What Is Adsl Technology?: E Commerce
What Is Adsl Technology?: E Commerce
Security on web
➢ Security on web means security on internate.
➢ TCP/IP can be made secure with the help of cryptographic methods and protocols that have
been developed for securing communications on the Internet. These protocols include SSL and
TLS for web traffic, PGP (PGP (short for Pretty Good Privacy) is a public key encryption program
originally written by Phil Zimmermann in 1991.)For email, and IPSec for the network layer security.
• Posting Information about a Company: Courts have held that merely posting
information about a company, i.e., using the website as an "advertising tool," does not
subject that business to personal jurisdiction.
• Accepting Customers' Names and Addresses: The Ninth Circuit has recognized that a
website that is limited to taking customers' names and addresses is not sufficiently
interactive to confer jurisdiction over the business operating that site.
• Limited Use of an Intermediary Seller (Such as on-line Auctions): The Ninth Circuit has
held that sellers of products via on-line auctions do not subject themselves to
jurisdiction in the state where the goods were sold. It has concluded that the limited of
use of auction sites does not confer jurisdiction because sellers do not know where the
winning bidder will be located and thus are not directing their activity at a specific state.
• Fully Interactive Sites that Take Frequent Orders from Within the Jurisdiction: The
clearest example of an active site is one that fully incorporates on-line ordering and
actively does business in the forum state. The Ninth Circuit has had no difficulty in
determining that websites of major retailers subject those companies to jurisdiction.
• Advertising Website to Potential Customers in the Forum State: A business that
advertises its website within a jurisdiction is considered to be actively marketing its site
and thus subjecting itself to the laws of the jurisdiction where it advertises.
• Frequent Use of an Intermediary Seller (Such as on-line Auctions): Without deciding
the issue, the Ninth Circuit noted that frequent use of an intermediary seller might
confer jurisdiction because frequent use is similar to directed sales.
➢ ECS is an electronic form of funds transfer from one bank account to another.
➢ It can be used by institutions for making payments such as distribution of dividend interest,
salary, and pension, among others.
➢ It can also be used to pay bills and other charges such as telephone, electricity, water or for
making equated monthly installments payments on loans as well as SIP investments. ECS can be
used for both credit and debit purposes.
Types of ECS
There are two types of ECS called ECS (Credit) and ECS (Debit).
ECS (Credit) is used for affording credit to a large number of beneficiaries by raising a
single debit to an account, such as dividend, interest or salary payment.
ECS (Debit) is used for raising debits to a number of accounts of consumers/ account
holders for crediting a particular institution.
ECS payments can be initiated by any institution (called ECS user) who have to make bulk
or repetitive payments to a number of beneficiaries. They can initiate the transactions
after registering themselves with an approved clearing house. ECS users have also to
obtain the permission as also the account information of the beneficiary for participating
the ECS clearings.
The ECS user's bank is called as the sponsor bank under the scheme and the ECS
beneficiary account holder is called the destination account holder. The destination
account holder's bank or the beneficiary's bank is called the destination bank.
The beneficiaries of the regular or repetitive payments can also request the paying
institution to make use of the ECS (Credit) mechanism for effecting payment.
It is a scheme under which an account holder with a bank can authorize an ECS
user to recover an amount at a prescribed frequency by raising a debit in his
account. The ECS user has to collect an authorization which is called ECS mandate
for raising such debits. These mandates have to be endorsed by the bank branch
maintaining the account.
Any ECS user desirous of participating in the scheme has to register with an
approved clearing house. The list of approved clearing houses is available at RBI
web-site www.rbi.org.in. He should also collect the mandate (needed information
The ECS user has to submit the data in specified form through the sponsor bank to
the clearing house. The clearing house would pass on the debit to the destination
account holder through the clearing system and credit the sponsor bank's account
for onward crediting the ECS user. All the unprocessed debits have to be returned
to the sponsor bank within the time frame specified. Banks will treat the electronic
instructions received through the clearing system.
Security Mechanisms
We use several layers of proven security technologies and processes to provide you with secure
online access to your accounts and information. These are continuously evaluated and updated
by our experts to ensure that we protect you and your information. These include:
Authentication
To protect our users, we provide secure private websites for any business that users
conduct with us. Users login to these sites using a valid client number or username and
a password. Users are required to create their own passwords, which should be kept
strictly confidential so that no one else can login to their accounts.
Firewalls
Data Integrity
The information you send to one of our secure private websites is automatically verified
to ensure it is not altered during information transfers. Our systems detect if data was
added or deleted after you send information. If any tampering has occurred, the
connection is dropped and the invalid information transfer is not processed.
Benefit of hypermedia
Transparency
– It implies that users should be unaware that they are accessing multiple systems.
– It is essential for dealing with higher-level issues than physical media and
interconnection ( for which underlying infrastructure is in-charge)
– Ideal picture is of “Virtual Network” - a collection of work-group, departmental,
enterprise, inter-enterprise LANs that appears to the end user or client application to be
a seamless and easily accessed whole.
– It is accomplished using middleware that facilitates a distributed computing
environment.
– This gives users and applications, transparent access to data, computation and other
resources across collections of multi-vendor, heterogeneous systems.
– Transparency is key to realizing the theoretical benefits of middleware based
architecture.
– The goal is for the applications to send a request to the middleware layer, which then
satisfies the request any way it can, using remote information.
• The E-com framework is being built on the WWW architecture.
• Web provides the functionality necessary for electronic commerce.
• E-com depends on the assumption that computers cooperate efficiently for seamless
information sharing.
• But, this assumption of inter-operability has not been supported by realities of practical
computing.
• As the E-com applications try to impose a certain discipline on the proliferating computers and
networks, the diversity of technical standards, product implementation and competing vendors
in computing world causes problems.
• Real effect of computing is all too often the prevention of data sharing due to incompatibilities –
architectures, data formats and communication protocols.
• E-com architecture is made of three primary entities :
– Client Browser
– Web Server
– Third Party services.
Digital Library of
Local or company Information document/
specific data Retrieval Data servers
URL Anchors
Home Page
(starting point)
Document Nodes
Hyperlinks
• More Flexible
– First overview and then sections can be read in different order as per the interest.
• Convenient
– Offer sound, video sequences, animations and even execution of computer programs.
• Increased power and appeal
– When implemented in networked computing environment with high resolution displays
and large on-line storage.
• Dynamic organization
– individual nodes can be updated, new nodes can be linked, new links can be added
• Hypermedia systems allow people to create, annotate, link together, and share information
from a variety of media such as text, graphics, audio, video, animation, and programs.
• Hypermedia systems provide a non-linear, innovative way of accessing and retrieving network
documents.
HTTPD servers
• These are World Wide Web Servers
• Installing and maintaining a Web server is not a trivial matter, given the security and
administrative issued involved.
• More difficult is to choose a server that best fits the organization’s needs. The following Issues
to be considered for choosing the server :
– Right choice of platform and operating system
– Kind of traffic load anticipated on Web server - heavy or light
– kind of security features envisioned
– flexibility and robustness of server needed
• Flexibility, ease of administration, security features and familiarity often rank much higher in the
decision process.
• A server used for Internet-based marketing and technical support tasks will need more robust
servers than used internally within a firewall for memo and bulletin distribution.
• Httpd servers are ideal for companies that want to provide a multitude of services ranging from
product information to technical support.
• The way to provide other services via the Web is with HTML pages and CGI scripts that allow the
Web server to act as a gateway to other Internet services such as databases (Oracle or Sybase),
Gopher and news.
• Public data :
– have no security restrictions, can be read by anyone.
– Should be protected from unauthorized tampering or modification.
• Copyright data :
– that is copyrighted but not secret
– owner of data is willing to provide it but user has to pay for it.
– Objective is to maximize revenue and security.
• Confidential data:
– material that is secret but whose existence is not secret.
– Such data include bank account statements, personal files etc.
– may be referenced by public or copyright data.
• Secret data :
– existence is secret , might include algorithms
– it is necessary to monitor and log all access to secret data.
• Security and verification are necessary for all types of data because of sensitivity of information
being transferred and to protect the consumer from various forms of fraud and misconduct.
– Weak authentication with low maintenance overhead and without patent or export
restrictions.
• User identity must be established as genuine.
• Unauthorized access must be improbable but need not be secure from all
possible forms of attack.
– Strong authentication via public key exchange
• A user identity must be established as genuine.
• Unauthorized access must be impossible except by random chance or by access
to unknown technology
– Strong encryption of message content.
• Data must not be transmitted in a form comprehensible to a third party
• An identified party acts as guarantor in this respect.
➔ Just-in-Time Manufacturing :
JIT purchasing
– Allows a manufacturer to fit in its supplier efforts toward eliminating waste in the
upstream portion of the manufacturing cycle.
– Focuses on the reduction of inventories throughout the logistical systems of the
manufacturing firms involved and Provides a careful audit of the production
process.
– Optimizes supplier and customer relations
– In production, needed materials are to be supplied just in time (no earlier or later
than is demanded for processing)
– Production costs decrease as required stock level is reduced.
– Market risks passed on through supplier chain (material from supplier is ordered
by production plant, only if products can be sold)
– Quality control of production is very much enhanced.
– All stages of production are closely monitored for sufficient assessment of
imperfections.
– Concept of co-makership has been introduced by such collaboration between
suppliers and customers.
– To achieve JIT savings, corporations have installed private communication
networks. The I-way makes this practice more affordable and easily available to a
number of small firms.
(2)
(1)
automatically
purchases
collated
warehouse
material to recorded
receivesand
order
ship the
Bybypoint-of-sale
store the (POS)
restocks
V
e
n
d
Quick Response Chain o
• A final requirement is switching hardware and software to move huge amounts of data
effortlessly over such a complex network.
Linking all the components of the i-way will require large capital investment in open
systems and installing gateways between various networks. A final requirement is switching
hardware and software to move huge amounts of data effortlessly over such a complex
network.
• At the high end it might be a box with a menu system based on icons for navigating
through various activities :
– To shop, access a bank account, play video games, watch a pay-per-movie,
examine an on-screen TV schedule.
• Cable operators will be able to download software through the cable system into the
set-tops.
• Set-tops will have slots for add-on cards that can be used to :
– change or add applications, provide security, expand unit’s memory
• Set-top boxes will also have a serial data port that can be hooked up to a printer.
• Main goal : to be flexible for the applications of tomorrow.
• For more sophisticated transactions, much of the intelligence will be in the set-top
device (as opposed to residing in a central computer).
(iii) Pipeline
(iv) Brains
(v) Accessibility
• Display
– TV is well adapted to showing full-motion video to viewers sitting several feet
away, but it’s text display is extremely limited.
– High-definition TV, still getting off the ground, is sharper but still too poor for
text.
– Computer displays can easily display video, text, and graphics crisply to a viewer
seated one and half feet away.
– Computers wouldn’t have to adapt much to match TV’s strengths, but TV is a
long way from matching a computer monitor’s strength.
• Controls
– Set-top will use a hand-held remote control that permits selections from menus.
– Computer has a full-function keyboard;most also have a mouse for pointing,
clicking and high-lighting;other devices such as joysticks, trackballs, light pens,
and voice recognition systems are widely available.
– Far more flexible and powerful ways to interact with a computer than with a
television.
• Pipeline
– Existing cable TV systems can deliver a huge amount of info rapidly one way – to
the home – but must be modified to allow a significant return flow.
– New modems and networks let computers communicate over high capacity
cable lines.
– Future systems will need high-capacity lines to deliver the vast volume of data
needed for digitized video like movies on-demand.
• Brains
– Set-top box is a special-purpose computer with powerful graphics and
communications features but limited versatility*
– Box is largely a slave to the central computers of the interactive system.
– PCs are very versatile ; interactive applications are just part of its versatility.
– PCs are powerful in their own right and not dependent on system’s central
computers with which they communicate.
– Centralized control has usually given way to autonomy for users.
• Accessibility
– Every household has a TV and is familiar and comfortable with using it.
– People most likely to use interactive systems may be the same ones most
attracted to computers.
– Leap to interactive use is greater from passive TV watching than from active
computer use.Thus, universality of TV is less advantageous than it appears.
– But a Significant part of public remains uncomfortable with computers.