SlideShare une entreprise Scribd logo
1  sur  23
Encryption And E-Payments
Modes
Chapter-9
What is encryption?


A process that converts original information, also
called plain text into a difficult-to-interpret form
called ciphertext.



Done by using an encryption algorithm, a formula
used to turn plain text into ciphertext.



Two types: Asymmetric and Symmetric
Asymmetric Encryption
Symmetric Encryption
Which one is better?


Although, symmetric encryption is fast, it is not as
safe as asymmetric encryption because someone
could “steal” the key and decode the messages.
But because of its speed, it's commonly used for ecommerce transactions.



Asymmetric encryption is more complex--and more
secure. Asymmetric encryption's added safety
comes at a price: More computation is required, so
the process takes longer.
Who’s using encryption?


If you use a computer and the internet, you’re
using encryption!



Enables all organizations regardless of their size, to
be both user-and-IT friendly.
Why use encryption?


Authentication
 Protects



personal data such as passwords.

Privacy
 Provides



for confidentiality of private information.

Integrity
 Ensures



that a document or file has not been altered.

Accountability
 Prevents

denial or plagiarism.
How do you manage
encryption?


Make sure the encryption system has a complete
key management application.
 This

will help manage and protect the data and keys,
and help you safely match encrypted data with the
right key.
Examples of Encryption


Web browser encryption



Email encryption



Hard drive encryption



Operating system protection
A few vendors and their product
coverage


Blackberry
 System,



software, hardware, and service.

Global Technologies Group, Inc. (GTGI)
 Software



Hewlett-Packard Company
 System,



and hardware.

software, hardware, and service.

Intellect Security Ltd.
 Software
Electronic Payments Modes
Electronic Payment


Electronic payment is a payment that is
transmitted electronically including telephone
lines and Internet
Electronic Payment Options




Credit Cards: 90% of the transactions are made by
credit cards.
E-checks: encrypted version of paper checks. Echeck Electronic funds transfer or EFT refers to the
computer-based systems used to perform financial
transactions electronically.
Electronic Payment Options






E-Cash/Electronic money
It is money that is exchanged electronically.
This involves the use of computer networks,
the internet and digital stored value systems.
Bank deposits, electronic funds transfer (EFT), direct
deposit, payment processors and digital currencies
such as bit-coin are all examples of electronic money.
Electronic Payment Issues
Electronic payment methods should lower
cost
 Stealing of credit card number can be an
issue
 Consumer privacy could be a problem

A credit card payment
transaction
An electronic cash payment transaction
Smart card(chip)


A smart card can be programmed as
required. It can store electronic money, or
be used as credit card or an electronic
check.
Benefits of Electronic Payment
- Very convenient for the consumer. In most cases, you only need to enter
your account information -Electronic payment lowers costs for businesses. The more payments they
can process electronically, the less they spend on paper and postage.

- 24/7 online bill payment. Most of these services are free to bank
customers and coordinate easily with personal software programs such
as Quicken or MS Money
Concerns About Electronic Payment
The privacy and the possibility of identity theft.
 Solutions
 - Using virus protection software and a firewall on your computer.
-You should also make sure that you send your credit card information
over a secure server. Your Internet browser will notify you when a server
is secure by showing a lock or key icon. In addition, the URL on a
secure site is usually designated by the prefix "https" instead of "http."
Retailers do their part by using data encryption, which codes your
information in such a way that only the key holder can decode it.
Authentication










Authentication, is used to verify that the information
comes from a trusted source
There are several ways to authenticate a person or
information on a computer;
-password
-pass card
-digital signature
-Fingerprint scan
-Retina scan
-face scan
-Voice identification
Set Up E-Payment for A Business




In-house handling
All-in-one solution, services like PayPal and ProPay
make it easy for you to accept credit cards and other
forms of electronic payment from your site. When a
customer enters his or her information on your site, your
payment service authorizes the transaction and transfers
funds to your account.
In-House Handling Requires





Shopping Cart. Coolcart.com.
Secure Server. Secure Socket Layer (SSL) technology
is used to encrypt the data.
A system to process credit card payments and an
Internet merchant account with a bank. Credit card
payment processing services are available through online
companies.

Contenu connexe

Tendances (18)

Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
Electronic transactions 123
Electronic transactions 123Electronic transactions 123
Electronic transactions 123
 
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)
 
Online payment and e cash
Online payment and e cashOnline payment and e cash
Online payment and e cash
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Secnet
SecnetSecnet
Secnet
 
Chp8 electronic payment system
Chp8 electronic payment systemChp8 electronic payment system
Chp8 electronic payment system
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
E Payment
E PaymentE Payment
E Payment
 
E-payment
E-paymentE-payment
E-payment
 
internet banking
internet banking internet banking
internet banking
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Online Security and Payment System - PayPal
Online Security and Payment System - PayPalOnline Security and Payment System - PayPal
Online Security and Payment System - PayPal
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 

En vedette

Unac-Experiencia De Un Lider De Desarrollo J2EE
Unac-Experiencia De Un Lider De Desarrollo J2EEUnac-Experiencia De Un Lider De Desarrollo J2EE
Unac-Experiencia De Un Lider De Desarrollo J2EEJose Luis Bugarin Peche
 
Bkb dirección departamental educación sonsonate
Bkb  dirección departamental educación sonsonateBkb  dirección departamental educación sonsonate
Bkb dirección departamental educación sonsonateAdalberto
 
Presentacion aguirre theorizing mediated public diplomacy -slideshare
Presentacion aguirre  theorizing mediated public diplomacy -slidesharePresentacion aguirre  theorizing mediated public diplomacy -slideshare
Presentacion aguirre theorizing mediated public diplomacy -slideshareDaniel Aguirre Azócar
 
Respondiendo a Lucía. Emilio Llopis.
Respondiendo a Lucía. Emilio Llopis. Respondiendo a Lucía. Emilio Llopis.
Respondiendo a Lucía. Emilio Llopis. Emilio Llopis
 
Curso E Commerce Menorca
Curso E Commerce MenorcaCurso E Commerce Menorca
Curso E Commerce MenorcaAmalia Vázquez
 
Inscripción talleres Universidad Popular de Calasparra curso 2014/15
Inscripción talleres Universidad Popular de Calasparra curso 2014/15Inscripción talleres Universidad Popular de Calasparra curso 2014/15
Inscripción talleres Universidad Popular de Calasparra curso 2014/15Maria Dolores Gomariz Perez
 
Rapport d'activité 2009 de *designers interactifs*
Rapport d'activité 2009 de *designers interactifs*Rapport d'activité 2009 de *designers interactifs*
Rapport d'activité 2009 de *designers interactifs*designers interactifs
 
Epaper Surya 11 Agustus 2013
Epaper Surya 11 Agustus 2013Epaper Surya 11 Agustus 2013
Epaper Surya 11 Agustus 2013Portal Surya
 
Prathap\'s Work
Prathap\'s WorkPrathap\'s Work
Prathap\'s Workbuddhasays
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solutionNikec Solutions
 
ICFAI TECH Hyderabad
ICFAI TECH HyderabadICFAI TECH Hyderabad
ICFAI TECH HyderabadICFAI TECH
 
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...Merqurio
 
Introducción a gvNIX y Spring Roo
Introducción a gvNIX y Spring RooIntroducción a gvNIX y Spring Roo
Introducción a gvNIX y Spring RooDISID
 
Learning made visible
Learning made visibleLearning made visible
Learning made visiblefayeja90
 
Sakud Ocupacional
Sakud OcupacionalSakud Ocupacional
Sakud Ocupacionaljosediazpa
 
La educación ya no volverá a ser como antes
La educación ya no volverá a ser como antesLa educación ya no volverá a ser como antes
La educación ya no volverá a ser como antesFabián García Pastor
 

En vedette (20)

Unac-Experiencia De Un Lider De Desarrollo J2EE
Unac-Experiencia De Un Lider De Desarrollo J2EEUnac-Experiencia De Un Lider De Desarrollo J2EE
Unac-Experiencia De Un Lider De Desarrollo J2EE
 
Bkb dirección departamental educación sonsonate
Bkb  dirección departamental educación sonsonateBkb  dirección departamental educación sonsonate
Bkb dirección departamental educación sonsonate
 
Portafolio 743-1
Portafolio 743-1Portafolio 743-1
Portafolio 743-1
 
Presentacion aguirre theorizing mediated public diplomacy -slideshare
Presentacion aguirre  theorizing mediated public diplomacy -slidesharePresentacion aguirre  theorizing mediated public diplomacy -slideshare
Presentacion aguirre theorizing mediated public diplomacy -slideshare
 
Respondiendo a Lucía. Emilio Llopis.
Respondiendo a Lucía. Emilio Llopis. Respondiendo a Lucía. Emilio Llopis.
Respondiendo a Lucía. Emilio Llopis.
 
Curso E Commerce Menorca
Curso E Commerce MenorcaCurso E Commerce Menorca
Curso E Commerce Menorca
 
Ejercicio P 9.8 Deflexión de Vigas
Ejercicio  P 9.8 Deflexión de VigasEjercicio  P 9.8 Deflexión de Vigas
Ejercicio P 9.8 Deflexión de Vigas
 
Lobo
LoboLobo
Lobo
 
Inscripción talleres Universidad Popular de Calasparra curso 2014/15
Inscripción talleres Universidad Popular de Calasparra curso 2014/15Inscripción talleres Universidad Popular de Calasparra curso 2014/15
Inscripción talleres Universidad Popular de Calasparra curso 2014/15
 
Rapport d'activité 2009 de *designers interactifs*
Rapport d'activité 2009 de *designers interactifs*Rapport d'activité 2009 de *designers interactifs*
Rapport d'activité 2009 de *designers interactifs*
 
Epaper Surya 11 Agustus 2013
Epaper Surya 11 Agustus 2013Epaper Surya 11 Agustus 2013
Epaper Surya 11 Agustus 2013
 
Prathap\'s Work
Prathap\'s WorkPrathap\'s Work
Prathap\'s Work
 
6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution6 essential questions when selecting a file sharing solution
6 essential questions when selecting a file sharing solution
 
ICFAI TECH Hyderabad
ICFAI TECH HyderabadICFAI TECH Hyderabad
ICFAI TECH Hyderabad
 
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...
 
Introducción a gvNIX y Spring Roo
Introducción a gvNIX y Spring RooIntroducción a gvNIX y Spring Roo
Introducción a gvNIX y Spring Roo
 
Learning made visible
Learning made visibleLearning made visible
Learning made visible
 
Sakud Ocupacional
Sakud OcupacionalSakud Ocupacional
Sakud Ocupacional
 
Origenes de vida
Origenes de vidaOrigenes de vida
Origenes de vida
 
La educación ya no volverá a ser como antes
La educación ya no volverá a ser como antesLa educación ya no volverá a ser como antes
La educación ya no volverá a ser como antes
 

Similaire à Final eb ch 09 encryption and e payments modes (2)

electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfUjwalReddyPB
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptxAkash588342
 
Payment Gateway
Payment GatewayPayment Gateway
Payment GatewayShujaShah
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment systempankhadi
 
E-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEE-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEDr. Abzal Basha H S
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemTushar B Kute
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryGoutama Bachtiar
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesBangNgoVanCong
 
Elecrtonic payment system
Elecrtonic payment systemElecrtonic payment system
Elecrtonic payment systemMukesh Lal Karn
 
Electronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.comElectronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.comLearnInUrdu.com & Ustaadjee.com
 

Similaire à Final eb ch 09 encryption and e payments modes (2) (20)

E commerce
E commerceE commerce
E commerce
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdf
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
E-Business security
E-Business security E-Business security
E-Business security
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptx
 
Ch 2
Ch 2Ch 2
Ch 2
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
E-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEE-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVE
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment System
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
 
Elecrtonic payment system
Elecrtonic payment systemElecrtonic payment system
Elecrtonic payment system
 
Electronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.comElectronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.com
 
E walllet / Digital Wallet
E walllet / Digital WalletE walllet / Digital Wallet
E walllet / Digital Wallet
 
E-banking.pptx
E-banking.pptxE-banking.pptx
E-banking.pptx
 
Secnet
SecnetSecnet
Secnet
 

Plus de azmatmengal

2 hrly gs ch 08 vertebrates part 2
2 hrly gs ch 08 vertebrates part 22 hrly gs ch 08 vertebrates part 2
2 hrly gs ch 08 vertebrates part 2azmatmengal
 
2 hrly gs ch 08 vertebrates part 1
2 hrly gs ch 08 vertebrates part 12 hrly gs ch 08 vertebrates part 1
2 hrly gs ch 08 vertebrates part 1azmatmengal
 
1 hrly gs ch 01 solar system part 2
1 hrly gs ch 01 solar system part 21 hrly gs ch 01 solar system part 2
1 hrly gs ch 01 solar system part 2azmatmengal
 
1 hrly gs ch 01 solar system part 1
1 hrly gs ch 01 solar system part 11 hrly gs ch 01 solar system part 1
1 hrly gs ch 01 solar system part 1azmatmengal
 
Final gs ch p the energy crisis in pakistan
Final gs ch p the energy crisis in pakistanFinal gs ch p the energy crisis in pakistan
Final gs ch p the energy crisis in pakistanazmatmengal
 
Final gs ch p telepathy madiha ashraf
Final gs ch p telepathy madiha ashrafFinal gs ch p telepathy madiha ashraf
Final gs ch p telepathy madiha ashrafazmatmengal
 
Final gs ch p smoking
Final gs ch p smokingFinal gs ch p smoking
Final gs ch p smokingazmatmengal
 
Final gs ch p negative effects of technology on human's wildlife
Final gs ch p negative effects of technology on human's wildlifeFinal gs ch p negative effects of technology on human's wildlife
Final gs ch p negative effects of technology on human's wildlifeazmatmengal
 
Final gs ch p dreams
Final gs ch p dreamsFinal gs ch p dreams
Final gs ch p dreamsazmatmengal
 
Final gs ch p digestion
Final gs ch p digestionFinal gs ch p digestion
Final gs ch p digestionazmatmengal
 
Final gs ch 11 light pollution
Final gs ch 11 light pollutionFinal gs ch 11 light pollution
Final gs ch 11 light pollutionazmatmengal
 
Final gs ch 10 noise pollution
Final gs ch 10 noise pollutionFinal gs ch 10 noise pollution
Final gs ch 10 noise pollutionazmatmengal
 
Final gs ch 09 photosynthesis
Final gs ch 09 photosynthesisFinal gs ch 09 photosynthesis
Final gs ch 09 photosynthesisazmatmengal
 
2hrly gs ch p wind energy
2hrly gs ch p wind energy2hrly gs ch p wind energy
2hrly gs ch p wind energyazmatmengal
 
2hrly gs ch p supernatural belief vs science perspective
2hrly gs ch p supernatural belief vs science perspective2hrly gs ch p supernatural belief vs science perspective
2hrly gs ch p supernatural belief vs science perspectiveazmatmengal
 
2 hrly gs ch p psychological issues and youth amber alitaf shaikh
2 hrly gs ch p psychological issues and youth   amber alitaf shaikh2 hrly gs ch p psychological issues and youth   amber alitaf shaikh
2 hrly gs ch p psychological issues and youth amber alitaf shaikhazmatmengal
 
2hrly gs ch p personality
2hrly gs ch p personality2hrly gs ch p personality
2hrly gs ch p personalityazmatmengal
 
2hrly gs ch p perception
2hrly gs ch p perception2hrly gs ch p perception
2hrly gs ch p perceptionazmatmengal
 
2hrly gs ch p facts about human skeleton
2hrly gs ch p facts about human skeleton2hrly gs ch p facts about human skeleton
2hrly gs ch p facts about human skeletonazmatmengal
 
2hrly gs ch p bermuda triangle
2hrly gs ch p bermuda triangle2hrly gs ch p bermuda triangle
2hrly gs ch p bermuda triangleazmatmengal
 

Plus de azmatmengal (20)

2 hrly gs ch 08 vertebrates part 2
2 hrly gs ch 08 vertebrates part 22 hrly gs ch 08 vertebrates part 2
2 hrly gs ch 08 vertebrates part 2
 
2 hrly gs ch 08 vertebrates part 1
2 hrly gs ch 08 vertebrates part 12 hrly gs ch 08 vertebrates part 1
2 hrly gs ch 08 vertebrates part 1
 
1 hrly gs ch 01 solar system part 2
1 hrly gs ch 01 solar system part 21 hrly gs ch 01 solar system part 2
1 hrly gs ch 01 solar system part 2
 
1 hrly gs ch 01 solar system part 1
1 hrly gs ch 01 solar system part 11 hrly gs ch 01 solar system part 1
1 hrly gs ch 01 solar system part 1
 
Final gs ch p the energy crisis in pakistan
Final gs ch p the energy crisis in pakistanFinal gs ch p the energy crisis in pakistan
Final gs ch p the energy crisis in pakistan
 
Final gs ch p telepathy madiha ashraf
Final gs ch p telepathy madiha ashrafFinal gs ch p telepathy madiha ashraf
Final gs ch p telepathy madiha ashraf
 
Final gs ch p smoking
Final gs ch p smokingFinal gs ch p smoking
Final gs ch p smoking
 
Final gs ch p negative effects of technology on human's wildlife
Final gs ch p negative effects of technology on human's wildlifeFinal gs ch p negative effects of technology on human's wildlife
Final gs ch p negative effects of technology on human's wildlife
 
Final gs ch p dreams
Final gs ch p dreamsFinal gs ch p dreams
Final gs ch p dreams
 
Final gs ch p digestion
Final gs ch p digestionFinal gs ch p digestion
Final gs ch p digestion
 
Final gs ch 11 light pollution
Final gs ch 11 light pollutionFinal gs ch 11 light pollution
Final gs ch 11 light pollution
 
Final gs ch 10 noise pollution
Final gs ch 10 noise pollutionFinal gs ch 10 noise pollution
Final gs ch 10 noise pollution
 
Final gs ch 09 photosynthesis
Final gs ch 09 photosynthesisFinal gs ch 09 photosynthesis
Final gs ch 09 photosynthesis
 
2hrly gs ch p wind energy
2hrly gs ch p wind energy2hrly gs ch p wind energy
2hrly gs ch p wind energy
 
2hrly gs ch p supernatural belief vs science perspective
2hrly gs ch p supernatural belief vs science perspective2hrly gs ch p supernatural belief vs science perspective
2hrly gs ch p supernatural belief vs science perspective
 
2 hrly gs ch p psychological issues and youth amber alitaf shaikh
2 hrly gs ch p psychological issues and youth   amber alitaf shaikh2 hrly gs ch p psychological issues and youth   amber alitaf shaikh
2 hrly gs ch p psychological issues and youth amber alitaf shaikh
 
2hrly gs ch p personality
2hrly gs ch p personality2hrly gs ch p personality
2hrly gs ch p personality
 
2hrly gs ch p perception
2hrly gs ch p perception2hrly gs ch p perception
2hrly gs ch p perception
 
2hrly gs ch p facts about human skeleton
2hrly gs ch p facts about human skeleton2hrly gs ch p facts about human skeleton
2hrly gs ch p facts about human skeleton
 
2hrly gs ch p bermuda triangle
2hrly gs ch p bermuda triangle2hrly gs ch p bermuda triangle
2hrly gs ch p bermuda triangle
 

Dernier

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Dernier (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Final eb ch 09 encryption and e payments modes (2)

  • 2. What is encryption?  A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext.  Done by using an encryption algorithm, a formula used to turn plain text into ciphertext.  Two types: Asymmetric and Symmetric
  • 5. Which one is better?  Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for ecommerce transactions.  Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.
  • 6. Who’s using encryption?  If you use a computer and the internet, you’re using encryption!  Enables all organizations regardless of their size, to be both user-and-IT friendly.
  • 7. Why use encryption?  Authentication  Protects  personal data such as passwords. Privacy  Provides  for confidentiality of private information. Integrity  Ensures  that a document or file has not been altered. Accountability  Prevents denial or plagiarism.
  • 8. How do you manage encryption?  Make sure the encryption system has a complete key management application.  This will help manage and protect the data and keys, and help you safely match encrypted data with the right key.
  • 9. Examples of Encryption  Web browser encryption  Email encryption  Hard drive encryption  Operating system protection
  • 10. A few vendors and their product coverage  Blackberry  System,  software, hardware, and service. Global Technologies Group, Inc. (GTGI)  Software  Hewlett-Packard Company  System,  and hardware. software, hardware, and service. Intellect Security Ltd.  Software
  • 12. Electronic Payment  Electronic payment is a payment that is transmitted electronically including telephone lines and Internet
  • 13. Electronic Payment Options   Credit Cards: 90% of the transactions are made by credit cards. E-checks: encrypted version of paper checks. Echeck Electronic funds transfer or EFT refers to the computer-based systems used to perform financial transactions electronically.
  • 14. Electronic Payment Options     E-Cash/Electronic money It is money that is exchanged electronically. This involves the use of computer networks, the internet and digital stored value systems. Bank deposits, electronic funds transfer (EFT), direct deposit, payment processors and digital currencies such as bit-coin are all examples of electronic money.
  • 15. Electronic Payment Issues Electronic payment methods should lower cost  Stealing of credit card number can be an issue  Consumer privacy could be a problem 
  • 16. A credit card payment transaction
  • 17. An electronic cash payment transaction
  • 18. Smart card(chip)  A smart card can be programmed as required. It can store electronic money, or be used as credit card or an electronic check.
  • 19. Benefits of Electronic Payment - Very convenient for the consumer. In most cases, you only need to enter your account information -Electronic payment lowers costs for businesses. The more payments they can process electronically, the less they spend on paper and postage. - 24/7 online bill payment. Most of these services are free to bank customers and coordinate easily with personal software programs such as Quicken or MS Money
  • 20. Concerns About Electronic Payment The privacy and the possibility of identity theft.  Solutions  - Using virus protection software and a firewall on your computer. -You should also make sure that you send your credit card information over a secure server. Your Internet browser will notify you when a server is secure by showing a lock or key icon. In addition, the URL on a secure site is usually designated by the prefix "https" instead of "http." Retailers do their part by using data encryption, which codes your information in such a way that only the key holder can decode it.
  • 21. Authentication          Authentication, is used to verify that the information comes from a trusted source There are several ways to authenticate a person or information on a computer; -password -pass card -digital signature -Fingerprint scan -Retina scan -face scan -Voice identification
  • 22. Set Up E-Payment for A Business   In-house handling All-in-one solution, services like PayPal and ProPay make it easy for you to accept credit cards and other forms of electronic payment from your site. When a customer enters his or her information on your site, your payment service authorizes the transaction and transfers funds to your account.
  • 23. In-House Handling Requires    Shopping Cart. Coolcart.com. Secure Server. Secure Socket Layer (SSL) technology is used to encrypt the data. A system to process credit card payments and an Internet merchant account with a bank. Credit card payment processing services are available through online companies.