The expiration date, issuance date 5. Digital signature of CA Securing Channels of Communication • Secure Sockets Layer (SSL)/Transport Layer Security (TLS) • Virtual Private Network (VPN) Allows users to access internal network via the Internet • Wireless (Wi-Fi) networks Protecting Networks Firewall Proxy servers (proxies) Intrusion detection systems Intrusion prevention systems Protecting Servers and Clients • Operating system security enhancements • Anti-virus software: easiest and least expensive way to prevent threats to system integrity and requires daily updates. Managing risk includes Technology Effective management policies Public laws and active enforcement A Security Plan: Management Policies Risk assessment Security policy Implementation plan Security audit E-Commerce Payment Systems • In U.S., credit and debit cards are primary online payment methods • Online credit card purchasing cycle • Credit card e-commerce enablers • Limitations of online credit card payment Mobile Payment Systems • Use of mobile phones as payment devices – Apple Pay, Android Pay, Samsung Pay, PayPal, Square • Near field communication (NFC) • Social/Mobile Peer-to-Peer Payment Systems • Sending money through mobile app or Web site • mobile wallets and rechargeable cards Digital Cash and Virtual Currencies • Digital cash: Based on algorithm can be used in “real” world example: Bitcoin • Virtual currencies: Circulate within internal virtual world Electronic Billing Presentment and Payment (EBPP) • Online payment systems for monthly bills • Four EBPP business models: – Online banking model (most widely used) – Biller-direct – Mobile – Consolidator
You've reached the end of your free preview.
Want to read all 4 pages?
- Fall '16
- ALI MEHDI
- Cryptography, Public-key cryptography, Pretty Good Privacy, Certificate authority, Transport Layer Security, Symmetric Key Cryptography