SlideShare a Scribd company logo
1 of 13
 E – Commerce - Electronic commerce refers to the
buying and selling of products or services over
electronic systems such as the Internet and
other computer networks.
 It also includes the entire online process of
developing, marketing, selling, delivering, servicing
and paying for products and services.
 Domestic and international payment systems
 Group buying
 Instant messaging
 Online banking
 Online office suites
 Shopping cart software
 Teleconferencing
 Electronic tickets
 Businesses also have been engaging in a form of e-
commerce, known as electronic data interchange
(EDI), for many years.
 Banks have been using electronic funds transfers
(EFTs) which are electronic transmissions of account
exchange information over private communications
networks.
 Testing is crucial to e-commerce because e-commerce
sites are both business critical and highly visible to
their users; any failure can be immediately expensive
in terms of lost revenue and even more expensive in
the longer term if disaffected users seek alternative
sites.
 Security has three main concepts: confidentiality, integrity,
and availability.
 Confidentiality - Confidentiality allows only authorized
parties to read protected information. For example, if the
postman reads your mail, this is a breach of your privacy
 Integrity - Integrity ensures data remains as is from the
sender to the receiver. If someone added an extra bill to the
envelope, which contained your credit card bill, he has
violated the integrity of the mail.
 Availability - Availability ensures you have access and
are authorized to resources. If the post office destroys
your mail or the postman takes one year to deliver your
mail, he has impacted the availability of your mail.
 The need for security testing of an organization arises
due to two main factors-
 The primary factor is the importance of measuring
the extent to which the security infrastructure
implements the security policy and the security
requirements of an organization. As the
implementation of the security infrastructure needs
human interventions, a proper security testing is
needed to check out the existence of any “human
error”.
 The other factor is the vulnerability of the existing
security infrastructure to the new threats and exploits.
In recent years, the rate of arrival of new types of
threat and new exploits has been alarming with
respect to the information security context. This leads
to the need for periodical security testing by which the
vulnerability of the existing security infrastructure to
the growing number of threats and exploits can be
measured.
 There are two aspects of testing – compliance checking
and penetration testing.
 Compliance checking: In compliance checking, it is
seen whether the security infrastructure, that has been
implemented, matches the security policy of the
organization. A semi automated tool can be used to
match the policies with the existing infrastructure.
 Penetration testing: In penetration testing, it is seen
whether the existing security infrastructure of the
organization is sufficient to ward off all possible
security threats. Various automated and semi-
automated security tools like Retina, Nessus etc. are
available for penetration testing. They try and
penetrate the organization’s network and generate a
report on the vulnerabilities and threats that are
present in the network.
 Spam Relaying & Harvesting
 Data Leakage
 SQL Injection attacks
 Unsuccessful login attempts
 Weak Login forms
E commerce testing

More Related Content

What's hot

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system Kushagr sharma
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commercenikitaTahilyani1
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce securityNuth Otanasap
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A PrimerJohn ILIADIS
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social EngineeringVarunjeet Singh Rekhi
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and ThreatsBPalmer13
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management Rishi Kant
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 

What's hot (19)

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Ec2009 ch10 e commerce security
Ec2009 ch10 e commerce securityEc2009 ch10 e commerce security
Ec2009 ch10 e commerce security
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social Engineering
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Threats
ThreatsThreats
Threats
 
Security
SecuritySecurity
Security
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 

Viewers also liked (14)

Smu mba sem 4 mis summer 2016 assignments
Smu mba sem 4 mis summer 2016 assignmentsSmu mba sem 4 mis summer 2016 assignments
Smu mba sem 4 mis summer 2016 assignments
 
Bussiness needs
Bussiness needsBussiness needs
Bussiness needs
 
Overview of E-commerce
Overview of E-commerceOverview of E-commerce
Overview of E-commerce
 
E-commerce in India
E-commerce in IndiaE-commerce in India
E-commerce in India
 
05 Business Models for E-commerce slides
05 Business Models for E-commerce slides05 Business Models for E-commerce slides
05 Business Models for E-commerce slides
 
E commerce full notes for mba
E commerce full notes for mba E commerce full notes for mba
E commerce full notes for mba
 
E business models
E business modelsE business models
E business models
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
 
E commerce
E commerceE commerce
E commerce
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E commerce
E commerceE commerce
E commerce
 

Similar to E commerce testing

1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCSantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCAbbyWhyte974
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKScsandit
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 

Similar to E commerce testing (20)

1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
security IDS
security IDSsecurity IDS
security IDS
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
C018131821
C018131821C018131821
C018131821
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 

More from BugRaptors

Performance Testing - A Catalyst In Software Testing Landscape
Performance Testing - A Catalyst In Software Testing LandscapePerformance Testing - A Catalyst In Software Testing Landscape
Performance Testing - A Catalyst In Software Testing LandscapeBugRaptors
 
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design 13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design BugRaptors
 
Why Companies Need to Leverage ERP Testing Services?
Why Companies Need to Leverage ERP Testing Services?Why Companies Need to Leverage ERP Testing Services?
Why Companies Need to Leverage ERP Testing Services?BugRaptors
 
BFSI Testing Solutions - To Streamline BFSI Sector
BFSI Testing Solutions - To Streamline BFSI SectorBFSI Testing Solutions - To Streamline BFSI Sector
BFSI Testing Solutions - To Streamline BFSI SectorBugRaptors
 
Media Streaming App Testing - Knowing The Significance
Media Streaming App Testing - Knowing The SignificanceMedia Streaming App Testing - Knowing The Significance
Media Streaming App Testing - Knowing The SignificanceBugRaptors
 
Manual Testing - Developing A Quick Perspective
Manual Testing - Developing A Quick Perspective Manual Testing - Developing A Quick Perspective
Manual Testing - Developing A Quick Perspective BugRaptors
 
Regression Testing - An Overview
Regression Testing - An OverviewRegression Testing - An Overview
Regression Testing - An OverviewBugRaptors
 
Cloud Testing - Reinforcing Cloud Technology
Cloud Testing - Reinforcing Cloud TechnologyCloud Testing - Reinforcing Cloud Technology
Cloud Testing - Reinforcing Cloud TechnologyBugRaptors
 
Importance of Performance Testing.pptx
Importance of Performance Testing.pptxImportance of Performance Testing.pptx
Importance of Performance Testing.pptxBugRaptors
 
Media & Entertainment Testing Services –BugRaptors
Media & Entertainment Testing Services –BugRaptorsMedia & Entertainment Testing Services –BugRaptors
Media & Entertainment Testing Services –BugRaptorsBugRaptors
 
Usability Testing - Connect With Target Audience With Perfect UX
Usability Testing - Connect With Target Audience With Perfect UXUsability Testing - Connect With Target Audience With Perfect UX
Usability Testing - Connect With Target Audience With Perfect UXBugRaptors
 
Tips To Follow For A Simple QA Process
Tips To Follow For A Simple QA ProcessTips To Follow For A Simple QA Process
Tips To Follow For A Simple QA ProcessBugRaptors
 
CRM Testing Services - Ensure Smooth Functioning of Complex CRM Workflows
CRM Testing Services - Ensure Smooth Functioning of Complex CRM WorkflowsCRM Testing Services - Ensure Smooth Functioning of Complex CRM Workflows
CRM Testing Services - Ensure Smooth Functioning of Complex CRM WorkflowsBugRaptors
 
Test Automation - Everything You Need To Know
Test Automation - Everything You Need To KnowTest Automation - Everything You Need To Know
Test Automation - Everything You Need To KnowBugRaptors
 
Stress testing ERP frameworks
Stress testing ERP frameworksStress testing ERP frameworks
Stress testing ERP frameworksBugRaptors
 
Top 10 Automation Testing Tools
Top 10 Automation Testing ToolsTop 10 Automation Testing Tools
Top 10 Automation Testing ToolsBugRaptors
 
Software Testing Trends For 2021
Software Testing Trends For 2021Software Testing Trends For 2021
Software Testing Trends For 2021BugRaptors
 
Banking App Testing - To Evaluate Performance
Banking App Testing - To Evaluate PerformanceBanking App Testing - To Evaluate Performance
Banking App Testing - To Evaluate PerformanceBugRaptors
 
Test Automation Trends For 2021
Test Automation Trends For 2021Test Automation Trends For 2021
Test Automation Trends For 2021BugRaptors
 
ERP Testing Strategy For Large Scale Organizations
ERP Testing Strategy For Large Scale OrganizationsERP Testing Strategy For Large Scale Organizations
ERP Testing Strategy For Large Scale OrganizationsBugRaptors
 

More from BugRaptors (20)

Performance Testing - A Catalyst In Software Testing Landscape
Performance Testing - A Catalyst In Software Testing LandscapePerformance Testing - A Catalyst In Software Testing Landscape
Performance Testing - A Catalyst In Software Testing Landscape
 
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design 13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design
13 Things To Keep In Mind For Enhanced Mobile App UI/UX Design
 
Why Companies Need to Leverage ERP Testing Services?
Why Companies Need to Leverage ERP Testing Services?Why Companies Need to Leverage ERP Testing Services?
Why Companies Need to Leverage ERP Testing Services?
 
BFSI Testing Solutions - To Streamline BFSI Sector
BFSI Testing Solutions - To Streamline BFSI SectorBFSI Testing Solutions - To Streamline BFSI Sector
BFSI Testing Solutions - To Streamline BFSI Sector
 
Media Streaming App Testing - Knowing The Significance
Media Streaming App Testing - Knowing The SignificanceMedia Streaming App Testing - Knowing The Significance
Media Streaming App Testing - Knowing The Significance
 
Manual Testing - Developing A Quick Perspective
Manual Testing - Developing A Quick Perspective Manual Testing - Developing A Quick Perspective
Manual Testing - Developing A Quick Perspective
 
Regression Testing - An Overview
Regression Testing - An OverviewRegression Testing - An Overview
Regression Testing - An Overview
 
Cloud Testing - Reinforcing Cloud Technology
Cloud Testing - Reinforcing Cloud TechnologyCloud Testing - Reinforcing Cloud Technology
Cloud Testing - Reinforcing Cloud Technology
 
Importance of Performance Testing.pptx
Importance of Performance Testing.pptxImportance of Performance Testing.pptx
Importance of Performance Testing.pptx
 
Media & Entertainment Testing Services –BugRaptors
Media & Entertainment Testing Services –BugRaptorsMedia & Entertainment Testing Services –BugRaptors
Media & Entertainment Testing Services –BugRaptors
 
Usability Testing - Connect With Target Audience With Perfect UX
Usability Testing - Connect With Target Audience With Perfect UXUsability Testing - Connect With Target Audience With Perfect UX
Usability Testing - Connect With Target Audience With Perfect UX
 
Tips To Follow For A Simple QA Process
Tips To Follow For A Simple QA ProcessTips To Follow For A Simple QA Process
Tips To Follow For A Simple QA Process
 
CRM Testing Services - Ensure Smooth Functioning of Complex CRM Workflows
CRM Testing Services - Ensure Smooth Functioning of Complex CRM WorkflowsCRM Testing Services - Ensure Smooth Functioning of Complex CRM Workflows
CRM Testing Services - Ensure Smooth Functioning of Complex CRM Workflows
 
Test Automation - Everything You Need To Know
Test Automation - Everything You Need To KnowTest Automation - Everything You Need To Know
Test Automation - Everything You Need To Know
 
Stress testing ERP frameworks
Stress testing ERP frameworksStress testing ERP frameworks
Stress testing ERP frameworks
 
Top 10 Automation Testing Tools
Top 10 Automation Testing ToolsTop 10 Automation Testing Tools
Top 10 Automation Testing Tools
 
Software Testing Trends For 2021
Software Testing Trends For 2021Software Testing Trends For 2021
Software Testing Trends For 2021
 
Banking App Testing - To Evaluate Performance
Banking App Testing - To Evaluate PerformanceBanking App Testing - To Evaluate Performance
Banking App Testing - To Evaluate Performance
 
Test Automation Trends For 2021
Test Automation Trends For 2021Test Automation Trends For 2021
Test Automation Trends For 2021
 
ERP Testing Strategy For Large Scale Organizations
ERP Testing Strategy For Large Scale OrganizationsERP Testing Strategy For Large Scale Organizations
ERP Testing Strategy For Large Scale Organizations
 

Recently uploaded

XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 

Recently uploaded (20)

XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 

E commerce testing

  • 1.
  • 2.  E – Commerce - Electronic commerce refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks.  It also includes the entire online process of developing, marketing, selling, delivering, servicing and paying for products and services.
  • 3.  Domestic and international payment systems  Group buying  Instant messaging  Online banking  Online office suites  Shopping cart software  Teleconferencing  Electronic tickets
  • 4.  Businesses also have been engaging in a form of e- commerce, known as electronic data interchange (EDI), for many years.  Banks have been using electronic funds transfers (EFTs) which are electronic transmissions of account exchange information over private communications networks.
  • 5.  Testing is crucial to e-commerce because e-commerce sites are both business critical and highly visible to their users; any failure can be immediately expensive in terms of lost revenue and even more expensive in the longer term if disaffected users seek alternative sites.
  • 6.  Security has three main concepts: confidentiality, integrity, and availability.  Confidentiality - Confidentiality allows only authorized parties to read protected information. For example, if the postman reads your mail, this is a breach of your privacy  Integrity - Integrity ensures data remains as is from the sender to the receiver. If someone added an extra bill to the envelope, which contained your credit card bill, he has violated the integrity of the mail.
  • 7.  Availability - Availability ensures you have access and are authorized to resources. If the post office destroys your mail or the postman takes one year to deliver your mail, he has impacted the availability of your mail.
  • 8.  The need for security testing of an organization arises due to two main factors-  The primary factor is the importance of measuring the extent to which the security infrastructure implements the security policy and the security requirements of an organization. As the implementation of the security infrastructure needs human interventions, a proper security testing is needed to check out the existence of any “human error”.
  • 9.  The other factor is the vulnerability of the existing security infrastructure to the new threats and exploits. In recent years, the rate of arrival of new types of threat and new exploits has been alarming with respect to the information security context. This leads to the need for periodical security testing by which the vulnerability of the existing security infrastructure to the growing number of threats and exploits can be measured.
  • 10.  There are two aspects of testing – compliance checking and penetration testing.  Compliance checking: In compliance checking, it is seen whether the security infrastructure, that has been implemented, matches the security policy of the organization. A semi automated tool can be used to match the policies with the existing infrastructure.
  • 11.  Penetration testing: In penetration testing, it is seen whether the existing security infrastructure of the organization is sufficient to ward off all possible security threats. Various automated and semi- automated security tools like Retina, Nessus etc. are available for penetration testing. They try and penetrate the organization’s network and generate a report on the vulnerabilities and threats that are present in the network.
  • 12.  Spam Relaying & Harvesting  Data Leakage  SQL Injection attacks  Unsuccessful login attempts  Weak Login forms