Lectures for the course: Electronic Commerce Technology (IT 60104)



Similar documents
NETWORK ADMINISTRATION AND SECURITY

TABLE OF CONTENTS INTRODUCTORY THE FOUNDATION OF E & M. 4. E-Commerce & M-Commerce Technologies. (c) Internet Based Research Approaches.

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

ELECTRONIC COMMERCE WORKED EXAMPLES

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Java E-Commerce Martin Cooke,

Security for Computer Networks

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Table of Contents. Bibliografische Informationen digitalisiert durch

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Network Security Course Specifications

Lecture 9 - Network Security TDTS (ht1)

Chapter 8. Network Security

CRYPTOG NETWORK SECURITY

Introduction to E-commerce

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

EXAM questions for the course TTM Information Security May Part 1

Chapter 10. Network Security

Introduction to Cyber Security / Information Security

Properties of Secure Network Communication

SCP - Strategic Infrastructure Security

Network Security. Omer Rana

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model.

Internet Part 2. CS/MIS Department

IT Networks & Security CERT Luncheon Series: Cryptography

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

CSci 530 Midterm Exam. Fall 2012

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

VALLIAMMAI ENGINEERING COLLEGE

ACH, EFT, SET, SSL, IOTP

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

E-Business, E-Commerce

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: )

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Chapter 10. e-payments

CRYPTOGRAPHY AND NETWORK SECURITY

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Network Security. Outline of the Tutorial

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Module 6. e-business and e- Commerce

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS

Weighted Total Mark. Weighted Exam Mark

Content Teaching Academy at James Madison University

E-Commerce Issues and Challenges

XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006

Mobile Office Security Requirements for the Mobile Office

Evaluating The Performance of Symmetric Encryption Algorithms

Security. Learning Objectives. This module will help you...

CNT Computer and Network Security Review/Wrapup

Security Policy Revision Date: 23 April 2009

Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Electronic Commerce. 4. Payment Schemes. V Rajaraman. In this part, we will describe payments using credit cards and cheques in e-commerce.

A Simulation Game for Teaching Secure Data Communications Protocols

Computer System Management: Hosting Servers, Miscellaneous

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

E-Commerce Project Management Implementation Phd. Ion Ivan, Saha Priyatosh, Asist. Cristian Toma

ISM/ISC Middleware Module

Chapter 7: Network security

Security Goals Services

III B.Com. (International Business) [ ] Semester: V Core: Practices of E-Business 517B Multiple Choice Questions.

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Answer Question No. 1 which is compulsory and any five from the rest. a) What are the various components of electronic commerce applications?

Internet Usage (as of November 1, 2011)

E-Commerce Transaction. PayPal: The Money s in the . Points of Vulnerability. PayPal: The Money s in the . Types of Payment Systems

C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY

CS Final Exam

Page 1. Session Overview: Cryptography

What is network security?

Chapter 7 Transport-Level Security

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

CS 758: Cryptography / Network Security

Tim Bovles WILEY. Wiley Publishing, Inc.

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

CRYPTOGRAPHY IN NETWORK SECURITY

Swedbank Payment Portal Implementation Overview

ETSI TR V1.2.1 ( )

VoIP Security. Seminar: Cryptography and Security Michael Muncan

An Introduction to Cryptography as Applied to the Smart Grid

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Framework of e-commerce

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Cryptography & Network Security

Lecture 9: Application of Cryptography

Information Security and Cryptography

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security Essentials Chapter 5

Transcription:

Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce vis-à-vis E-Business Interplay between E-Commerce and E-Business Lecture 3 4/01/2011 Electronic Market Electronic trade process Characteristic features of E-Commerce Lecture 4 6/01/2011 E-Commerce business models Various type of classification of E-Commerce business models Week 3 Lecture 5 10/01/2011 Reacp of topics covered B2B E-Commerce characteristics Advantages of B2B E-Commerce B2C E-Commerce Lecture 6 11/01/2011 B2C E-Commerce various scenarios Steps in B2C E-Commerce Various B2C business models C2C, C2B, P2P and M-Commerce business models

Layered architecture of E-Commerce Lecture 7 13/01/2011 Plan for E-Commerce project development Literature survey Week 4 Lecture 8 17/01/2011 Introduction to cryptography Basic terms Security violation scenarios Types of attack Lecture 9 18/01/2011 Types of cipher Caeser cipher and other basic substitution ciphers Attacks on substitution cipher Letter and bigram, trigram frequencies Mono-alphabetic and poly-alphabetic substitution ciphers Lecture 10 20/01/2011 DFDs Project GUIs developed Database connectivity Research issues identified Week 5 Lecture 11 25/01/2011 Transposition ciphers Symmetric key encryption S-DES overview and key generation Lecture 12 27/01/2011 Database designs GUIs developed

Password encryption Week 6 Lecture 13 01/02/2011 DES Key generation and encryption Strengths and weaknesses Lecture 14 03/02/2011 Database designs GUIs developed Week 7 Lecture 15 07/02/2011 DES Modes of operation Double DES and Triple DES Meet in the Middle Attack AES overview Lecture 16 10/02/2011 Flow of operations Further improvement Plan for incorporating new ideas Week 8 Lecture 17 14/02/2011 Key distribution in symmetric key cryptography Public key cryptography RSA Basic principle and application Digital signature application Lecture 18 15/02/2011 Diffie-Hellman Key exchange

Digital Certificates Application in B2C E-Commerce Week 9 Mid Sem Exam held Week 10 Lecture 19 28/02/2011 Mid-sem scripts shown Introduction to electronic payment Traditional payment schemes Requirements for electronic payment schemes Lecture 20 01/03/2011 Credit card processing steps. Lecture 21 04/03/2011 Plan for new algorithm development Week 11 Lecture 22 07/03/2011 Basic SSL based credit card transaction for B2C E-commerce SET Protocol Dual Signature Lecture 23 08/03/2011 Electronic Funds transfer Automated Cheque clearance Electronic clearing service Lecture 24 11/03/2011 Student presentation on dynamic pricing Student presentation on recommender systems

Week 12 Lecture 25 14/03/2011 Electronic Cheque Payment Electronic Fund Transfer Lecture 26 15/03/2011 Electronic Cash Basic protocol Problems in basic protocol Lecture 27 17/03/2011 Student presentation on game theoretic modeling of auctions Student presentation on various types of recommender systems Week 13 Lecture 28 21/03/2011 Chaum s blinding protocol Smart card based payment Payment gateways Paypal Lecture 29 22/03/2011 Micropayment for information goods Credit card fraud detection (CCFD) introduction Challenges in CCFD Lecture 30 24/03/2011 Progress on recommender system design and auction system design Feedback on methods that can be followed Week 13 Lecture 31 28/03/2011 Credit card fraud detection using sequence alignment

Lecture 32 29/03/2011 Issues in credit card fraud detection Use of multiple rules Real life situations experienced by cardholders known cases of denial of service True positive vs. False positive design choice revisited Lecture 33 31/03/2011 Electronic Data Interchange XML for data exchange Website design guidelines for B2C and C2C business models Week 13 Lecture 34 04/04/2011 E-Commerce of multimedia E-books Audio sales Lecture 35 05/04/2011 Video on Demand IPR Issues Technological and business solutions Lecture 36 07/04/2011 Student presentation on new game theoretic modeling of auction Student presentation on recommender system development Week 14 Lecture 37 11/04/2011 Legal aspects of E-commerce IT Act 2000 2008 amendments Lecture 38 13/04/2011 Mobile E-commerce Layered architecture WAP

Week 15 Lecture 39 18/04/2011 Secure connection in cellular network Location of WAP gateway Mobile payment systems Mobile banking Lecture 40 19/04/2011 Summary and conclusion