Electronic Commerce: Chapter # 9
Electronic Commerce: Chapter # 9
Electronic Commerce: Chapter # 9
Electronic Commerce
Chapter # 9
Electronic Commerce Security
FACULTY OF ECONOMICS
Recommended Book
• Electronic Commerce
by Gary Schneider ,
7th Edition
FACULTY OF ECONOMICS
Security
• Security involves protecting data so it is not misused or
lost.
• Why Security?
– Failure to deliver goods
– Nonpayment for goods delivered
– Misrepresentation of the merchandise
– Hidden charges
– Fake bidding
– Credit card fraud
FACULTY OF ECONOMICS
Internet security
• Consumers entering highly confidential information
• Number of security attacks increasing
• Availability
– Computer systems continually accessible
FACULTY OF ECONOMICS
• Authentication Security requirements
– A method to verify the sender and receiver identity
• Encryption
– A process of making messages unreadable except by those who are
authorized or authenticate
• Integrity
– Ensuring that information will not be accidentally or maliciously
altered or destroyed during transmission
• Privacy
– information not read by third party
• Non repudiation
– Merchant deny after payment received from customer.
– Customer deny after Goods delivered by Merchant.
FACULTY OF ECONOMICS
Security Schemes
• Need to have security schemes in order to achieve security
– Public key cryptography
– Private key cryptography
– Digital Signature
Cipher Text
Plain Text
FACULTY OF ECONOMICS
1) Ancient Cryptosystems
– Substitution Cipher (UNIVERSITY VOJWFSTJUZ)
• Every occurrence of a given letter is replaced by a different letter
2) Modern cryptosystems
• Transform data by using a key (string of digits, acts as a password)
• Digital, based on bits not the alphabet
• Key length – length of string used to encrypt and decrypt
FACULTY OF ECONOMICS
Certificate authority
• It is a institution or a trusted third party such as VeriSign.
• Issues digital certificates
FACULTY OF ECONOMICS
Secure Sockets Layer(SSL)
• Developed by Netscape Communications
• Used to secure communication on the internet but does not protect once stored on
receivers server