E Comm
E Comm
Introduction
This page is an overview of security issues related to E-commerce on the application level. Much of the topic here takes an abstract approach to analyzing the issues involved in providing a secure environment for commerce over the line. The talk focuses on how to provide security on a global scale. Here is an outline for the page. The Role of Security for E-commerce Provides information on the general role security plays into E-Commerce. Basic Principles of Network Security Provides a brief look at the principles involved in what it means to provide security The Concept of Security Platform and Infrastructure Provides an approach to globally implement a security system. Security Requirements for E-commerce Environments Provides some outlines on E-commerce security needs Security Solutions Gives some applied and emerging technological solutions.
These security services are provided to ensure basic E-commerce requirements. Security services
provide a way for safe, authentic, and reliable communications between two or more parties. Security not only includes that the information stays within the communicating parties but also it can be verified and noted as authentic. Signing of contracts, registration of mail, disclosures, anonymity, and authorization schemes of the real world must be able to be replicated and done in the electronic world.
personalization and answers to question who are you? The X.500 an international security solution system that provides hierarchical registration of uniquely identified smart cards. Certification in such a system occurs on two levels, local and global. Locally users are assured safety by certification authorization by the head of there department, group, or system. They are guaranteed security amongst their peers. To provide a worldwide and further reaching security, a global registration is put into place. The providers for local security are then secured themselves in the same manner. This continues up a tree to global certification scheme. For this type of system to work efficiently and without disjoint groups, standards must come to rise. Situations involving payments, document exchange, and sensitive information sharing are then highly secured within a standard very strong security system. The same system may be used for secure financial transactions, supporting business transactions, and personal safety.
Security Solutions
Today many in-place and emerging solutions are providing for a safe Internet world. Some of the more interesting ones rely on cryptographic keys and personalized smart card type technologies. They provide for user authentication and privacy protection. Here are a few systems. E-Commerce Infrastructure: Providing ways to access Credit Card information, and transaction control. E-Commerce Specialized Components, Wallets: Provide safekeeping of customer transactions. E-Commerce Specialized Components, Merchant Servers: Payments and inquiries E-Commerce Specialized Components: Bank Server: Provides for access to all security clearances, registrations, payments, etc. E-Commerce Specialized Components, Certification Servers: Registration and certifications. Smart Card Systems: By one expert is probably best solution for security and personalization of the Internet. Smart Card systems provide a good protection scheme as it takes the security issues away from the Internet/PC domain and puts it into the persons real world wallet.