SlideShare a Scribd company logo
Security is an essential part of any transaction that
takes place over the internet. Customers will
his/her faith in e-business if its security is
compromised. Following are the essential
requirements for safe e-payments/transactions
 Confidentiality − Information should not be accessible to an unauthorized person. It
should not be intercepted during the transmission.
 Integrity − Information should not be altered during its transmission over the network.
 Availability − Information should be available wherever and whenever required within a
time limit specified.
 Authenticity − There should be a mechanism to authenticate a user before giving
him/her an access to the required information.
 Non-Repudiability − It is the protection against the denial of order or denial of
payment. Once a sender sends a message, the sender should not be able to deny sending
the message. Similarly, the recipient of message should not be able to deny the receipt.
 Encryption − Information should be encrypted and decrypted only by an authorized
user.
 Auditability − Data should be recorded in such a way that it can be audited for integrity
requirements.
Measures to ensure Security
 Major security measures are following −
 Encryption − It is a very effective and practical way to
safeguard the data being transmitted over the network.
Sender of the information encrypts the data using a secret
code and only the specified receiver can decrypt the data
using the same or a different secret code.
 Digital Signature − Digital signature ensures the
authenticity of the information. A digital signature is an e-
signature authenticated through encryption and password.
 Security Certificates − Security certificate is a unique
digital id used to verify the identity of an individual
website or user.
Security Protocols in Internet
 We will discuss here some of the popular protocols
used over the internet to ensure secured online
transactions.
Secure Socket Layer (SSL)
 It is the most commonly used protocol and is widely
used across the industry. It meets following security
requirements −
 Authentication
 Encryption
 Integrity
 Non-reputability
 "https://" is to be used for HTTP urls with SSL, where
as "http:/" is to be used for HTTP urls without SSL.
Secure Hypertext Transfer
Protocol (SHTTP)
 SHTTP extends the HTTP internet protocol with
public key encryption, authentication, and digital
signature over the internet. Secure HTTP supports
multiple security mechanism, providing security to the
end-users. SHTTP works by negotiating encryption
scheme types used between the client and the server.
Secure Electronic Transaction
 It is a secure protocol developed by MasterCard and Visa in
collaboration. Theoretically, it is the best security protocol. It has the
following components −
 Card Holder's Digital Wallet Software − Digital Wallet allows the
card holder to make secure purchases online via point and click
interface.
 Merchant Software − This software helps merchants to communicate
with potential customers and financial institutions in a secure manner.
 Payment Gateway Server Software − Payment gateway provides
automatic and standard payment process. It supports the process for
merchant's certificate request.
 Certificate Authority Software − This software is used by financial
institutions to issue digital certificates to card holders and merchants,
and to enable them to register their account agreements for secure
electronic commerce.

More Related Content

What's hot

Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
Strategic Brand Marketing - GEICO
Strategic Brand Marketing - GEICOStrategic Brand Marketing - GEICO
Strategic Brand Marketing - GEICO
rkalavar
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
 
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...
Eyad Almasri
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
Adv Prashant Mali
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
Aditya Singh Rana
 
Internal Control
Internal ControlInternal Control
Internal Control
ravalhimani
 
E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 
Audit working-papers
Audit working-papersAudit working-papers
Audit working-papers
Next Generation Security Agency
 
Open Government Data (OGD) Platform India for Transparency & Innovation
Open Government Data (OGD) Platform India for Transparency & InnovationOpen Government Data (OGD) Platform India for Transparency & Innovation
Open Government Data (OGD) Platform India for Transparency & Innovation
Data Portal India
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
AboutSSL
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
Kimmy Chen
 
Distributed Ledger Technology PowerPoint Presentation Slides
Distributed Ledger Technology PowerPoint Presentation SlidesDistributed Ledger Technology PowerPoint Presentation Slides
Distributed Ledger Technology PowerPoint Presentation Slides
SlideTeam
 
Ecommerce Payment Methodologies PowerPoint Presentation Slides
Ecommerce Payment Methodologies PowerPoint Presentation Slides Ecommerce Payment Methodologies PowerPoint Presentation Slides
Ecommerce Payment Methodologies PowerPoint Presentation Slides
SlideTeam
 
Procurement Audit Training - April 2015
Procurement Audit Training - April 2015Procurement Audit Training - April 2015
Procurement Audit Training - April 2015
Andrew-Vans Bray
 

What's hot (20)

Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Strategic Brand Marketing - GEICO
Strategic Brand Marketing - GEICOStrategic Brand Marketing - GEICO
Strategic Brand Marketing - GEICO
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...Chapter 3/Retailing In Electronic Commerce:  Products and Services Technology...
Chapter 3/Retailing In Electronic Commerce: Products and Services Technology...
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Internal Control
Internal ControlInternal Control
Internal Control
 
E banking security
E banking securityE banking security
E banking security
 
Audit working-papers
Audit working-papersAudit working-papers
Audit working-papers
 
Open Government Data (OGD) Platform India for Transparency & Innovation
Open Government Data (OGD) Platform India for Transparency & InnovationOpen Government Data (OGD) Platform India for Transparency & Innovation
Open Government Data (OGD) Platform India for Transparency & Innovation
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
Distributed Ledger Technology PowerPoint Presentation Slides
Distributed Ledger Technology PowerPoint Presentation SlidesDistributed Ledger Technology PowerPoint Presentation Slides
Distributed Ledger Technology PowerPoint Presentation Slides
 
Ecommerce Payment Methodologies PowerPoint Presentation Slides
Ecommerce Payment Methodologies PowerPoint Presentation Slides Ecommerce Payment Methodologies PowerPoint Presentation Slides
Ecommerce Payment Methodologies PowerPoint Presentation Slides
 
Procurement Audit Training - April 2015
Procurement Audit Training - April 2015Procurement Audit Training - April 2015
Procurement Audit Training - April 2015
 

Similar to E commerce security system 0605

10. Kanchan verma (Unit 3) E-security systems.pptx
10. Kanchan verma (Unit 3)  E-security systems.pptx10. Kanchan verma (Unit 3)  E-security systems.pptx
10. Kanchan verma (Unit 3) E-security systems.pptx
AdityaSwami23
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
Tawhid Rahman
 
E-Business security
E-Business security E-Business security
E-Business security
Surendhranatha Reddy
 
ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .
SowmyaSomu8
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Nikhil Khunteta
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
E commerce security
E commerce securityE commerce security
E commerce security
Roha1234567
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
PawachMetharattanara
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
Mukesh Singh
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
ITIO Innovex
 
Security
SecuritySecurity
Security
majstors
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
RushikeshChikane2
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-Commerce
Ankit Gupta
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
SwapnaPavan2
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 

Similar to E commerce security system 0605 (20)

10. Kanchan verma (Unit 3) E-security systems.pptx
10. Kanchan verma (Unit 3)  E-security systems.pptx10. Kanchan verma (Unit 3)  E-security systems.pptx
10. Kanchan verma (Unit 3) E-security systems.pptx
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
E-Business security
E-Business security E-Business security
E-Business security
 
ebusiness digital,E business signature .
ebusiness digital,E business signature .ebusiness digital,E business signature .
ebusiness digital,E business signature .
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
E commerce security
E commerce securityE commerce security
E commerce security
 
basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
Ledingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for DevelopersLedingkart Meetup #3: Security Basics for Developers
Ledingkart Meetup #3: Security Basics for Developers
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Security
SecuritySecurity
Security
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Security Controls Over E-Commerce
Security Controls Over E-CommerceSecurity Controls Over E-Commerce
Security Controls Over E-Commerce
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Cryptography
CryptographyCryptography
Cryptography
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 

Recently uploaded

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
46adnanshahzad
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 

Recently uploaded (20)

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 

E commerce security system 0605

  • 1. Security is an essential part of any transaction that takes place over the internet. Customers will his/her faith in e-business if its security is compromised. Following are the essential requirements for safe e-payments/transactions
  • 2.  Confidentiality − Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.  Integrity − Information should not be altered during its transmission over the network.  Availability − Information should be available wherever and whenever required within a time limit specified.  Authenticity − There should be a mechanism to authenticate a user before giving him/her an access to the required information.  Non-Repudiability − It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt.  Encryption − Information should be encrypted and decrypted only by an authorized user.  Auditability − Data should be recorded in such a way that it can be audited for integrity requirements.
  • 3. Measures to ensure Security  Major security measures are following −  Encryption − It is a very effective and practical way to safeguard the data being transmitted over the network. Sender of the information encrypts the data using a secret code and only the specified receiver can decrypt the data using the same or a different secret code.  Digital Signature − Digital signature ensures the authenticity of the information. A digital signature is an e- signature authenticated through encryption and password.  Security Certificates − Security certificate is a unique digital id used to verify the identity of an individual website or user.
  • 4. Security Protocols in Internet  We will discuss here some of the popular protocols used over the internet to ensure secured online transactions.
  • 5. Secure Socket Layer (SSL)  It is the most commonly used protocol and is widely used across the industry. It meets following security requirements −  Authentication  Encryption  Integrity  Non-reputability  "https://" is to be used for HTTP urls with SSL, where as "http:/" is to be used for HTTP urls without SSL.
  • 6. Secure Hypertext Transfer Protocol (SHTTP)  SHTTP extends the HTTP internet protocol with public key encryption, authentication, and digital signature over the internet. Secure HTTP supports multiple security mechanism, providing security to the end-users. SHTTP works by negotiating encryption scheme types used between the client and the server.
  • 7. Secure Electronic Transaction  It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the best security protocol. It has the following components −  Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure purchases online via point and click interface.  Merchant Software − This software helps merchants to communicate with potential customers and financial institutions in a secure manner.  Payment Gateway Server Software − Payment gateway provides automatic and standard payment process. It supports the process for merchant's certificate request.  Certificate Authority Software − This software is used by financial institutions to issue digital certificates to card holders and merchants, and to enable them to register their account agreements for secure electronic commerce.