Professional Documents
Culture Documents
CH 5
CH 5
Ch.5 Introduction to
M-Commerce
SCIENCE THEORY [12] PRACTICAL [00]
WEIGHTAGE
COMMERCE THEORY [06] PRACTICAL [00]
ABOU
T US
www.gtumcappt.com
M-Commerce 2
ABOU
T US
www.gtumcappt.com
M-Commerce | Advantages 3
ABOU
T US
www.gtumcappt.com
M-Commerce | Limitations 4
ABOU
T US
www.gtumcappt.com
M-Commerce Example 5
ABOU
T US
www.gtumcappt.com
M-Commerce | Applications 6
• Marketing
• Advertising
• Entertainment
• Financial Services
• Information Services
• New Service
• Stock Market
• Sports News
• Financial records
• Traffic information
ABOU
T US
www.gtumcappt.com
GPS | Location and Search Service 7
ABOU
T US
www.gtumcappt.com
Location based applications 8
ABOU
T US
www.gtumcappt.com
Security Issues in E-Commerce 9
• Confidentiality
• Secrecy of the information
• Unauthorized user cannot read the information
• It is achieved by using cryptography
• Decrypting the message using appropriate key.
• Integrity
• Ensures that the information must not be accidentally or maliciously altered
or tampered in transit.
• Receiver should receive the same message as was sent by the sender.
ABOU
T US
www.gtumcappt.com
Conti… 10
• Authorization
• Ensures that only authentic users are allowed to use the system.
• Login and Password is one of the way to achieve authentication.
• Non-repudiation
• Sender of the message cannot deny that he/she has sent the message.
• It is usually accomplished via digital signatures or a Trusted Third Party (TTP).
ABOU
T US
www.gtumcappt.com
Conti… 11
• Malicious code
• Code is one that causes damage to a computer or system.
• Active itself
• Like a virus requiring a user to perform an action.
• As clicking on something or opening an e-mail attachment.
• It can also affect a network, send messages through e-mail and steal
information or cause even more damage by deleting file.
ABOU
T US
www.gtumcappt.com
Conti… 12
• Sniffing
• Program that uses Internet to record information that passes through a
computer or router in transits from sender or receiver.
• Like tapping the telephone wire and recording the conversation.
• It can read e-mail, login, password, credit card numbers.
• Denial of service attack
• An attack used to shut down a machine or network
• An attacker may be able to prevent the user from accessing e-mail, websites,
online account etc.
ABOU
T US
www.gtumcappt.com
Conti… 13
• Cyber Vandalism
• Electronic defacing of an existing website page.
• An attacker replaces the website’s original content with his/her own content.
• It is an example of integrity violation.
• Equivalent to placing graffiti on someone's photograph.
• Spoofing
• Spoofing is pretending to be someone you are not.
• Representing a website as authentic when it is actually a fake.
ABOU
T US
www.gtumcappt.com
Security Measures 14
• Antivirus Software
• Computer program
• Detects, prevent and takes action to remove the malicious code like viruses,
worms and Trojan horses from the infected system.
• It may delete the files and slow down the system or also can damage the
hardware or destroy the entire computer system.
• Most common way system is attacked is through e-mail.
ABOU
T US
www.gtumcappt.com
Conti… 15
• Firewall
• Companies having their own websites have to control the access to the
network services both inside an outside the company network.
• Device computer / router places between the network and the Internet to
monitor and control the traffic between the company’s local network and the
outside world.
• Digital Certificate
• Digital certificate / Digital ID – proving identify in electronic transactions.
• Third party issues certificates is known as Certification Authority (CA).
ABOU
T US
www.gtumcappt.com
Conti… 16
• Cryptography
• An art of protecting the information by transforming it into an unreadable
form.
• Encryption is the transformation of normal text or plain text into unreadable
or secret text known as cipher text.
• Secret key is used to encrypt and decrypt a message.
• Secure Socket Layer
• Developed by Netscape.
• Securing web transaction..
• Starts from https:// rather than http://
• VeriSign logo – Security logo.
ABOU
T US
www.gtumcappt.com
Securing Intellectual Property 17
• Intellectual Properties….
• Books
• Software
• Music
• Video
• Copyrights
• Trademarks
• Web pages
ABOU
T US
www.gtumcappt.com
Copyright 18
ABOU
T US
www.gtumcappt.com
Trademark 19
ABOU
T US
www.gtumcappt.com
Domain name disputes 20
ABOU
T US
www.gtumcappt.com
Steganography 21
ABOU
T US
www.gtumcappt.com
Digital Watermarking 22
• Digital code inserted into a digital image, audio or video file which can
identify the file’s copyright information.
• Allows hiding information in a totally invisible manner.
• In digital world, artist can watermark their work by hiding their name
within the image.
• Big problem of unauthorized mp3 audio distribution.
• A visible digital watermark can be added with GIMP.
ABOU
T US
www.gtumcappt.com
Payment Option : Credit card 23
ABOU
T US
www.gtumcappt.com
Credit Card : Advantages | Limitations 24
www.gtumcappt.com
Payment Option : Debit Card 25
ABOU
T US
www.gtumcappt.com
Payment Option : Smart Card 26
• Look just like credit cards but are different as they have microchip
embedded in their surface.
• It contains user’s private information, a/c information, health
insurance information, private key etc.
• Store 100 times more information than the normal cards.
• Information stored in encrypted form.
• Smart card readers are available for retail outlets.
ABOU
T US
www.gtumcappt.com
Payment Option : Charge Card 27
ABOU
T US
www.gtumcappt.com
Payment Option : Net Banking 28
ABOU
T US
www.gtumcappt.com
Payment Option : EFT 29
ABOU
T US
www.gtumcappt.com
Payment Option : E-Wallet 30
ABOU
T US
www.gtumcappt.com
Payment Option - RuPay 31
ABOU
T US
www.gtumcappt.com
32
Thank You.
ABOU
T US
www.gtumcappt.com