
i Zheng Qin Introduction to E-commerce With 98 figures Springer Contents Part 1 Fundamentals 1 Fundamentals of E-commerce 3 1.1 The Origin and Development of E-commerce 4 1.1.1 The Origin and Development
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
2015-11-02. Electronic Payments Part 1
Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced
Google Payments Terms of Service Buyer (US)
Google Payments Terms of Service Buyer (US) September 10, 2015 These Terms of Service are a legal agreement, between you and Google Payment Corp. ("GPC" or "we"), a wholly owned subsidiary of Google Inc.,
BRIEF INTRODUCTION TO CRYPTOGRAPHY. By PAGVAC. February 8, 2004
BRIEF INTRODUCTION TO CRYPTOGRAPHY By PAGVAC February 8, 2004 What will I learn from this file? What cryptography is How encryption and decryption works Cryptography terms Symmetric cryptography Asymmetric
Electronic Commerce. 4. Payment Schemes. V Rajaraman. In this part, we will describe payments using credit cards and cheques in e-commerce.
Electronic Commerce 4. Payment Schemes V Rajaraman In this part, we will describe payments using credit cards and cheques in e-commerce. V Rajaraman is with the Jawaharlal Nehru Centre for Advanced Scientific
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES
understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES contents UNDERSTANDING SSL CERTIFICATES...1 What Is SSL and What Are SSL Certificates?...1 Features of SSL...1 Encryption...1
GP webpay - service description
GP webpay - service description Version: 2.0 Global Payments Europe, s.r.o. Created 15.10.2015 Last update 14.12.2015 Author Dimitrij Holovka Manager Approved by Version 2.0 Confidentiality Confidential
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Instructions on TLS/SSL Certificates on Yealink Phones
Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as
Bankwest. Account Access. Conditions of Use 19 May 2015. making banking easier
Bankwest Account Access Conditions of Use 19 May 2015 making banking easier Product Disclosure Statement If you are opening a Bankwest-branded Investment and Transaction Account with us, or are applying
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
E-commerce Shopping Carts Digital Cert. Merchants
E-commerce Shopping Carts Digital Cert. Merchants What is E-commerce? In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. People
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
