0% found this document useful (0 votes)
54 views

E-Commerce - Security Systems

The document discusses security systems for e-commerce transactions. It outlines several essential requirements for secure online payments/transactions, including confidentiality, integrity, availability, authenticity, non-repudiation, encryption, and auditability. It then describes common security measures like encryption, digital signatures, and security certificates to protect data during transmission. Popular security protocols for the internet like SSL and SHTTP are also summarized.

Uploaded by

VIKAS BHANVRA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

E-Commerce - Security Systems

The document discusses security systems for e-commerce transactions. It outlines several essential requirements for secure online payments/transactions, including confidentiality, integrity, availability, authenticity, non-repudiation, encryption, and auditability. It then describes common security measures like encryption, digital signatures, and security certificates to protect data during transmission. Popular security protocols for the internet like SSL and SHTTP are also summarized.

Uploaded by

VIKAS BHANVRA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

E-COMMERCE - SECURITY

SYSTEMS
E-COMMERCE - SECURITY SYSTEMS

 SECURITY IS AN ESSENTIAL PART OF ANY TRANSACTION THAT TAKES


PLACE OVER THE INTERNET. CUSTOMERS WILL LOSE HIS/HER FAITH IN E-
BUSINESS IF ITS SECURITY IS COMPROMISED. FOLLOWING ARE THE
ESSENTIAL REQUIREMENTS FOR SAFE E-PAYMENTS/TRANSACTIONS −
 CONFIDENTIALITY

 INTEGRITY

 AVAILABILITY

 AUTHENTICITY

 NON-REPUDIABILITY

 ENCRYPTION

 AUDITABILITY

ERROR-FREE, NATION-WIDE, SYNCHRONIZED, UNINTERRUPTED, RELIABLE, EXPRESS DELIVERIES!


SECURITY SYSTEMS

 CONFIDENTIALITY − INFORMATION SHOULD NOT BE ACCESSIBLE TO AN


UNAUTHORIZED PERSON. IT SHOULD NOT BE INTERCEPTED DURING THE
TRANSMISSION.

 INTEGRITY − INFORMATION SHOULD NOT BE ALTERED DURING ITS


TRANSMISSION OVER THE NETWORK.
 AVAILABILITY − INFORMATION SHOULD BE AVAILABLE WHEREVER AND
WHENEVER REQUIRED WITHIN A TIME LIMIT SPECIFIED.

ERROR-FREE, NATION-WIDE, SYNCHRONIZED, UNINTERRUPTED, RELIABLE, EXPRESS DELIVERIES!


SECURITY SYSTEMS CONTD…

 AUTHENTICITY − THERE SHOULD BE A MECHANISM TO AUTHENTICATE A


USER BEFORE GIVING HIM/HER AN ACCESS TO THE REQUIRED
INFORMATION.
 NON-REPUDIABILITY − IT IS THE PROTECTION AGAINST THE DENIAL OF
ORDER OR DENIAL OF PAYMENT. ONCE A SENDER SENDS A MESSAGE,
THE SENDER SHOULD NOT BE ABLE TO DENY SENDING THE MESSAGE.
SIMILARLY, THE RECIPIENT OF MESSAGE SHOULD NOT BE ABLE TO DENY
THE RECEIPT.
 ENCRYPTION − INFORMATION SHOULD BE ENCRYPTED AND DECRYPTED
ONLY BY AN AUTHORIZED USER.
 AUDITABILITY − DATA SHOULD BE RECORDED IN SUCH A WAY THAT IT
CAN BE AUDITED FOR INTEGRITY REQUIREMENTS.

ERROR-FREE, NATION-WIDE, SYNCHRONIZED, UNINTERRUPTED, RELIABLE, EXPRESS DELIVERIES!


MEASURES TO ENSURE SECURITY

 MAJOR SECURITY MEASURES ARE FOLLOWING −


 ENCRYPTION − IT IS A VERY EFFECTIVE AND PRACTICAL WAY TO SAFEGUARD
THE DATA BEING TRANSMITTED OVER THE NETWORK. SENDER OF THE
INFORMATION ENCRYPTS THE DATA USING A SECRET CODE AND ONLY THE
SPECIFIED RECEIVER CAN DECRYPT THE DATA USING THE SAME OR A
DIFFERENT SECRET CODE.
 DIGITAL
SIGNATURE − DIGITAL SIGNATURE ENSURES THE AUTHENTICITY OF THE
INFORMATION. A DIGITAL SIGNATURE IS AN E-SIGNATURE AUTHENTICATED
THROUGH ENCRYPTION AND PASSWORD.
 SECURITYCERTIFICATES − SECURITY CERTIFICATE IS A UNIQUE DIGITAL ID USED
TO VERIFY THE IDENTITY OF AN INDIVIDUAL WEBSITE OR USER.

ERROR-FREE, NATION-WIDE, SYNCHRONIZED, UNINTERRUPTED, RELIABLE, EXPRESS DELIVERIES!


SECURITY PROTOCOLS IN INTERNET

WE WILL DISCUSS HERE SOME OF THE POPULAR PROTOCOLS USED OVER


THE INTERNET TO ENSURE SECURED ONLINE TRANSACTIONS.

 SECURE SOCKET LAYER (SSL)

 SECURE HYPERTEXT TRANSFER PROTOCOL (SHTTP)

ERROR-FREE, NATION-WIDE, SYNCHRONIZED, UNINTERRUPTED, RELIABLE, EXPRESS DELIVERIES!


SECURITY PROTOCOLS IN INTERNET

 SECURE SOCKET LAYER (SSL)


 IT IS THE MOST COMMONLY USED PROTOCOL AND IS WIDELY USED ACROSS THE
INDUSTRY. IT MEETS FOLLOWING SECURITY REQUIREMENTS −
◼ AUTHENTICATION
◼ ENCRYPTION
◼ INTEGRITY
◼ NON-REPUTABILITY
 "HTTPS://" IS TO BE USED FOR
HTTP URLS WITH SSL, WHERE AS "HTTP:/" IS TO BE
USED FOR HTTP URLS WITHOUT SSL.
 SECURE HYPERTEXT TRANSFER PROTOCOL (SHTTP)
 SHTTP EXTENDS THE HTTP INTERNET PROTOCOL WITH PUBLIC KEY ENCRYPTION,
AUTHENTICATION, AND DIGITAL SIGNATURE OVER THE INTERNET. SECURE HTTP
SUPPORTS MULTIPLE SECURITY MECHANISM, PROVIDING SECURITY TO THE END-
USERS. SHTTP WORKS BY NEGOTIATING ENCRYPTION SCHEME TYPES USED BETWEEN
THE CLIENT AND THE SERVER.

ERROR-FREE, NATION-WIDE, SYNCHRONIZED, UNINTERRUPTED, RELIABLE, EXPRESS DELIVERIES!


SECURE ELECTRONIC TRANSACTION

 IT IS A SECURE PROTOCOL DEVELOPED BY MASTERCARD AND VISA IN


COLLABORATION. THEORETICALLY, IT IS THE BEST SECURITY PROTOCOL. IT HAS THE
FOLLOWING COMPONENTS −

 CARD HOLDER'S DIGITAL WALLET SOFTWARE − DIGITAL WALLET ALLOWS THE CARD
HOLDER TO MAKE SECURE PURCHASES ONLINE VIA POINT AND CLICK INTERFACE.
 MERCHANT SOFTWARE − THIS SOFTWARE HELPS MERCHANTS TO COMMUNICATE WITH
POTENTIAL CUSTOMERS AND FINANCIAL INSTITUTIONS IN A SECURE MANNER.
 PAYMENT GATEWAY SERVER SOFTWARE − PAYMENT GATEWAY PROVIDES AUTOMATIC
AND STANDARD PAYMENT PROCESS. IT SUPPORTS THE PROCESS FOR MERCHANT'S
CERTIFICATE REQUEST.
 CERTIFICATE AUTHORITY SOFTWARE − THIS SOFTWARE IS USED BY FINANCIAL
INSTITUTIONS TO ISSUE DIGITAL CERTIFICATES TO CARD HOLDERS AND MERCHANTS, AND
TO ENABLE THEM TO REGISTER THEIR ACCOUNT AGREEMENTS FOR SECURE ELECTRONIC
COMMERCE.

ERROR-FREE, NATION-WIDE, SYNCHRONIZED, UNINTERRUPTED, RELIABLE, EXPRESS DELIVERIES!

You might also like