SlideShare uma empresa Scribd logo
1 de 60
E – Commerce
•By: Prof. Ganesh Ingle
2
Course Outline
Overview of e-commerce
The Internet and the WWW
E-commerce software building blocks and tools
Scalability, high-performance servers, web
caching
Basic cryptography
Security, watermarking, firewalls
Payment systems
Current and future directions
3
Electronic Commerce (E-Commerce)
Commerce refers to all the activities the
purchase and sales of goods or services.
Marketing, sales, payment, fulfillment,
customer service
Electronic commerce is doing commerce
with the use of computers, networks and
commerce-enabled software (more than
just online shopping)
4
Brief History
 1970s: Electronic Funds Transfer (EFT)
 Used by the banking industry to exchange account information over
secured networks
 Late 1970s and early 1980s: Electronic Data Interchange (EDI) for
e-commerce within companies
 Used by businesses to transmit data from one business to another
 1990s: the World Wide Web on the Internet provides easy-to-use
technology for information publishing and dissemination
 Cheaper to do business (economies of scale)
 Enable diverse business activities (economies of scope)
5
E-commerce applications
Supply chain management
Video on demand
Remote banking
Procurement and purchasing
Online marketing and advertisement
Home shopping
Auctions
Ecommerce infrastructure
6
Information superhighway infrastructure
Internet, LAN, WAN, routers, etc.
telecom, cable TV, wireless, etc.
Messaging and information distribution
infrastructure
HTML, XML, e-mail, HTTP, etc.
Common business infrastructure
Security, authentication, electronic payment,
directories, catalogs, etc.
The Main Elements of E-commerce
7
 Consumer shopping on the Web, called B2C (business to
consumer)
 Transactions conducted between businesses on the
Web, call B2B (business to business)
 Transactions and business processes that support selling
and purchasing activities on the Web
Supplier, inventory, distribution, payment
management
Financial management, purchasing products and
information
Advantages of Electronic Commerce
8
Increased sales
Reach narrow market segments in geographically
dispersed locations
Create virtual communities
Decreased costs
Handling of sales inquiries
Providing price quotes
Determining product availability
Being in the space
9
Disadvantages of Electronic Commerce
Loss of ability to inspect products from
remote locations
Rapid developing pace of underlying
technologies
Difficult to calculate return on
investment
Cultural and legal impediments
The process of e-commerce
10
1. Attract customers
 Advertising, marketing
2. Interact with customers
 Catalog, negotiation
3. Handle and manage orders
 Order capture
 Payment
 Transaction
 Fulfillment (physical good, service good, digital good)
4. React to customer inquiries
 Customer service
 Order tracking
Web-based E-commerce Architecture
11
•Client
•Tier 1
•Web Server
•Tier 3•Tier 2 •Tier N
•Application
Server
•Database
Server
DMS
12
E-commerce Technologies
 Internet
 Mobile technologies
 Web architecture
 Component programming
 Data exchange
 Multimedia
 Search engines
 Data mining
 Intelligent agents
 Access security
 Cryptographic security
 Watermarking
 Payment systems
Infrastructure for E-commerce
13
 The Internet
 system of interconnected networks that spans the globe
 routers, TCP/IP, firewalls, network infrastructure, network
protocols
 The World Wide Web (WWW)
 part of the Internet and allows users to share information
with an easy-to-use interface
 Web browsers, web servers, HTTP, HTML, XML
 Web architecture
 Client/server model
 N-tier architecture; e.g., web servers, application servers,
database servers, scalability
14
Internet vs Intranet
Types of e-commerce
15
Types of e-commerce
16
Types of e-commerce
 B2B: E-commerce that is conducted between businesses is referred to as Business-to-
business
 (1) open to the entire public or (2) limited to a group of businesses who have
been part of the specific group
 Transaction cost reduced through reduction in
 search costs
 costs of processing transactions (e.g. invoices, purchase orders and
payment schemes)
 cost in trading processes
 eliminating intermediaries and distributors
 increase in price transparency
 creates supply-side cost-based economies of scale
17
Types of e-commerce..contd…
 B2C Commerce
 commerce between companies and consumers
 involves customers gathering information; purchasing physical goods or
information goods
 online retailing companies such as Amazon.com, Drugstore.com, Beyond.com,
Flipkart.com, Lenskart.com
 reduces transactions costs
 increasing consumer access to information
 reduces market entry barriers
18
..Contd…
 B2G e-commerce
 commerce between companies and the public sector
 use of the Internet for public procurement
 licensing procedures
19
..Contd…
 C2C e-commerce
 commerce between private individuals or consumers
 online auctions
 auctions facilitated at a portal, such as eBay, which allows online real-time bidding on
items being sold in the Web;
 peer-to-peer systems, such as the Napster model (a protocol for sharing files between
users used by chat forums similar to IRC) and other file exchange and later money
exchange models; and
 classified ads at portal sites such as Excite Classifieds and eWanted (an inter- active,
online marketplace where buyers and sellers can negotiate and which features “Buyer
Leads & Want Ads”).
 Consumer-to-business (C2B) transactions involve reverse auctions, which empower the
consumer to drive transactions. A concrete example of this when competing airlines
gives a traveler best travel and ticket offers in response to the traveler’s post that she
wants to fly from New York to San Francisco.
 There is little information on the relative size of global C2C e-commerce. However, C2C
figures of popular C2C sites such as eBay and Napster indicate that this market is quite
large. These sites produce millions of dollars in sales every day
20
M-Commerce
 buying and selling of goods and services through wireless technology
 handheld devices such as cellular telephones and personal digital assistants
(PDAs) are used
 m-commerce will become the choice for digital commerce transactions
 bill payment and account reviews can all be conducted from the handheld
devices
 consumers are given the ability to place and pay for orders on-the-fly
 delivery of entertainment, financial news, sports figures and traffic updates to a
single mobile
 different server than that accessed by the regular online users
 allow users to book and cancel rail, flight, movie tickets through their mobile
devices
21
M-Commerce..contd..
 critical considerations for this strategy is the software solution that the organization
uses
 ‘all in one’ device strategy vs individual device based technology
 banks can use cost effective virtual distribution channel
 Financial inclusion
 Greater reach across the population
 convenience without compromising security
 benefits are in terms of usage, reach, cost of installation, efforts and money for
maintenance, upgradeability and sustainability
22
M commerce..contd..
 address the needs of all the players (including regulatory requirements)
 solution is adopted that can be deployed fast, and can be scalable
 care of disparate systems, customized solutions and maintenance cost
 a platform that easily integrates new services and allows banks to be flexible
 allowing the bank to reap benefits from the full potential of the mobile commerce
 M commerce strategy requires a clear vision and objectives and not ‘one size fits all’
approach
23
Factors affecting e-commerce
 Major forces fuelling e-commerce
 Economic forces,
 Marketing and customer interaction forces, and Technology
 Communications costs,
 Low-cost technological infrastructure,
 Speedier and more economic electronic transactions with suppliers,
 Lower global information sharing and advertising costs, and cheaper customer
service cost
 Networking of corporations, suppliers, customers/clients, and independent
contractors into one community
 Networking of the various departments within a corporation, and of business
operations and processes
24
Factors affecting e-commerce..contd..
 Critical business information to be stored in a digital form retrieved instantly
transmitted electronically
 Connecting businesses (small, medium or large) to trading partners
 Sourcing out supplies, buying and selling goods and services online in real time
 Center for management of content and the processing of business transactions
support services such as financial clearance and information services
25
Factors affecting e-commerce..contd..
 Provide their target consumers with more detailed product and service information
using e-commerce
 Logistical and technological infrastructure to other retailers
 Expertise in credit analysis
 Tracking orders
 Product comparison systems
 Digitizing content, compression and the promotion of open systems technology
 Convergence of telephone services, television broadcast, cable television, and Interne
access
26
E-commerce components
 A corporate Web site with e-commerce capabilities
 A corporate intranet so that orders are processed in an efficient manner
 IT-literate employees to manage the information flows and maintain the e-commerce
system
 Banking institutions that offer transaction clearing services
 National and international logistics
 cost-efficient transport of small and big packages
 critical mass of the population with access to the Internet and disposable income
 Firms/Businesses with order fulfilling capability
27
E-commerce components..contd..
 A legal framework governing e-commerce transactions
 Legal institutions that would enforce the legal framework
 A robust and reliable Internet infrastructure;
 A pricing structure that doesn’t penalize consumers for spending time on and buying
goods over the Internet
 global collection of networks connected to share information
 common set of protocols
28
E-commerce components
 Important component of e-commerce based firm is the website
 website should have technology that will make it easier for its customers to
navigate
 site should offer every single feature necessary
 fully-functional and sustainable ecommerce web site
 stable server for hosting
 provide customer specific services
 technology partners who constantly upgrade the features as well as technology
 help business partners such as logistics partners and suppliers to share and
exchange business data
 Alternatively SaaS can be used for running these services (reduce cost)
29
Business transformation through e-commerce
 Linking stakeholders through e-commerce
 Supply chain management integration
 The product flow
 The information flow
 The finances flow
 Shared data in diverse database systems, data warehouse
 Sharing data “upstream” (with a company’s suppliers) and “downstream” (with a
company’s clients)
 shared digital business infrastructure
 including integrated value chains
 e-business management model
 business policies consistent with e-commerce laws, teleworking/virtual work,
distance learning, incentive schemes
30
E-COMMERCE APPLICATIONS: ISSUES AND PROSPECTS
 e-banking, e-tailing and online publishing/online retailing
 telephone banking, credit cards, ATMs
 E-commerce in developing countries
 Cash-on-delivery
 Bank payments
 electronic payment system
 Security issues in e-payment
 Factors the growth of e-banking in developing countries
 access to the Internet
 Inclination for banking over the internet
 access to high-quality products
 Security over internet
31
E-Commerce Software
32
 Content Transport
 pull, push, web-caching, MIME
 Server Components
 CGI, server-side scripting
 Programming Clients
 Sessions and Cookies
 Object Technology
 CORBA, COM, Java Beans/RMI
 Visual Studio .NET 2005 (ORCAS, ASP.NET, … etc)
 Technology of Fulfillment of Digital Goods
 Secure and fail-safe delivery, rights management
System Design Issues
33
Good architectural properties
Functional separation
Performance (load balancing, web caching)
Secure
Reliable
Available
Scalable
34
Cryptography
 Keeping secrets
 Privacy: interceptor cannot use information
 Authentication: sender’s identity cannot be forged
 Integrity: data cannot be altered
 Non-repudiation: sender cannot deny sending
 How to evaluate cryptography
 Secret key (symmetric) cryptography; e.g., DES
 Public key (asymmetric) cryptosystems; e.g, RSA
 Digital signatures, digital certificates
 Key management; e.g., PKI
Public-Key Cryptography
35
Encrypting and decrypting a message using public-key
cryptography.
Basic terminology
1. Plaintext: original message to be encrypted
2. Ciphertext: the encrypted message
3. Enciphering or encryption: the process of
converting plaintext into ciphertext
4. Encryption algorithm: performs encryption
5. Two inputs: a plaintext and a secret key
Symmetric Cipher Model
Deciphering or decryption: recovering plaintext from
ciphertext
Decryption algorithm: performs decryption
Two inputs: ciphertext and secret key
Secret key: same key used for encryption and
decryption. Also referred to as a symmetric key
Symmetric Cipher Model
Cipher or cryptographic system :
A scheme for encryption and decryption
Cryptography:
Science of studying ciphers
Cryptanalysis:
Science of studying attacks against
cryptographic systems
Cryptology: cryptography + cryptanalysis
Symmetric Cipher Model
Ciphers
Symmetric cipher: same key used for
encryption and decryption
Block cipher: encrypts a block of plaintext at a
time (typically 64 or 128 bits)
Stream cipher: encrypts data one bit or one
byte at a time
Asymmetric cipher: different keys used
for encryption and decryption
Security
41
 Concerns about security
 Client security issues
 Server security issues
 Security policy, risk assessment
 Authentication methods
 Something you know: passwords
 Something you have: smart card
 Something you are: biometrics
 Firewalls, proxy servers, intrusion detection
 Denial of service (DOS) attacks, viruses, worms
42
Payment Systems
 Role of payment
 Cash
 properties: wide accept, convenient, anonymity, un-
traceability, no buyer transaction cost
 Online credit card payment, Smart Cards
 Secure protocols: SSL, SET
 Internet payment systems
 Electronic cash, digital wallets
 Micro-payments
 Wireless devices
Transactions Processing
43
Transactions and e-commerce
Overview of transaction processing
Transaction processing in e-commerce
Keeping business records, audit, backup
High-availability systems
Replication and scaling
Implementation
44
Other System Components
Taxes
Shipping and handling
Search engines
Data mining
Intelligent agents
Inventory management, enterprise
resource planning (ERP)
Customer relation management (CRM)
45
• SSL was first developed by Netscape in 1994 and became an
internet standard in 1996 ( RFC 2246 – TLS V1.0)
• SSL is a cryptographic protocol to secure network across a
connection-oriented layer
• Any program using TCP can be modified to use SSL connection
• SSL connection uses a dedicated TCP/IP socket(e.g. port 443
for https)
• SSL is flexible in choice of which symmetric encryption,
message digest, and authentication can be used
• SSL provides built in data compression
Encryption and its types SSL Facts
46
SSL Usage
• Authenticate the server to the client
• Allow the client and server to select cryptographic
algorithms, or ciphers, that they both support
• Optionally authenticate the client to the server
• Use public key encryption techniques to generate
shared secret
• Establish an encrypted SSL connection
47
SSL
 SSL is a secure protocol which runs above TCP/IP
and allows users to encrypt data and authenticate
servers/vendors identity securely
46
Application
layer
Transport
layerTCP/IP layer
SMTPSFTPSHTTPS
SECURE SOCKET LAYER
48
SSL
48
4949
SSL Record Protocol Operation
5050
Digital Signature
5151
Digital Signature
5252
Cyber Cash
5353
Digital Cash
5454
Digital Cash
5555
SSL vs SET
5656
Hashing
Hashing is an algorithm that calculates a fixed-size bit string value
from a file. A file basically contains blocks of data. Hashing
transforms this data into a far shorter fixed-length value or key
which represents the original string. The hash value can be
considered the distilled summary of everything within that file.
A good hashing algorithm would exhibit a property called the
avalanche effect, where the resulting hash output would change
significantly or entirely even when a single bit or byte of data within
a file is changed. A hash function that does not do this is
considered to have poor randomization, which would be easy to
break by hackers.
5757
Hashing
A hash is usually a hexadecimal string of several characters.
Hashing is also a unidirectional process so you can never work
backwards to get back the original data.
A good hash algorithm should be complex enough such that it
does not produce the same hash value from two different inputs. If
it does, this is known as a hash collision. A hash algorithm can
only be considered good and acceptable if it can offer a very low
chance of collision.
Types of Hashing
There are many different types of hash algorithms such as
RipeMD, Tiger, xxhash and more, but the most common type of
hashing used for file integrity checks are MD5, SHA-2 and CRC32.
5858
Hashing Techniques
5959
Hashing Techniques
6060
Thank you

Mais conteúdo relacionado

Mais procurados (20)

E-Commerce
E-CommerceE-Commerce
E-Commerce
 
E commerce
E commerceE commerce
E commerce
 
E-Commerce
E-Commerce E-Commerce
E-Commerce
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)
 
E commerce ( A to Z )
E commerce ( A to Z )E commerce ( A to Z )
E commerce ( A to Z )
 
Introduction to e_commerce
Introduction to e_commerceIntroduction to e_commerce
Introduction to e_commerce
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and development
 
Mobile commerce ppt
Mobile commerce pptMobile commerce ppt
Mobile commerce ppt
 
TYPES OF E-COMMERCE
TYPES OF E-COMMERCETYPES OF E-COMMERCE
TYPES OF E-COMMERCE
 
EDI
 EDI EDI
EDI
 
E commerce
E commerceE commerce
E commerce
 
M Commerce- Future of Mobile Commerce AIMK
M Commerce- Future of Mobile Commerce AIMKM Commerce- Future of Mobile Commerce AIMK
M Commerce- Future of Mobile Commerce AIMK
 
An introduction to E-Commerce
An introduction to E-CommerceAn introduction to E-Commerce
An introduction to E-Commerce
 
Electronic Customer Relationship Management (E-CRM)
Electronic Customer Relationship Management (E-CRM)Electronic Customer Relationship Management (E-CRM)
Electronic Customer Relationship Management (E-CRM)
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E Business Introduction
E Business IntroductionE Business Introduction
E Business Introduction
 
E commerce
E commerceE commerce
E commerce
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
 

Semelhante a E commerce

Foundation fo e-commerec(final)
Foundation fo e-commerec(final)Foundation fo e-commerec(final)
Foundation fo e-commerec(final)Anirban Mondal
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section imail4me
 
E commerce in the current scenario
E  commerce in the current scenarioE  commerce in the current scenario
E commerce in the current scenarioAkshit Pathela
 
Lecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khanLecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khanKhalid Khan
 
E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basicsmcatahir947
 
E commerce project PPT for BBA final year as question and answers
E commerce project PPT for BBA final year as question and answersE commerce project PPT for BBA final year as question and answers
E commerce project PPT for BBA final year as question and answersVivekDwivedi99
 
ecommerce online buying and selling prodpdf
ecommerce online buying and selling prodpdfecommerce online buying and selling prodpdf
ecommerce online buying and selling prodpdframidhavsclas
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesFellowBuddy.com
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsNaveed Zahoor
 
IT Infrastructure.pptx................ .
IT Infrastructure.pptx................ .IT Infrastructure.pptx................ .
IT Infrastructure.pptx................ .DivyaVernekar3
 
Sangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce ProjectSangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce Projectdezyneecole
 

Semelhante a E commerce (20)

Foundation fo e-commerec(final)
Foundation fo e-commerec(final)Foundation fo e-commerec(final)
Foundation fo e-commerec(final)
 
Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section i
 
E commerce in the current scenario
E  commerce in the current scenarioE  commerce in the current scenario
E commerce in the current scenario
 
Lecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khanLecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khan
 
E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basics
 
E commerce project PPT for BBA final year as question and answers
E commerce project PPT for BBA final year as question and answersE commerce project PPT for BBA final year as question and answers
E commerce project PPT for BBA final year as question and answers
 
ecommerce online buying and selling prodpdf
ecommerce online buying and selling prodpdfecommerce online buying and selling prodpdf
ecommerce online buying and selling prodpdf
 
E-commerce
E-commerceE-commerce
E-commerce
 
E business & e-commerce contrasted
E business & e-commerce contrastedE business & e-commerce contrasted
E business & e-commerce contrasted
 
E commerce
E commerce E commerce
E commerce
 
Web Commerce
Web CommerceWeb Commerce
Web Commerce
 
ECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture NotesECommerce & Cyber Laws Lecture Notes
ECommerce & Cyber Laws Lecture Notes
 
lecture1428551057.pdf
lecture1428551057.pdflecture1428551057.pdf
lecture1428551057.pdf
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
 
IT Infrastructure.pptx................ .
IT Infrastructure.pptx................ .IT Infrastructure.pptx................ .
IT Infrastructure.pptx................ .
 
Sangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce ProjectSangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce Project
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Business
 
e commerce.pdf
e commerce.pdfe commerce.pdf
e commerce.pdf
 

Mais de Infinity Tech Solutions

Database Management System-session 3-4-5
Database Management System-session 3-4-5Database Management System-session 3-4-5
Database Management System-session 3-4-5Infinity Tech Solutions
 
Main topic 3 problem solving and office automation
Main topic 3 problem solving and office automationMain topic 3 problem solving and office automation
Main topic 3 problem solving and office automationInfinity Tech Solutions
 
Computer memory, Types of programming languages
Computer memory, Types of programming languagesComputer memory, Types of programming languages
Computer memory, Types of programming languagesInfinity Tech Solutions
 
AI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorAI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorInfinity Tech Solutions
 
Programming with matlab session 5 looping
Programming with matlab session 5 loopingProgramming with matlab session 5 looping
Programming with matlab session 5 loopingInfinity Tech Solutions
 

Mais de Infinity Tech Solutions (20)

Database management system session 6
Database management system session 6Database management system session 6
Database management system session 6
 
Database management system session 5
Database management system session 5Database management system session 5
Database management system session 5
 
Database Management System-session 3-4-5
Database Management System-session 3-4-5Database Management System-session 3-4-5
Database Management System-session 3-4-5
 
Database Management System-session1-2
Database Management System-session1-2Database Management System-session1-2
Database Management System-session1-2
 
Main topic 3 problem solving and office automation
Main topic 3 problem solving and office automationMain topic 3 problem solving and office automation
Main topic 3 problem solving and office automation
 
Introduction to c programming
Introduction to c programmingIntroduction to c programming
Introduction to c programming
 
Bds session 13 14
Bds session 13 14Bds session 13 14
Bds session 13 14
 
Computer memory, Types of programming languages
Computer memory, Types of programming languagesComputer memory, Types of programming languages
Computer memory, Types of programming languages
 
Basic hardware familiarization
Basic hardware familiarizationBasic hardware familiarization
Basic hardware familiarization
 
User defined functions in matlab
User defined functions in  matlabUser defined functions in  matlab
User defined functions in matlab
 
Programming with matlab session 6
Programming with matlab session 6Programming with matlab session 6
Programming with matlab session 6
 
Programming with matlab session 3 notes
Programming with matlab session 3 notesProgramming with matlab session 3 notes
Programming with matlab session 3 notes
 
AI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorAI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime Sector
 
Programming with matlab session 5 looping
Programming with matlab session 5 loopingProgramming with matlab session 5 looping
Programming with matlab session 5 looping
 
BIG DATA Session 7 8
BIG DATA Session 7 8BIG DATA Session 7 8
BIG DATA Session 7 8
 
BIG DATA Session 6
BIG DATA Session 6BIG DATA Session 6
BIG DATA Session 6
 
MS word
MS word MS word
MS word
 
DBMS CS 4-5
DBMS CS 4-5DBMS CS 4-5
DBMS CS 4-5
 
DBMS CS3
DBMS CS3DBMS CS3
DBMS CS3
 
DBMS CS2
DBMS CS2DBMS CS2
DBMS CS2
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 

Último (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 

E commerce

  • 1. E – Commerce •By: Prof. Ganesh Ingle
  • 2. 2 Course Outline Overview of e-commerce The Internet and the WWW E-commerce software building blocks and tools Scalability, high-performance servers, web caching Basic cryptography Security, watermarking, firewalls Payment systems Current and future directions
  • 3. 3 Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic commerce is doing commerce with the use of computers, networks and commerce-enabled software (more than just online shopping)
  • 4. 4 Brief History  1970s: Electronic Funds Transfer (EFT)  Used by the banking industry to exchange account information over secured networks  Late 1970s and early 1980s: Electronic Data Interchange (EDI) for e-commerce within companies  Used by businesses to transmit data from one business to another  1990s: the World Wide Web on the Internet provides easy-to-use technology for information publishing and dissemination  Cheaper to do business (economies of scale)  Enable diverse business activities (economies of scope)
  • 5. 5 E-commerce applications Supply chain management Video on demand Remote banking Procurement and purchasing Online marketing and advertisement Home shopping Auctions
  • 6. Ecommerce infrastructure 6 Information superhighway infrastructure Internet, LAN, WAN, routers, etc. telecom, cable TV, wireless, etc. Messaging and information distribution infrastructure HTML, XML, e-mail, HTTP, etc. Common business infrastructure Security, authentication, electronic payment, directories, catalogs, etc.
  • 7. The Main Elements of E-commerce 7  Consumer shopping on the Web, called B2C (business to consumer)  Transactions conducted between businesses on the Web, call B2B (business to business)  Transactions and business processes that support selling and purchasing activities on the Web Supplier, inventory, distribution, payment management Financial management, purchasing products and information
  • 8. Advantages of Electronic Commerce 8 Increased sales Reach narrow market segments in geographically dispersed locations Create virtual communities Decreased costs Handling of sales inquiries Providing price quotes Determining product availability Being in the space
  • 9. 9 Disadvantages of Electronic Commerce Loss of ability to inspect products from remote locations Rapid developing pace of underlying technologies Difficult to calculate return on investment Cultural and legal impediments
  • 10. The process of e-commerce 10 1. Attract customers  Advertising, marketing 2. Interact with customers  Catalog, negotiation 3. Handle and manage orders  Order capture  Payment  Transaction  Fulfillment (physical good, service good, digital good) 4. React to customer inquiries  Customer service  Order tracking
  • 11. Web-based E-commerce Architecture 11 •Client •Tier 1 •Web Server •Tier 3•Tier 2 •Tier N •Application Server •Database Server DMS
  • 12. 12 E-commerce Technologies  Internet  Mobile technologies  Web architecture  Component programming  Data exchange  Multimedia  Search engines  Data mining  Intelligent agents  Access security  Cryptographic security  Watermarking  Payment systems
  • 13. Infrastructure for E-commerce 13  The Internet  system of interconnected networks that spans the globe  routers, TCP/IP, firewalls, network infrastructure, network protocols  The World Wide Web (WWW)  part of the Internet and allows users to share information with an easy-to-use interface  Web browsers, web servers, HTTP, HTML, XML  Web architecture  Client/server model  N-tier architecture; e.g., web servers, application servers, database servers, scalability
  • 17. Types of e-commerce  B2B: E-commerce that is conducted between businesses is referred to as Business-to- business  (1) open to the entire public or (2) limited to a group of businesses who have been part of the specific group  Transaction cost reduced through reduction in  search costs  costs of processing transactions (e.g. invoices, purchase orders and payment schemes)  cost in trading processes  eliminating intermediaries and distributors  increase in price transparency  creates supply-side cost-based economies of scale 17
  • 18. Types of e-commerce..contd…  B2C Commerce  commerce between companies and consumers  involves customers gathering information; purchasing physical goods or information goods  online retailing companies such as Amazon.com, Drugstore.com, Beyond.com, Flipkart.com, Lenskart.com  reduces transactions costs  increasing consumer access to information  reduces market entry barriers 18
  • 19. ..Contd…  B2G e-commerce  commerce between companies and the public sector  use of the Internet for public procurement  licensing procedures 19
  • 20. ..Contd…  C2C e-commerce  commerce between private individuals or consumers  online auctions  auctions facilitated at a portal, such as eBay, which allows online real-time bidding on items being sold in the Web;  peer-to-peer systems, such as the Napster model (a protocol for sharing files between users used by chat forums similar to IRC) and other file exchange and later money exchange models; and  classified ads at portal sites such as Excite Classifieds and eWanted (an inter- active, online marketplace where buyers and sellers can negotiate and which features “Buyer Leads & Want Ads”).  Consumer-to-business (C2B) transactions involve reverse auctions, which empower the consumer to drive transactions. A concrete example of this when competing airlines gives a traveler best travel and ticket offers in response to the traveler’s post that she wants to fly from New York to San Francisco.  There is little information on the relative size of global C2C e-commerce. However, C2C figures of popular C2C sites such as eBay and Napster indicate that this market is quite large. These sites produce millions of dollars in sales every day 20
  • 21. M-Commerce  buying and selling of goods and services through wireless technology  handheld devices such as cellular telephones and personal digital assistants (PDAs) are used  m-commerce will become the choice for digital commerce transactions  bill payment and account reviews can all be conducted from the handheld devices  consumers are given the ability to place and pay for orders on-the-fly  delivery of entertainment, financial news, sports figures and traffic updates to a single mobile  different server than that accessed by the regular online users  allow users to book and cancel rail, flight, movie tickets through their mobile devices 21
  • 22. M-Commerce..contd..  critical considerations for this strategy is the software solution that the organization uses  ‘all in one’ device strategy vs individual device based technology  banks can use cost effective virtual distribution channel  Financial inclusion  Greater reach across the population  convenience without compromising security  benefits are in terms of usage, reach, cost of installation, efforts and money for maintenance, upgradeability and sustainability 22
  • 23. M commerce..contd..  address the needs of all the players (including regulatory requirements)  solution is adopted that can be deployed fast, and can be scalable  care of disparate systems, customized solutions and maintenance cost  a platform that easily integrates new services and allows banks to be flexible  allowing the bank to reap benefits from the full potential of the mobile commerce  M commerce strategy requires a clear vision and objectives and not ‘one size fits all’ approach 23
  • 24. Factors affecting e-commerce  Major forces fuelling e-commerce  Economic forces,  Marketing and customer interaction forces, and Technology  Communications costs,  Low-cost technological infrastructure,  Speedier and more economic electronic transactions with suppliers,  Lower global information sharing and advertising costs, and cheaper customer service cost  Networking of corporations, suppliers, customers/clients, and independent contractors into one community  Networking of the various departments within a corporation, and of business operations and processes 24
  • 25. Factors affecting e-commerce..contd..  Critical business information to be stored in a digital form retrieved instantly transmitted electronically  Connecting businesses (small, medium or large) to trading partners  Sourcing out supplies, buying and selling goods and services online in real time  Center for management of content and the processing of business transactions support services such as financial clearance and information services 25
  • 26. Factors affecting e-commerce..contd..  Provide their target consumers with more detailed product and service information using e-commerce  Logistical and technological infrastructure to other retailers  Expertise in credit analysis  Tracking orders  Product comparison systems  Digitizing content, compression and the promotion of open systems technology  Convergence of telephone services, television broadcast, cable television, and Interne access 26
  • 27. E-commerce components  A corporate Web site with e-commerce capabilities  A corporate intranet so that orders are processed in an efficient manner  IT-literate employees to manage the information flows and maintain the e-commerce system  Banking institutions that offer transaction clearing services  National and international logistics  cost-efficient transport of small and big packages  critical mass of the population with access to the Internet and disposable income  Firms/Businesses with order fulfilling capability 27
  • 28. E-commerce components..contd..  A legal framework governing e-commerce transactions  Legal institutions that would enforce the legal framework  A robust and reliable Internet infrastructure;  A pricing structure that doesn’t penalize consumers for spending time on and buying goods over the Internet  global collection of networks connected to share information  common set of protocols 28
  • 29. E-commerce components  Important component of e-commerce based firm is the website  website should have technology that will make it easier for its customers to navigate  site should offer every single feature necessary  fully-functional and sustainable ecommerce web site  stable server for hosting  provide customer specific services  technology partners who constantly upgrade the features as well as technology  help business partners such as logistics partners and suppliers to share and exchange business data  Alternatively SaaS can be used for running these services (reduce cost) 29
  • 30. Business transformation through e-commerce  Linking stakeholders through e-commerce  Supply chain management integration  The product flow  The information flow  The finances flow  Shared data in diverse database systems, data warehouse  Sharing data “upstream” (with a company’s suppliers) and “downstream” (with a company’s clients)  shared digital business infrastructure  including integrated value chains  e-business management model  business policies consistent with e-commerce laws, teleworking/virtual work, distance learning, incentive schemes 30
  • 31. E-COMMERCE APPLICATIONS: ISSUES AND PROSPECTS  e-banking, e-tailing and online publishing/online retailing  telephone banking, credit cards, ATMs  E-commerce in developing countries  Cash-on-delivery  Bank payments  electronic payment system  Security issues in e-payment  Factors the growth of e-banking in developing countries  access to the Internet  Inclination for banking over the internet  access to high-quality products  Security over internet 31
  • 32. E-Commerce Software 32  Content Transport  pull, push, web-caching, MIME  Server Components  CGI, server-side scripting  Programming Clients  Sessions and Cookies  Object Technology  CORBA, COM, Java Beans/RMI  Visual Studio .NET 2005 (ORCAS, ASP.NET, … etc)  Technology of Fulfillment of Digital Goods  Secure and fail-safe delivery, rights management
  • 33. System Design Issues 33 Good architectural properties Functional separation Performance (load balancing, web caching) Secure Reliable Available Scalable
  • 34. 34 Cryptography  Keeping secrets  Privacy: interceptor cannot use information  Authentication: sender’s identity cannot be forged  Integrity: data cannot be altered  Non-repudiation: sender cannot deny sending  How to evaluate cryptography  Secret key (symmetric) cryptography; e.g., DES  Public key (asymmetric) cryptosystems; e.g, RSA  Digital signatures, digital certificates  Key management; e.g., PKI
  • 35. Public-Key Cryptography 35 Encrypting and decrypting a message using public-key cryptography.
  • 36. Basic terminology 1. Plaintext: original message to be encrypted 2. Ciphertext: the encrypted message 3. Enciphering or encryption: the process of converting plaintext into ciphertext 4. Encryption algorithm: performs encryption 5. Two inputs: a plaintext and a secret key
  • 38. Deciphering or decryption: recovering plaintext from ciphertext Decryption algorithm: performs decryption Two inputs: ciphertext and secret key Secret key: same key used for encryption and decryption. Also referred to as a symmetric key Symmetric Cipher Model
  • 39. Cipher or cryptographic system : A scheme for encryption and decryption Cryptography: Science of studying ciphers Cryptanalysis: Science of studying attacks against cryptographic systems Cryptology: cryptography + cryptanalysis Symmetric Cipher Model
  • 40. Ciphers Symmetric cipher: same key used for encryption and decryption Block cipher: encrypts a block of plaintext at a time (typically 64 or 128 bits) Stream cipher: encrypts data one bit or one byte at a time Asymmetric cipher: different keys used for encryption and decryption
  • 41. Security 41  Concerns about security  Client security issues  Server security issues  Security policy, risk assessment  Authentication methods  Something you know: passwords  Something you have: smart card  Something you are: biometrics  Firewalls, proxy servers, intrusion detection  Denial of service (DOS) attacks, viruses, worms
  • 42. 42 Payment Systems  Role of payment  Cash  properties: wide accept, convenient, anonymity, un- traceability, no buyer transaction cost  Online credit card payment, Smart Cards  Secure protocols: SSL, SET  Internet payment systems  Electronic cash, digital wallets  Micro-payments  Wireless devices
  • 43. Transactions Processing 43 Transactions and e-commerce Overview of transaction processing Transaction processing in e-commerce Keeping business records, audit, backup High-availability systems Replication and scaling Implementation
  • 44. 44 Other System Components Taxes Shipping and handling Search engines Data mining Intelligent agents Inventory management, enterprise resource planning (ERP) Customer relation management (CRM)
  • 45. 45 • SSL was first developed by Netscape in 1994 and became an internet standard in 1996 ( RFC 2246 – TLS V1.0) • SSL is a cryptographic protocol to secure network across a connection-oriented layer • Any program using TCP can be modified to use SSL connection • SSL connection uses a dedicated TCP/IP socket(e.g. port 443 for https) • SSL is flexible in choice of which symmetric encryption, message digest, and authentication can be used • SSL provides built in data compression Encryption and its types SSL Facts
  • 46. 46 SSL Usage • Authenticate the server to the client • Allow the client and server to select cryptographic algorithms, or ciphers, that they both support • Optionally authenticate the client to the server • Use public key encryption techniques to generate shared secret • Establish an encrypted SSL connection
  • 47. 47 SSL  SSL is a secure protocol which runs above TCP/IP and allows users to encrypt data and authenticate servers/vendors identity securely 46 Application layer Transport layerTCP/IP layer SMTPSFTPSHTTPS SECURE SOCKET LAYER
  • 56. 5656 Hashing Hashing is an algorithm that calculates a fixed-size bit string value from a file. A file basically contains blocks of data. Hashing transforms this data into a far shorter fixed-length value or key which represents the original string. The hash value can be considered the distilled summary of everything within that file. A good hashing algorithm would exhibit a property called the avalanche effect, where the resulting hash output would change significantly or entirely even when a single bit or byte of data within a file is changed. A hash function that does not do this is considered to have poor randomization, which would be easy to break by hackers.
  • 57. 5757 Hashing A hash is usually a hexadecimal string of several characters. Hashing is also a unidirectional process so you can never work backwards to get back the original data. A good hash algorithm should be complex enough such that it does not produce the same hash value from two different inputs. If it does, this is known as a hash collision. A hash algorithm can only be considered good and acceptable if it can offer a very low chance of collision. Types of Hashing There are many different types of hash algorithms such as RipeMD, Tiger, xxhash and more, but the most common type of hashing used for file integrity checks are MD5, SHA-2 and CRC32.