Assignment 2: E-Commerce
Assignment 2: E-Commerce
Dr Shashank Singh
Submitted by:
Shalloo Bajpai
1600103199
1601012189
CSE-2
Assignment 2: E-Commerce
B. FTP: File Transfer Protocol FTP is a standard internet protocol provided by TCP/IP
used for transmitting the files from one host to another. It is mainly used for transferring the
web page files from their creator to the computer that acts as a server for other computers on
the internet. It is also used for downloading the files to the computer from other servers. It
provides the sharing of files. It is used to encourage the use of remote computers. It transfers
the data more reliably and efficiently.
FTP is built on client-server architecture and utilizes separate control and data connections
between the client and server applications. FTP is used with user-based password
authentication or with anonymous user access.
C. HTTP: HTTP stands for Hypertext Transfer Protocol. It is used to access data on the WWW
(World
Wide Web). It is a protocol which governs the communication between the client and server.
There are three important features of HTTP:
a.) HTTP is Connectionless
After a request is made, the client disconnects from the server and waits for a response. The
server must reestablish the connection after it processes the request.
b.) HTTP is Media Independent
Any type of data can be sent by HTTP as long as both the client and server know how to handle
the data content.
c.) HTTP is Stateless
This is a direct result of HTTP being connectionless. The server and client are aware of each
other only during a request. Afterwards, each forgets the other. For this reason neither the
client now the browser can retain information between different requests across the web pages.
A browser contacts a server to establish a TCP connection with it. The HTTP software on the
client sends a request to the server. The HTTP software on the server interprets this request and
sends the response to the client.
D. SMTP: Simple Mail Transfer Protocol is a set of communication guidelines that allow software
to transmit an electronic mail over the internet. It is a program used for sending messages to
other computer users based on e-mail addresses.
It provides a mail exchange between users on the same or different computers, and it also
supports:
a. It can send a single message to one or more recipients.
b. Messages being sent can include text, voice, video or graphics.
c. It can also send the messages on networks outside the internet.
The main purpose of SMTP is used to set up communication rules between servers. The servers
have a way of identifying themselves and announcing what kind of communication they are
trying to perform. They also have a way of handling the errors such as incorrect email address.
For example, if the recipient address is wrong, then the receiving server replies with an error
message of some kind.
E. S-HTTP: S-HTTP stands for Secure Hypertext Transfer Protocol, is an Internet protocol for
encryption of Hypertext Transfer Protocol (HTTP) traffic.It is an extension to the Hypertext
Transfer Protocol (HTTP) that allows the secure exchange of files on the World Wide Web.
Each S-HTTP file is either encrypted, contains a digital certificate, or both. For a given document,
S-HTTP is an alternative to another well-known security protocol, Secure Sockets Layer (SSL).
A major difference is that S-HTTP allows the client to send a certificate to authenticate the user
whereas, using SSL, only the server can be authenticated. S-HTTP is more likely to be used in
situations where the server represents a bank and requires authentication from the user that is
more secure than a userid and password.
S-HTTP works at the even higher level of the HTTP application. Both security protocols can be
used by a browser user, but only one can be used with a given document. Terisa Systems
includes both SSL and S-HTTP in their Internet security tool kits.
F. SSL: SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was first
developed by Netscape in 1995 for the purpose of ensuring privacy, authentication, and data
integrity in Internet communications. SSL is the predecessor to the modern TLS encryption used
today.
SSL/TLS works by binding the identities of entities such as websites and companies to
cryptographic key pairs via digital documents known as X.509 certificates. Each key pair consists
of a private key and a public key. The private key is kept secure, and the public key can be widely
distributed via a certificate.
SSL follows an asymmetric cryptographic mechanism, in which a Web browser creates a public
key and a private (secret) key. The public key is placed in a data file known as a certificate
signing request (CSR). The private key is issued to the recipient only.
G. Messaging Protocol: Internet Control Message Protocol (ICMP) is a TCP/IP network layer
protocol that provides troubleshooting, control and error message services. ICMP is most
frequently used in operating systems for networked computers, where it transmits error
messages.
ICMP (Internet Control Message Protocol) is a protocol that network devices (e.g. routers) use to
generate error messages when network issues are preventing IP packets from getting through.
The Internet Control Message Protocol is one of the fundamental systems that make the
internet work.
As this protocol resides at the Internet Layer, its messages are carried by IP packets and so exist
at a higher level than the operating structures of switches. Although the ICMP is carried within
the IP packet, it does not exist inside data-carrying packets. An ICMP packet is only generated in
response to an incoming data packet when the transmission of that inbound message fails. The
error conditions that provoke an ICMP packet are often the result of data contained in the IP
header of the failed packet.
An ICMP packet has an eight-byte header, followed by a variable-sized data section. The
first four bytes of the header are fixed:ICMP type, ICMP code, checksum of the entire ICMP
message, checksum of the entire ICMP message. The remaining four bytes of the header vary
based on the ICMP type and code.
BANNERS :
In the online world, a banner is a rectangular or square advertisement placed on a website, which
includes graphic images and text, and links to the advertiser’s website or to another page in the same
website.
Banners are often used as hero images for category pages in e-commerce websites, as well as for
presentation websites, if their main purpose is to draw attention to a specific product or service.
Banners can be placed anywhere on a website, but are typically located above or below the main
content blocks, or in the website’s sidebars.
The purpose of banner advertising is to promote a brand and/or to get visitors from the host website to
go to the advertiser's website.
Banner advertising, also called display advertising, consists of static or animated images or media and
are usually placed in high-visibility areas on high-traffic websites. Banner advertising is attractive
because it can help create brand awareness, generate leads and re-target an audience.
SPONSORSHIP PORTALS :
Sponsorship advertising is a type of advertising where a company pays to be associated with a specific
event. In fact, sponsorship advertising is very prevalent with charitable events. Besides charitable
events, companies may sponsor local sporting teams, sports tournaments, fairs, and other community
events. The idea is to get your name out and be viewed positively as a participating member of your
community.
Criteria for Sponsorship : Author Jim Karrh suggests four criteria for a business to use in determining
whether to
sponsor something:
● Relevance - The event, organization, or cause you are considering sponsoring must have some
degree of relevance to the services or products you provide. For example, a running shoe
company may consider sponsoring a local marathon, but it really doesn't make much sense for a
local brewery to do so. You want to match your sponsorship of events or organizations to those
that involve your target market.
● Brand fit - Your brand fit must fit the event. A computer company sponsoring a gaming event
using a game that is not compatible with its computer makes no sense and may be counter-
productive.
● Mission alignment - The interests of the event or organization should not conflict with the
interests of the company. A tobacco company sponsoring a cancer awareness walk may not
work out that well for the tobacco company.
● Business result - The company must have a reasonable basis to believe that the sponsorship will
create a tangible business result. It doesn't necessarily have to produce a profit, but it should at
least increase company awareness, brand awareness, or help foster a positive view of the
company.
ONLINE COUPONS :
An Online Coupon or Digital coupons are discounts, offers and promotions offered by an online store to
current or prospective customers. Similar to their tangible counterparts, coupons are aimed at enticing a
consumer to make a purchase at an online marketplace.
Traditional coupons can, however, be found online – usually at a retailer's website – and printed off for
in-store redemption.
Online coupons may be sent by email or social media to loyal customers, or they may be posted as ad
campaigns or to online coupon aggregation sites.
DIGITAL ASSETS :
A digital asset is content that’s stored digitally. That could mean images, photos, videos, files containing
text, spreadsheets, or slide decks. New digital formats are constantly emerging – MP3s were unheard of
before the 1990s, for instance – so the definition of a digital asset is always expanding. Rather than a
definitive list of file formats that qualify as a digital asset, a digital asset can be any content, in any
format, that is stored digitally and provides value to the company (or to the user or consumer).
A digital asset is any valuable piece of content in a digital format. This includes assets that were created
digitally, as well as those created offline and later stored on a server. And if that sounds like a broad
definition, that’s because it encompasses pretty much everything from emails and account information
to videos and photos.
Client-side security is concerned with the techniques and practices that protect a user's privacy and the
integrity of the user's computing system. Server-side security is concerned with the techniques and
practices that protect the Web server software and its associated hardware from break-ins, Website
vandalism and denial of service attacks.
Secure transmission is concerned with the techniques and practices that will guarantee protection from
eavesdropping and intentional message modification.
Security issues in e-commerce application :
There are following types of security issues in any e-commerce application which needs to
be addressed.
1) Malicious Code
• Viruses: They have ability to replicate and spread to other files; most also deliver a “payload” of some
sort (destructive or benign); include macro viruses, file-infecting viruses, and script viruses.
• Worms: They are designed to spread from computer to computer.
• Trojan horse: They appear to be benign, but then do something other than expected .
• Bots: It can be covertly installed on computer; responds to external commands sent by the attacker.
2) Unwanted Programs
These are installed without the user’s informed consent. Following are its types.
A. Browser parasites: It can monitor and change settings of a user’s browser Adware: It calls for
unwanted pop-up ads
B. Spyware: It can be used to obtain information, such as a user’s keystrokes, e-mail, IMs, etc.
3) Phishing and Identity
Theft Any deceptive, online attempt by a third party to obtain confidential information for financial gain
Most popular type: e-mail scam letter – It is one of fastest growing forms of e-commerce crime.
4) Hacking and Cyber vandalism Hacker
Individual who intends to gain unauthorized access to computer systems.
• Cracker: Hacker with criminal intent (two terms often used interchangeably)
• Cyber vandalism: Intentionally disrupting, defacing or destroying a Web site.
5) Credit Card Fraud
Fear that credit card information will be stolen deters online purchases. Hackers target credit card files
and other customer information files on merchant servers; use stolen data to establish credit under false
identity. One solution: New identity verification mechanisms.