Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

UNIT-I

Electronic Commerce:
Traditional commerce and E-commerce, Internet and WWW, Role of WWW, Value Chains,
Strategic Business and Industry Value Chains, Role of E- commerce. Packet Switched Networks,
TCP/IP Protocol Script, Internet Utility Programmes – SGML, HTML and XML, Web Client
and Servers, Web Client/Server Architecture, Intranet and Extranets, Web Based Tools for E-
commerce, Security.

Traditional commerce and E-commerce


1. Traditional Commerce :
Traditional commerce refers to the commercial transactions or exchange of information,
buying or selling product/services from person to person without use of internet which is a
older method of business style and comes under traditional business. Now a days people are
not preferring this as it is time taking and needs physical way of doing business.
Example includes physical market/bazaar.
2. E-commerce :
E-commerce refers to the commercial transactions or exchange of information, buying or
selling product/services electronically with the help of internet which is a newer concept of
business style and comes under e-business. Now a days people are preferring this as it is less
time taking and does not need physical way of doing business everything can be done with
laptop or smartphone and internet.
Example includes online shopping sites.

Difference between Traditional Commerce and E-commerce :

S.No. TRADITIONAL COMMERCE E-COMMERCE

Traditional commerce refers to the E-commerce refers to the commercial


commercial transactions or exchange of transactions or exchange of
information, buying or selling information, buying or selling
product/services from person to person product/services electronically with
01. without use of internet. the help of internet.

In traditional commerce it is difficult to


establish and maintain standard In e-commerce it is easy to establish
02. practices. and maintain standard practices.

In traditional commerce direct In e-commerce indirect interaction


interaction through seller and buyer is through seller and buyer occurs using
03. present. electronic medium and internet.

Traditional commerce is carried out by E-commerce is carried out by internet


face to face, telephone lines or mail or other network communication
04. systems. technology.
In traditional commerce processing of In e-commerce processing of
05. transaction is manual. transaction is automatic.

In traditional commerce delivery of In e-commerce delivery of goods takes


06. goods is instant. time.

Its accessibility is for limited time in a Its accessibility is 24×7×365 means


07. day. round the clock.

Traditional commerce is done where E-commerce is used to save valuable


08. digital network is not reachable. time and money.

Traditional commerce is a older method E-commerce is a newer concept of


of business style which comes under business style which comes under e-
09. traditional business. business.

10. Its resource focuses on supply side. Its resource focuses on demand side.

Internet and WWW:


The terms World Wide Web (WWW) and the Internet are so often used interchangeably that the
fundamental difference between the two is easily forgotten.
In simple words, WWW is just a common point of connectivity for information sharing that is
facilitated by a global network of computers.
The internet, on the other hand, is a connection between computers and countless other devices
that form a huge network of systems.
Differences between WWW and Internet
WWW (World Wide Web) Internet

The World Wide Web is the common system for The internet is a public network of network
navigating the internet. It is not the only system that with a maze of wired and wireless connections
can be used for such access, but it is by far the most between separate groups of servers computers
common one. and countless devices from around the world

The World Wide Web is distinguished from other Along with Internters, there also exist the
systems through its use of HTTP (Hypertext Transfer Intranets, which is the same type of
Protocol). It can be safely said that the HTTP is the information network but more privatized in
language of the World Wide Web order to control access.

WWW is more software-oriented as compared to the Internet is primarily hardware-based.


Internet

The HTTP along with being the language of the World The internet is governed by a set of rules and
Wide Web also governs it by dealing with linking of regulations collectively known as Internet
files, documents and other resources Protocol (IP). The IP deals with data
transmitted through the internet.
The invention of the World Wide Web can be credited The first workable prototype of the Internet
to Sir Tim Berners Lee. During his work at the was the ARPANET (Advanced Research
European Organization for Nuclear Research in 1989, Project Agency Network) in the late 1960s.
he had developed the basic idea of the WWW to merge After its adoption on January 1st 1983,
the evolving technologies of computers, data networks researchers began to develop a “network of
and hypertext into a powerful and easy to use global networks” which evolved into the modern
information system. form of the Internet

Role of WWW:
The World Wide Web abbreviated as WWW or the Web. It is an information space where
documents and other web resources are identified by Uniform Resource Locators (URLs),
interlinked by hypertext links, and can be accessed through the Internet.
Scientist Tim Berners Lee invented the World Wide Web in 1989. He introduced the first web
browser computer program in 1990 . the browsers available in general public on the Internet in
August 1991.

WWW Operation:
The World Wide Web is the universe of network-accessible information, an expressionof human
knowledge. All the resources and users on the Internet that are using the Hypertext Transfer
Protocol HTTP.
It is a way of exchanging information between computers on the Internet, tying them together into
a vast collection of interactive multimedia resources.
Web Page:
Webpage is a document commonly written in HyperText Markup Language (HTML) that is
accessible through the Internet or other network using an Internet browser. A web page is accessed
by entering a URL address and may contain text, graphics and hyperlinks to other web pages and
files. The page you are reading now is an example of a web page.

Domain Name:
A domain name is an identification a string that defines a area of administrative autonomy,
authority or control within the Internet. Domain names are formed by the rules and procedures of
the Domain Name System (DNS). Any name registered in the DNS is a domain name. Domain
names are used in various networking backgrounds and application-specific naming and
addressing purposes. In general, a domain name represents an Internet Protocol (IP) resource, such
as a personal computer used to access the Internet, a server computer hosting a web site.

There are several domain names available:


• Generic domain names such as .com, .edu, .gov, .net.
• Country level domain names such as au, in, za, us.

The following table shows the Generic Top-Level Domain names:


Table 15.1 Top-Level Domain names
Web Browser:
A web browser also called browser. It is a software application for retrieving, presenting and
traversing information resources on the World Wide Web. An information resource (web data) is
identified by a Uniform Resource Identifier (URI/URL) that may be a web page, image, video or
other piece of content available in web server. Browsers are primarily use the World Wide Web,
they can also be used to access information provided by web servers in private networks or files
in file systems.

Web Server:
Aweb server is a computer system application that processes requests via HTTP, the basic network
protocol used to distribute information on the World Wide Web. The term can refer to the entire
system, or specifically to the software that accepts and supervises the HTTP requests
Following table describes the most leading web servers available today:

Web Hosting:
Web Facilitating is an administration of give online space to capacity of site pages .These Site
pages are made accessible by means of WWW.The organizations which offer site facilitating are
known as web host

Examples of Web Hosting Companies:


• Go Daddy
• Amazon Web service
• Digital Ocean
• Free webhostingarea.com

Value Chains:

A value chain is a concept describing the full chain of a business's activities in the creation of a
product or service -- from the initial reception of materials all the way through its delivery to
market, and everything in between.
The value chain framework is made up of five primary activities -- inbound operations,
operations, outbound logistics, marketing and sales, service -- and four secondary activities --
procurement and purchasing, human resource management, technological development and
company infrastructure.
A value chain analysis is when a business identifies its primary and secondary activities and
subactivities, and evaluates the efficiency of each point. A value chain analysis can reveal
linkages, dependencies and other patterns in the value chain.
Strategic Business and Industry Value Chains:
The value chain concept is based on the process view of organizations. It is an idea of considering
a manufacturing (or service) organization as a dynamic system, made up of various subsystems
each with inputs, transformation processes and outputs.
The inputs, transformations, and outputs require the acquisition and consumption of company
resources, such as money, equipment, materials, labor, buildings, land, administration and
management. The management process of carrying out value chain activities determines the costs
and affects the profitability of organizations.
Most of the organizations in the real world engage in hundreds, even thousands of activities while
converting its inputs to outputs. These activities are classified as either primary or support
activities.

According to Michael Porter (1985), the primary activities are −


 Inbound Logistics − Inbound logistics refers to the terms with the suppliers and includes
all of the activities needed to receive, store, and disseminate inputs.
 Operations − Operations refer to the entire activities needed to transform the various inputs
into outputs (the products and services).
 Outbound Logistics − Outbound logistics include all sets of activities needed to collect,
store, and distribute the output.
 Marketing and Sales − Marketing and sales include the activities to inform buyers
regarding the products and services, induce the buyers to purchase them, and enable their
purchase.
 Service − Service refers to those activities needed to keep the product or service functioning
effectively after it is sold and delivered.
Secondary activities include the following −
 Procurement − The inheritance of inputs or the various resources for the firm.
 Human Resource Management − The activities involved in recruiting, training,
improving, compensating and also dismissing personnel.
 Technological Development − The equipment, hardware and software, processes and
technical knowledge involved in the transformation of inputs into outputs.
 Infrastructure − The functions or departments such as accounts, legal and regulative,
finance, planning and executing, public affairs and public relations, government relations,
quality management and general management.

Role of E- commerce:
The role of e-commerce in business.
1. The main goal of business to find more customers. The word Electronic means allows an
enterprise to reach more customer base.
2. Another important aim of the business is to gain profit.
3. E-commerce provides very high efficiency in supply chain management.
4. E-commerce makes the cash cycle more fast and efficient.
5. can easily control Business processes
6. E-commerce demands more effort when this is done, it provides many good services.
7. E-commerce is a very vast field… It practically likes rebuilding the distribution chains.
Its main purposes to cover end to end value points.
8. It provides an amazing solution for more complex problems.

Advantages of E-commerce
 Low operational cost and provide batter quality products
 There is in need of a physical shop or building for business.
 It provides an easy way to find products and make shopping processes faster.
 Easy to start and manage business
 You can easily expand your business.
 There is no geographically limitations
Disadvantages of E-commerce
 There are lots of security issues.
 If your site is crash all businesses will go down.
 There is no way to test the product before purchase
 There is late delivery of products
 There is no privacy.
 Some products are difficult to buy online.
 There is a tax issue.

Packet Switched Networks:


A packet switched network (PSN) is a type of computer communications network that
groups and sends data in the form of small packets. It enables the sending of data or
network packets between a source and destination node over a network channel that is
shared between multiple users and/or applications. A packet switched is also known as a
connectionless network, as it does not create a permanent connection between a source
and destination node.
A packet switched network is one of the most commonly used computer networks. It is widely
implemented on local networks and the Internet.
A PSN generally works on the Transmission Control Protocol/Internet Protocol (TCP/IP)
protocol suite or the Open Systems Interconnection (OSI) layer. For data to be transmitted over a
network, it is first distributed into small packets, which depend on the data’s protocol and overall
size. Each packet contains various details, such as a source IP address, destination IP address and
unique data and packet identifiers.
The segregation of data into small packets enables efficient data transportation and better
utilization of the network medium/channel. More than one user, application and/or node may
take turns sending and receiving data without permanently retaining the underlying
medium/channel, as in a circuit switched network.

TCP/IP Protocol Suite:


Transmission control protocol/Internet protocol (TCP/IP), the protocol on which the Internet is
built, is actually not a single protocol but rather an entire suite of related protocols. TCP is even
older than Ethernet. It was first conceived in 1969 by the Department of Defense. Currently, the
Internet Engineering Task Force, or IETF, manages the TCP/IP protocol suite.
The TCP/IP suite is based on a four-layer model of networking that is similar to the seven-layer
open systems interconnection (OSI) model. The following illustration shows how the TCP/IP
model matches up with the OSI model and where some of the key TCP/IP protocols fit into the
model.
As you can see, the lowest layer of the model, the Network Interface layer, corresponds to the
OSI model’s Physical and Data Link layers. TCP/IP can run over a wide variety of Network
Interface layer protocols, including Ethernet, as well as other protocols, such as Token Ring and
FDDI (an older standard for fiber-optic networks).

The Application layer of the TCP/IP model corresponds to the upper three layers of the
OSI model — that is, the Session, Presentation, and Application layers. Many protocols
can be used at this level. A few of the most popular are HTTP, FTP, Telnet, SMTP, DNS,
and SNMP.

IP
IP is a network layer protocol that is responsible for delivering packets to network devices. The
IP protocol uses logical IP addresses to refer to individual devices rather than physical (MAC)
addresses. A protocol called ARP (for address resolution protocol) handles the task of converting
IP addresses to MAC addresses.
Because IP addresses consist of a network part and a host part, IP is a routable protocol. As a
result, IP can forward a packet to another network if the host is not on the current network. (The
ability to route packets across networks is where IP gets its name. An Internet is a series of two
or more connected TCP/IP networks that can be reached by routing.)

TCP
TCP is a connection-oriented transport layer protocol. TCP lets a device reliably send a packet to
another device on the same network or on a different network.
TCP ensures that each packet is delivered if at all possible. It does so by establishing a
connection with the receiving device and then sending the packets. If a packet doesn’t arrive,
TCP resends the packet. The connection is closed only after the packet has been successfully
delivered or an unrecoverable error condition has occurred.
One key aspect of TCP is that it’s always used for one-to-one communications. In other words,
TCP allows a single network device to exchange data with another single network device. TCP
isn’t used to broadcast messages to multiple network recipients. Instead, the user datagram
protocol (UDP) is used for that purpose.
Many well-known application layer protocols rely on TCP. For example, when a web browser
requests a page, the browser uses HTTP to send a request via TCP to the web server. When the
web server receives the request, it uses HTTP to fulfill the request, again via TCP. Other
Application layer protocols that use TCP include Telnet (for terminal emulation), FTP (for file
exchange), and SMTP (for e-mail).

Internet Utility Programmes – SGML, HTML and XML:


SGML, HTML, and XML are all markup languages. The term "markup" originated from editors
making revisions to writers' manuscripts. An editor "marks up" the manuscript to highlight
certain fields. In computer technology, a markup language is a set of words and symbols that
highlights text to define it for a web document. For example, to separate paragraphs and put
letters in a boldface type, web designers use markup language. Once you understand the roles
SGML, HTML, and XML play in web design, you'll see the kinship these distinct languages
have with each other. In a nutshell, SGML, HTML, and XML is a family of languages that help
make websites functional and web design dynamic.
SGML
In this family of markup languages, Standard Generalized Markup Language (SGML) is the
parent. SGML provides a way to define markup languages and sets the standard for their form. In
other words, SGML states what some languages can or cannot do, what elements must be
included, such as tags, and the basic structure of the language. As a parent passes on genetic
traits to a child, SGML passes structure and format rules to markup languages.
HTML
HyperText Markup Language (HTML) is a child, or application, of SGML. It is HTML that
structures the page for a browser. Using HTML, you can embed images, create page sections,
establish fonts, and direct the flow of the page. Additionally, using HTML, you can add other
functions to a website via scripting languages such as JavaScript. HTML is the predominant
language used in website design.
XML
Extensible Markup Language (XML) is a cousin to HTML and a nephew to SGML. Although
XML is a markup language and therefore part of the family, it has different functions than
HTML. XML is a subset of SGML, which gives it rights that an application, such as HTML,
does not have. XML can define applications of its own. Resource Description Format (RDF) is
an application of XML. HTML is limited to design and does not have subsets or applications.
XML is a pared-down, or light, version of SGML, designed to work with limited bandwidth.
XML inherited genetic traits from SGML but is created to make its own family. Subsets of XML
include XSL and XSLT.

Web Client and Servers:


A Web client is an application installed on the user’s device that they can use to surf the internet.
Web clients request computer servers for a webpage but don’t store them.
Without these clients, an ordinary user can’t use the internet. When you search for a particular
webpage through your browser, it retrieves the page from the appropriate server and displays the
result. The client and server communicate via HTTP(Hypertext Transfer Protocol).
Features of Web Clients
These days, all web browsers offer some standard features which aim to make internet browsing
easier for us. In short, your choice of web client should feature some of the following.
 Support for private/incognito browsing.
 VPN or Proxy support.
 Multiple tabs or windows.
 Back/Previous and Forward buttons.
 Home, Refresh, Stop buttons.
 Address bar for URL.
 History and bookmark.
Example of Web Clients
Some popular examples of web clients include Google Chrome, Microsoft Edge, Safari, Tor, etc.
So all types of internet browsers are client software. However, there’re other types of clients that
many people use for everyday tasks. Video calling solutions like Zoom or Jitsi are one example
of such clients. And so are SSH clients such as PuTTY or WinSCP. They allow users to connect
to a different machine over the web.

How Web Client Works with Web Server Applications


The information web client display on your screen, like this article, is powered by web servers.
So, how does your client work with web server applications?
Well, the Web server applications include a range of software that provide features like sending
and receiving client requests, processing data on the fly and displaying them in the correct order.
These applications communicate with your server via the HTTP protocol. However, some
servers also use other protocols.

When you send a web request to a page, one of these server applications handles your request. It
checks if the request made by the client software is valid and whether the requested information
is available on the server or not. Once confirmed, the web server application processes the
request and sends the desired information to the web client.
Next in this article about What is a Web Client and How It Works with Web Server
Applications? is to find out about a web server.
What is a Web Server?
Firstly, a Web Servers are systems that are connected to the internet and store web pages. In
addition it sends out requested data over the web using HTTP. In nutshell, like Apache– the Web
Servers are just like libraries for web pages. They store, process and deliver the web resources to
the client software.

Servers can also use other data transfer protocols such as SMTP and FTP. Mail servers
use SMTP for transferring emails from one user to another. Additionally FTP server is used for
high speed file transfer operations.
Older web servers used to serve the requested documents as is, without any modifications. These
types of servers are known as static servers. Most modern servers today serve dynamic content
instead. Dynamic web servers modify the requested content on the fly.
Features of Web Servers
As the powerhouse of the internet, the web server is responsible for hosting documents and
processing them. Modern web servers feature the following common functionalities:
 Support for standard protocols like HTTP, FTP, SMTP, and SSH.
 Can serve static content as requested.
 Also they can deliver dynamic content on demand.
 Logging client information and requests.
 Support for virtual hosting.
 Ability to authorize or deny website path traversal.
 Support for large files, bandwidth throttling, and custom error pages.
Examples of Web Servers
There are different types of server software for delivering web content to end users. Some
popular web servers include Apache, Microsoft IIS(Internet Information Services), lighttpd,
and Nginx.
Apart from these few, there’re also some other choices. However, when choosing a web server
software for your website, try to stick with the popular ones. It’ll help you maintain a stable and
secure website in the long run. Plus, finding support will also be easier.

Web Client/Server Architecture:


The client-server architecture refers to a system that hosts, delivers, and manages most of the
resources and services that the client requests. In this model, all requests and services are
delivered over a network, and it is also referred to as the networking computing model or client
server network.
Client-server architecture, alternatively called a client-server model, is a network application that
breaks down tasks and workloads between clients and servers that reside on the same system or
are linked by a computer network.
Client-server architecture typically features multiple users’ workstations, PCs, or other devices,
connected to a central server via an Internet connection or other network. The client sends a
request for data, and the server accepts and accommodates the request, sending the data packets
back to the user who needs them.
This model is also called a client-server network or a network computing model.

What is Client-Server Architecture? Everything You Should Know

Terminology Basics
A Client is either a person or an organization using as a service. In the IT context, the client is a
computer/device, also called a Host, that actually uses the service or accepts the information.
Client devices include laptops, workstations, IoT devices, and similar network-friendly devices.
A Server in the IT world is a remote computer that provides access to data and services. Servers
are usually physical devices such as rack servers, though the rise of cloud computing has brought
virtual servers into the equation. The server handles processes like e-mail, application hosting,
Internet connections, printing, and more.
Client-Server Architecture Explained
The client-server architecture refers to a system that hosts, delivers, and manages most of the
resources and services that the client requests. In this model, all requests and services are
delivered over a network, and it is also referred to as the networking computing model or client
server network.
Client-server architecture, alternatively called a client-server model, is a network application that
breaks down tasks and workloads between clients and servers that reside on the same system or
are linked by a computer network.
Client-server architecture typically features multiple users’ workstations, PCs, or other devices,
connected to a central server via an Internet connection or other network. The client sends a
request for data, and the server accepts and accommodates the request, sending the data packets
back to the user who needs them.
This model is also called a client-server network or a network computing model.
To sum it up briefly:
 First, the client sends their request via a network-enabled device
 Then, the network server accepts and processes the user request
 Finally, the server delivers the reply to the client
What’s the Purpose of Client-Server Architecture?
We have already established that technology is constantly evolving and improving, often at a
very rapid pace. As a result, today's businesses increasingly rely on technology, especially IT, to
flourish and stay competitive in an "evolve or die" environment.
Therefore, today's organizations need a system that makes it easy to collect, process, and act on
corporate data, thus increasing business procedure efficiency and ensuring survivability in the
modern world's markets.
The client-server network model brings a higher level of processing that increases the
effectiveness of workstation power, workgroup empowerment, remote network management,
market-driven business, and the preservation of existing investments.
In summary, client-server architecture provides the exact framework that today’s organizations
need to meet the challenges of a rapidly evolving IT world.

The Characteristics of Client-Server Architecture


Client-server architecture typically features the following characteristics:
 Client and server machines typically require different hardware and software resources and
come from other vendors.
 The network has horizontal scalability, which increases the number of client machines and
vertical scalability, an then moves the entire process to more powerful servers or a multi-
server configuration.
 One computer server can provide multiple services simultaneously, although each service
requires a separate server program.
 Both client and server applications interact directly with a transport layer protocol. This
process establishes communication and enables the entities to send and receive information.
 Both the client and server computers need a complete stack of protocols. The transport
protocol employs lower-layer protocols to send and receive individual messages.

Intranet and Extranets:


1. Intranet :
Intranet is owned by a single organization and is a tool for sharing information throughout the
organization.It is the type of Internet that is used privately. Since, intranet is a private network
so no one can use the intranet whose have not valid username and password. In intranet, there
are a limited number of connected devices as compared to internet. Intranet is highly secure
and has a small number of visitors. It is used in order to get employee information, telephone
directory etc.
2. Extranet :
Extranet is owned by either a single or a many organization. It is managed on a contractual
basis between organizations and is a tool for sharing information between the internal members
and external members. Like intranet, it is also a private network so only those who have a valid
username and password can use the extranet. Extranet is used to check status, access data, send
mail, place order etc.
S.NO Intranet Extranet

Intranet is a tool for sharing Whereas Extranet is a tool for sharing


1. information throughout the information between the internal members and
organization. external members.

Intranet is owned by a single While Extranet is owned by either a single or a


2.
organization. many organization.

Whereas in this, security is implemented through


In intranet, security is
3. a firewall in order to separate the extranet and
implemented through a firewall.
the internet.

Intranet is managed by an Whereas Extranet is managed by many


4.
organization. organizations.

Intranet has a limited number of Whereas in the extranet, connected devices are
5.
connected devices. comparable with the intranet.
S.NO Intranet Extranet

While it is also a private network in which


Intranet is a private network
6. public network is used in order to share the
type for an organization.
information to the suppliers and customers.

Intranet is used in order to get


While It is used to check status, access data,
7. employee information,
send mail, place order etc.
telephone directory etc.

Intranet is the limited and


While Extranet is the limited and compromised
8. compromised version of
version of Internet.
Extranet.

A particular organization is the


9. While it is regulated by multiple organizations.
regulating authority for intranet.

Web Based Tools for E- commerce:


Web based business is always advancing and has turned into an exceptionally solid medium of
exchanging. With the online retail deals making high as can be benefits, it is likewise the ideal
time for you to enter the web based business world. Be that as it may, picking up section isn’t so
natural for a start-up and you may confront various difficulties in the underlying stage.
1. Google Analytics
This device is a gift for the advertisers today as it gives them profound investigation and data about
their site guests with convenient cooperation’s and reports at zero expense. Google Analytics
causes them to get constant data about the guests and their source.
2. Mail Chimp
This free email advertising administration enables you to send pamphlets alongside making
supporter shapes for web-based social networking or site, layouts for email and bulletins, robotized
messages and so forth.
3. Small SEO Tools
This site has an assortment of instruments and that too completely free of expense. Some of them
are Website SEO score checker, Website page speed checker, interface tracker and so forth.
4. Shopify
It is the most valuable device for a start-up and can be exceptionally useful in building and
advancing an online store. You can enlist on the Shopify Facebook Store page and load the
photograph of your item alongside a depiction and cost after which Shopify will show it on your
Facebook or business page.
5. Cloudflare
It ensures and quickens your site and courses the web activity through its smart worldwide system.
It moves in the direction of sparing the transmission capacity and server assets from bots and
crawlers.
6. WordPress
Brands simply need to make a presentation page in WordPress for web based life battles and
updates. These pages as a rule have websites identified with their organization’s updates, explore,
talks on industry patterns and picture content with some message and so forth.

Security in e commerce:
Security is an essential part of any transaction that takes place over the internet. Customers will
lose his/her faith in e-business if its security is compromised. Following are the essential
requirements for safe e-payments/transactions −
 Confidentiality − Information should not be accessible to an unauthorized person. It should
not be intercepted during the transmission.
 Integrity − Information should not be altered during its transmission over the network.
 Availability − Information should be available wherever and whenever required within a
time limit specified.
 Authenticity − There should be a mechanism to authenticate a user before giving him/her
an access to the required information.
 Non-Repudiability − It is the protection against the denial of order or denial of payment.
Once a sender sends a message, the sender should not be able to deny sending the message.
Similarly, the recipient of message should not be able to deny the receipt.
 Encryption − Information should be encrypted and decrypted only by an authorized user.
 Auditability − Data should be recorded in such a way that it can be audited for integrity
requirements.
Measures to ensure Security
Major security measures are following −
 Encryption − It is a very effective and practical way to safeguard the data being transmitted
over the network. Sender of the information encrypts the data using a secret code and only
the specified receiver can decrypt the data using the same or a different secret code.
 Digital Signature − Digital signature ensures the authenticity of the information. A digital
signature is an e-signature authenticated through encryption and password.
 Security Certificates − Security certificate is a unique digital id used to verify the identity
of an individual website or user.

You might also like