Module-1: Introduction of E-Commerce
Module-1: Introduction of E-Commerce
Introduction of E-Commerce
History of e-commerce
In 1968 e-commerce got its start through an electronic
data interface which allowed companies the ability to
complete transaction with each others.
reliability.
Types of E-commerce
Business to Business (B2B)
Business to Consumer (B2C)
Consumer to Business (C2B)
Consumer to Consumer (C2C)
Business to Government (B2G)
CONSUMER-TO-BUSINESS(C2B)
Consumer-to-business (C2B) is a business model where an end
user or consumer makes a product or service that an organization
uses to complete a business process or gain competitive advantage.
The C2B methodology completely transposes the traditional
business-to-consumer (B2C) model, where a business produces
services and products for consumer consumption.
In C2B, the companies typically pay for the product or service.
However, it can assume different forms like an idea generated by
an individual (like an innovative business practice) which may be
used and implemented by an organization.
Security
E-commerce security refers to the principles
which guide safe electronic transactions,
allowing the buying and selling of goods and
services through the Internet, but with
protocols in place to provide safety for those
involved.
A weak link in the chain can provide an
Threat to Client
Threat to Server
Threat to Communications Channel
Threat to Client
Client threats mostly arise from malicious data or code, malicious code
refers to viruses, worms, Trojan horses & deviant.
Trojan House- A program that performs a desired task but also performs
unexpected function.
Integrity threat
◦ Integrity means you will get the same response every time.
◦ An integrity threat presents when an unauthorized party can alter the
message stream of information.
◦ Unprotected payment transactions are come in integrity threat. Example-
Cyber vandalism
Contd…
Availability threats- Every system has defined
availability. It is also known as denial and delay
threat. It bringing down the availability of the system.
Example- ATM/IRCTC
Encryption
Encryption is the process of converting data to an
unrecognizable or encrypted form. In generic term it
refer to act of encoding data, so that those data can be
securely transmitted via the internet.
The purpose of converting data that only authorized
Plaintext
Encryption algorithm
Secret key
Cipher text
Decryption algorithm
Advantage of Secret Key Encryption
It is extremely secure.
Encrypting and decrypting the data from secret key is
relatively easy.
In this system only secret key can decrypt the message.
Disadvantage of Secret Key
Encryption
It cannot provide digital signature that can be
repudiated.
The only secure way of exchanging keys would be
Shamir Adleman).
Elements of Public Key Encryption
Plaintext
Encryption algorithm
Public and private key
Cipher text
Decryption algorithm
Advantage of Public Key Encryption
Only one part must be kept secret.
It can serve as a digital signature.
The pair of keys can be used with any other entity.
There is no need for initial key exchange.
Disadvantage of Public Key
Encryption
It is not efficient for long message.
Keys must be long (at least 1024 bits).
Slow do the enormous amount of computation
involved.
Association between an entity and its public key must
be verified.
Digital Signature
A digital signature is an electronic rather than a written
signature that can be used by someone to authenticate
the identity of the sender of the message or of the
signer of a document.
It is also referred as electronic signature or e- signature.
It is used to validate the authenticity and integrity of
message.
It confirms that the information originated from the
pages.
It enables encryption of sensitive information on e-
commerce sites.
Digital certificate negate the increasing perils and
It uses public key cryptography and digital certificate in such a way that client
and server can authenticate each other and engage in secure communication.
In the initial phase client and server select a key crypto scheme to use. Client then
sends the secret key to server using the server public key from the server
certificate. To see that information exchange between client and server being
encrypted.
In order for SSL connection to be made it is mandatory to have a digital
certificate installed on the web server.
online
E-mail exchanges
Transfer of files
Remote login
Smart Card
A smart card is a device with the dimensions of a credit card
that uses a small microchip to store and process data. In many
cases, smart cards have replaced old magnetic cards because
they can handle more information and provide more
functionality. Smart cards are now in use in many industries,
including retail, transit systems and security services.
It is plastic card with embedded microprocessor chip,
electronic memory and a battery.
It is used for information storage, authentication and payment
mechanism.
Features
Small plastic card embedded with an IC chip.
Chip can be either a memory or microprocessor type.
Useful for storing and transacting data.
Data is associated with either value, information or both.
Types of Smart Card
Contact smart cards are the most common type of smart card. Contact
smart cards are inserted into a smart card reader that has a direct
connection to a conductive contact plate on the surface of the card.
Memory smart cards contain memory chips can only store, read and
write data to the chip; the data on memory smart cards can be over-written
or modified, but the card itself is not programmable so data can't be
processed or modified programmatically. Memory smart cards can be read-
only and used to store data such as a PIN, password or public key; they can
also be read-write and used to write or update user data.
Microprocessor smart cards are cards with a
microprocessor and memory.
This smart card contains a small microchip that can
process and store thousands of bits of electronic data.
This type of chip is similar to those found inside all
personal computers and when implanted in a smart card,
manages data in organized file structures, via a card
operating system (COS).
Examples of Smart Card
Transit cards can be used by local and regional transit systems to
process payments as well as give riders points on their
purchases( Metro card).
Smart cards are used as ID cards issued by schools, corporations
and government entities to control access to physical locations.
Medical institutions use smart cards to securely store patient
medical records.
Loyalty Card
Simcard
Gift voucher
Memory card
Advantages
More secure – these card use encryption and
authentication technology which is more secure than
previous method.
Safe to transport- these card give the freedom to
Common standards
ANSI X12 is the standard that any industry can use
management)
Speed
Electronic transfer Vs mail/ courier
Accuracy
Avoids duplicate data entry and error margin
Security
Information less susceptible to interception/ falsification
EDI Issues
Initial and operative costs
Need to share master data with external partners
Security Concerns
Confidentiality of information
Authenticity of information
Requires continuous maintenance and resources
EDI APPLICATIONS IN
BUSINESS
Four different scenarios in industries that use EDI
extensively:
International or cross-border trade
Electronic funds transfer
Health care EDI for insurance claims processing
Manufacturing & retail procurement