0% found this document useful (0 votes)
72 views

Trends in Information Technology Infrastructure: DR Ritu Yadav

The document discusses trends in information technology infrastructure, including virtualization, cloud computing, cloud pricing models, cloud security techniques, digital payment methods, and the evolution to web services. Specifically, it covers virtualization and its benefits, different types of cloud computing (IaaS, PaaS, SaaS), cloud security methods like proxy servers and sandboxing, various digital payment methods like credit cards, debit cards, UPI, and their underlying processes and security measures. It also discusses the transition to web services using XML, SOAP, WSDL and service-oriented architectures.

Uploaded by

sudhanshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Trends in Information Technology Infrastructure: DR Ritu Yadav

The document discusses trends in information technology infrastructure, including virtualization, cloud computing, cloud pricing models, cloud security techniques, digital payment methods, and the evolution to web services. Specifically, it covers virtualization and its benefits, different types of cloud computing (IaaS, PaaS, SaaS), cloud security methods like proxy servers and sandboxing, various digital payment methods like credit cards, debit cards, UPI, and their underlying processes and security measures. It also discusses the transition to web services using XML, SOAP, WSDL and service-oriented architectures.

Uploaded by

sudhanshu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Trends in Information

Technology Infrastructure
Dr Ritu Yadav
What is Cloud
• Virtualization
• Allows single physical resource to act as multiple resources (i.e., run multiple instances of OS)
• Reduces hardware and power expenditures
• Facilitates hardware centralization
• Software-defined storage (SDS)
• Cloud computing
• On-demand computing services obtained over network
• Infrastructure as a service (IaaS)
• Software as a service (SaaS)
• Platform as a service (PaaS)
• Cloud can be public or private
• Allows companies to minimize IT investments
• Drawbacks: Concerns of security, reliability
• Hybrid cloud computing model
Cloud Pricing
Cloud Security
• H-Energy Cloud Security Reading
• Proxy Servers and their role in IS Security
• Cloud Sandbox
• Static Analysis
• Behavioural Analysis
• Cloud Intelligence
Digital Payments
• Credit Cards
• What is it?
• A card with a unique number attached with an account – with a magnetic strip
embedded in it to read credit card data using card readers
• Who are the actors involved?
• The card holder − Customer
• The merchant − seller of product who can accept credit card payments
• The card issuer bank − card holder's bank
• The acquirer bank − the merchant's bank
• The card brand − for example , visa or Mastercard.
• How does the transaction happen?
Digital Payments
• Credit Cards
• How does the transaction happen?
• Step 1: Bank issues and activates a credit card to the customer on his/her request
• Step 2: The customer presents the credit card information to the merchant site or to the merchant
from whom he/she wants to purchase a product/service.
• Step 3: Merchant validates the customer's identity by asking for approval from the card brand
company.
• Step 4: Card brand company authenticates the credit card and pays the transaction by credit.
Merchant keeps the sales slip.
• Step 5: Merchant submits the sales slip to acquirer banks and gets the service charges paid to
him/her.
• Step 6: Acquirer bank requests the card brand company to clear the credit amount and gets the
payment.
• Step 7: Now the card brand company asks to clear the amount from the issuer bank and the amount
gets transferred to the card brand company.
Digital Payments
• Credit Cards
• Debit Cards
• Payment through debit card, the amount gets deducted from the card's bank account
immediately
• Hence, as part of the validation - there should be sufficient balance in the bank account for the
transaction to get completed
• Smart Cards
• A plastic card embedded with a computer chip that stores and transacts data between
users
• Requisite – a chip reader
• More Secure – Remember the hash codes!
• Used in health-care, banking (ex: Mondex and Visa Cash cards), entertainment and transportation
Digital Payments
• Credit Cards
• Debit Cards
• Smart Cards
• Electronic Fund Transfer
• Fund transfer can be done using ATM (Automated Teller Machine) or via
internet
•  Customer's bank transfers the amount to other account if it is in the same bank
• Otherwise the transfer request is forwarded to an Automated Clearing House
(ACH) to transfer the amount to other account and the amount is deducted
from the customer's account.
Digital Payments – The Security Part
• Mobile Banking
• Unstructured Supplementary Service Data (USSD) based Mobile Banking
• a communications protocol used by GSM cellular telephones
• Requirement – Account in a bank, and a GSM phone linked to your bank account
• Bank will give you Mobile Money Identifier (MMID) and Mobile PIN (MPIN) upon registration
Digital Payments
• Unified Payments Interface
• Unified Payments Interface is an instant real-time payment system developed
by National Payments Corporation of India facilitating inter-bank transactions
• regulated by the Reserve Bank of India
• Requirements - Smartphone with internet facility, Bank Account details

Google Pay (Tez), BHIM, PhonePe and Paytm are all


UPI apps which use a VPA(Virtual Payment
Address)/UPI ID to make & receive payments
Digital Payments
• PoS (Point of Sales)
Share of payment systems across India in
FY 2019, by volume
Digital Payments – The Security Part
• Secure Socket Layer
• It supports - authentication, confidentiality, message integrity, and non-repudiation
• i.e.?
• Can be identified with https://
• Secure Electronic Transaction
• SET protocol was supported in development by major organizations like Visa, Mastercard, Microsoft which
provided its Secure Transaction Technology (STT) and NetScape which provided technology of Secure Socket
Layer (SSL).
• What are the main actors (again) –
• Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure purchases online via point and click
interface
• Merchant Software − This software helps merchants to communicate with potential customers and financial institutions in a
secure manner.
• Payment Gateway Server Software − Payment gateway provides automatic and standard payment process. It supports the process
for merchant's certificate request.
• Certificate Authority Software − This software is used by financial institutions to issue digital certificates to card holders and
merchants, and to enable them to register their account agreements for secure electronic commerce.
Digital Payments – The Security Part
• Secure Socket Layer
• Secure Electronic Transaction
• Requirements in SET Protocol
• It has to provide mutual authentication i.e., customer (or cardholder) authentication by confirming if the
customer is intended user or not and merchant authentication
• Standard X.509V3 certificates are used for merchant verification
• It has to keep the PI (Payment Information) and OI (Order Information) confidential by appropriate
encryptions
• Traditionally DES is used for encryption purpose
• It has to be resistive against message modifications i.e., no changes should be allowed in the content
being transmitted.
•  using RSA digital signatures with SHA-1 and some using HMAC with SHA-1
• Dual Signatures – for two different receivers! - Order Information (OI) for merchant, Payment Information (PI)
for bank
• SET also needs to provide interoperability and make use of best security mechanisms.
The Web Services Era
• Web services and service-oriented architecture
• Web services
• Web services communicate through XML messages over standard Web protocols
• Companies discover and locate Web services through a directory. Everyone shares the same standards
• XML : Extensible Markup Language
• The Protocol
• Simple Object Access Protocol (SOAP) - for sending and receiving messages between applications without confronting
interoperability issue
• How to know what services are available and how to use it?
• Web Services Description Language or WSDL - a document that describes a Web service and also tells you how to
access and use its methods
• SOA : service-oriented architecture
• Set of self-contained services that communicate with one another to create a working software application
• Software developers reuse these services in other combinations to assemble other applications as needed
How Dollar Rent A Car Uses Web
Services

You might also like