Enviar búsqueda
Cargar
Chapter 5
•
Descargar como PPTX, PDF
•
16 recomendaciones
•
7,259 vistas
Nada G.Youssef
Seguir
E-commerce Security and Payment Systems
Leer menos
Leer más
Empresariales
Vista de diapositivas
Denunciar
Compartir
Vista de diapositivas
Denunciar
Compartir
1 de 51
Descargar ahora
Recomendados
Chapter 2
Chapter 2
Nada G.Youssef
Chapter 4
Chapter 4
Nada G.Youssef
Chapter 3
Chapter 3
Nada G.Youssef
Chapter 6
Chapter 6
Nada G.Youssef
Chapter 1
Chapter 1
Nada G.Youssef
Chapter 8
Chapter 8
Nada G.Youssef
Chapter 11
Chapter 11
Nada G.Youssef
Security in E-commerce
Security in E-commerce
m8817
Recomendados
Chapter 2
Chapter 2
Nada G.Youssef
Chapter 4
Chapter 4
Nada G.Youssef
Chapter 3
Chapter 3
Nada G.Youssef
Chapter 6
Chapter 6
Nada G.Youssef
Chapter 1
Chapter 1
Nada G.Youssef
Chapter 8
Chapter 8
Nada G.Youssef
Chapter 11
Chapter 11
Nada G.Youssef
Security in E-commerce
Security in E-commerce
m8817
Chapter 9
Chapter 9
Nada G.Youssef
E-commerce Chapter No.1
E-commerce Chapter No.1
Qamar Farooq
E-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, Local
INTI International University
Chapter 7
Chapter 7
Nada G.Youssef
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
Shadina Shah
Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)
Ismail Zackariya
Lecture 5
Lecture 5
Viet Duong Nguyen
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
Qamar Farooq
Laudon mis14 ch02
Laudon mis14 ch02
Rizwanah Parwin
Chapter8
Chapter8
AG RD
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Habib Ullah Qamar
Chapter 2 competing with it
Chapter 2 competing with it
AG RD
E commerce security
E commerce security
Shakti Singh
Chapter 12
Chapter 12
Nada G.Youssef
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising concepts
tintingregorio
E Business+Models Ppt
E Business+Models Ppt
md kaiser
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
monchai sopitka
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
Sukanya Ben
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
monchai sopitka
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
Nor Ayuzi Deraman
Chapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerce
suman86
04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
Más contenido relacionado
La actualidad más candente
Chapter 9
Chapter 9
Nada G.Youssef
E-commerce Chapter No.1
E-commerce Chapter No.1
Qamar Farooq
E-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, Local
INTI International University
Chapter 7
Chapter 7
Nada G.Youssef
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
Shadina Shah
Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)
Ismail Zackariya
Lecture 5
Lecture 5
Viet Duong Nguyen
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
Qamar Farooq
Laudon mis14 ch02
Laudon mis14 ch02
Rizwanah Parwin
Chapter8
Chapter8
AG RD
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Habib Ullah Qamar
Chapter 2 competing with it
Chapter 2 competing with it
AG RD
E commerce security
E commerce security
Shakti Singh
Chapter 12
Chapter 12
Nada G.Youssef
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising concepts
tintingregorio
E Business+Models Ppt
E Business+Models Ppt
md kaiser
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
monchai sopitka
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
Sukanya Ben
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
monchai sopitka
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
Nor Ayuzi Deraman
La actualidad más candente
(20)
Chapter 9
Chapter 9
E-commerce Chapter No.1
E-commerce Chapter No.1
E-Commerce: Marketing Concepts, Social,Mobile, Local
E-Commerce: Marketing Concepts, Social,Mobile, Local
Chapter 7
Chapter 7
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
Chapter 1-E-Commerce (the revolution is just beginning)
Chapter 1-E-Commerce (the revolution is just beginning)
Lecture 5
Lecture 5
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
Laudon mis14 ch02
Laudon mis14 ch02
Chapter8
Chapter8
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Chapter 2 competing with it
Chapter 2 competing with it
E commerce security
E commerce security
Chapter 12
Chapter 12
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising concepts
E Business+Models Ppt
E Business+Models Ppt
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
Destacado
Chapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerce
suman86
04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
Nada G.Youssef
E Commerce Presentation
E Commerce Presentation
Tylerjd
E-Commerce PPT
E-Commerce PPT
Anshuman Mahapatra
E commerce ppt
E commerce ppt
Munish Singla
Chapter 10
Chapter 10
Nada G.Youssef
Ch05
Ch05
YiMon Phyu
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 14 fraud and accountant - james a. hall book chapter 3
Habib Ullah Qamar
Lecture 9 accouting records -transaction processing- james a. hall book chap...
Lecture 9 accouting records -transaction processing- james a. hall book chap...
Habib Ullah Qamar
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides
monchai sopitka
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Habib Ullah Qamar
Lesson 4
Lesson 4
Priya Krishnakumar
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Habib Ullah Qamar
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Habib Ullah Qamar
Lecture 2 the information system by an accountant's prospective- ais an over...
Lecture 2 the information system by an accountant's prospective- ais an over...
Habib Ullah Qamar
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Habib Ullah Qamar
Online security & encryption
Online security & encryption
Qamar Farooq
Destacado
(19)
Chapter 4 5-6 - e commerce - m- commerce
Chapter 4 5-6 - e commerce - m- commerce
04-1 E-commerce Security slides
04-1 E-commerce Security slides
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
E Commerce Presentation
E Commerce Presentation
E-Commerce PPT
E-Commerce PPT
E commerce ppt
E commerce ppt
Chapter 10
Chapter 10
Ch05
Ch05
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 14 fraud and accountant - james a. hall book chapter 3
Lecture 9 accouting records -transaction processing- james a. hall book chap...
Lecture 9 accouting records -transaction processing- james a. hall book chap...
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lesson 4
Lesson 4
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 2 the information system by an accountant's prospective- ais an over...
Lecture 2 the information system by an accountant's prospective- ais an over...
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Online security & encryption
Online security & encryption
Similar a Chapter 5
Chapter 5 E marketing.pptx
Chapter 5 E marketing.pptx
amitshaha3
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
MohammedAliShakil
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
mohammedSALEH189
E-commerce security.ppt
E-commerce security.ppt
Susan130641
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
Cloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
Encrytpion information security last stand
Encrytpion information security last stand
George Delikouras
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
Online privacy & security
Online privacy & security
Priyab Satoshi
Small Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
Cscu module 04 data encryption
Cscu module 04 data encryption
Alireza Ghahrood
Securing Devices at Home
Securing Devices at Home
Symptai Consulting Limited
E-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
E-Commerce Privacy and Security System
E-Commerce Privacy and Security System
IJERA Editor
Cyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
PriyalPatel158383
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
Symphony.com
Cyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
ChereCheek752
Similar a Chapter 5
(20)
Chapter 5 E marketing.pptx
Chapter 5 E marketing.pptx
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
E-commerce security.ppt
E-commerce security.ppt
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cloud_security.pptx
Cloud_security.pptx
Encrytpion information security last stand
Encrytpion information security last stand
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
Online privacy & security
Online privacy & security
Small Business Administration Recommendations
Small Business Administration Recommendations
Cscu module 04 data encryption
Cscu module 04 data encryption
Securing Devices at Home
Securing Devices at Home
E-Commerce Privacy and Security System
E-Commerce Privacy and Security System
E-Commerce Privacy and Security System
E-Commerce Privacy and Security System
Cyber Privacy & Password Protection
Cyber Privacy & Password Protection
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
The Silicon Valley Security Debate: Demo by Symphony’s CTO and CSO
Cyber Security Seminar
Cyber Security Seminar
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
FIDO AUTHENTICATIONDEFINITION· Acronym FIDO stands for Fast I
Más de Nada G.Youssef
مجلة 1
مجلة 1
Nada G.Youssef
Chapter Tewlve
Chapter Tewlve
Nada G.Youssef
Chapter Eleven
Chapter Eleven
Nada G.Youssef
Chapter Ten
Chapter Ten
Nada G.Youssef
Chapter Nine
Chapter Nine
Nada G.Youssef
Chapter Eight
Chapter Eight
Nada G.Youssef
Chapter Seven
Chapter Seven
Nada G.Youssef
Chapter Six
Chapter Six
Nada G.Youssef
Chapter Five
Chapter Five
Nada G.Youssef
Chapter Four
Chapter Four
Nada G.Youssef
Chapter Three
Chapter Three
Nada G.Youssef
Chapter Two
Chapter Two
Nada G.Youssef
Chapter one
Chapter one
Nada G.Youssef
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
Nada G.Youssef
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
Nada G.Youssef
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
Nada G.Youssef
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
Nada G.Youssef
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Nada G.Youssef
Chapter 9: Access Control Management
Chapter 9: Access Control Management
Nada G.Youssef
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
Nada G.Youssef
Más de Nada G.Youssef
(20)
مجلة 1
مجلة 1
Chapter Tewlve
Chapter Tewlve
Chapter Eleven
Chapter Eleven
Chapter Ten
Chapter Ten
Chapter Nine
Chapter Nine
Chapter Eight
Chapter Eight
Chapter Seven
Chapter Seven
Chapter Six
Chapter Six
Chapter Five
Chapter Five
Chapter Four
Chapter Four
Chapter Three
Chapter Three
Chapter Two
Chapter Two
Chapter one
Chapter one
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Chapter 9: Access Control Management
Chapter 9: Access Control Management
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
Último
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
P&CO
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Seo
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
dlhescort
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
kcpayne
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Admir Softic
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
kapoorjyoti4444
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Seta Wicaksana
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
uneakwhite
Último
(20)
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
Chapter 5
1.
E-commerce 2013 Kenneth C.
Laudon Carol Guercio Traver business. technology. society. ninth edition Copyright © 2013 Pearson Education, Inc.
2.
Chapter 5 E-commerce Security
and Payment Systems Copyright © 2013 Pearson Education, Inc.
3.
Class Discussion Cyberwar: MAD
2.0 ■ What is the difference between hacking and cyberwar? ■ Why has cyberwar become more potentially devastating in the past decade? ■ Why has Google been the target of so many cyberattacks? ■ Is it possible to find a political solution to MAD 2.0? Copyright © 2013 Pearson Education, Inc. Slide 5-*
4.
The E-commerce Security Environment ■
Overall size and losses of cybercrime unclear ❖Reporting issues ■ 2011 CSI survey: 46% of respondent firms detected breach in last year ■ Underground economy marketplace: ❖Stolen information stored on underground economy servers Copyright © 2013 Pearson Education, Inc. Slide 5-*
5.
What Is Good
E-commerce Security? ■ To achieve highest degree of security ❖New technologies ❖Organizational policies and procedures ❖Industry standards and government laws ■ Other factors ❖Time value of money ❖Cost of security vs. potential loss ❖Security often breaks at weakest link Copyright © 2013 Pearson Education, Inc. Slide 5-*
6.
The E-commerce Security
Environment Figure 5.1, Page 266 Copyright © 2013 Pearson Education, Inc. Slide 5-*
7.
Table 5.3, Page
267 Copyright © 2013 Pearson Education, Inc. Slide 5-*
8.
The Tension Between
Security and Other Values ■ Ease of use ❖The more security measures added, the more difficult a site is to use, and the slower it becomes ■ Public safety and criminal uses of the Internet ❖Use of technology by criminals to plan crimes or threaten nation-state Copyright © 2013 Pearson Education, Inc. Slide 5-*
9.
Security Threats in
the E-commerce Environment ■ Three key points of vulnerability in e-commerce environment: 1. Client 2. Server 3. Communications pipeline (Internet communications channels) Copyright © 2013 Pearson Education, Inc. Slide 5-*
10.
A Typical E-commerce
Transaction Figure 5.2, Page 269 Copyright © 2013 Pearson Education, Inc. Slide 5-*
11.
Vulnerable Points in
an E-commerce Transaction Figure 5.3, Page 270 Copyright © 2013 Pearson Education, Inc. Slide 5-*
12.
Most Common Security
Threats in the E-commerce Environment ■ Malicious code ❖Viruses ❖Worms ❖Trojan horses ❖Drive-by downloads ❖Backdoors ❖Bots, botnets ❖Threats at both client and server levels Copyright © 2013 Pearson Education, Inc. Slide 5-*
13.
Most Common Security
Threats (cont.) ■ Potentially unwanted programs (PUPs) ❖Browser parasites ❖Adware ❖Spyware ■ Phishing ❖E-mail scams ❖Social engineering ❖Identity theft Copyright © 2013 Pearson Education, Inc. Slide 5-*
14.
Most Common Security
Threats (cont.) ■ Hacking ❖Hackers vs. crackers ❖Types of hackers: White, black, grey hats ❖Hacktivism ■ Cybervandalism: ❖Disrupting, defacing, destroying Web site ■ Data breach ❖Losing control over corporate information to outsiders Copyright © 2013 Pearson Education, Inc. Slide 5-*
15.
Most Common Security
Threats (cont.) ■ Credit card fraud/theft ❖ Hackers target merchant servers; use data to establish credit under false identity ■ Spoofing (Pharming) ■ Spam (junk) Web sites ■ Denial of service (DoS) attack ❖ Hackers flood site with useless traffic to overwhelm network ■ Distributed denial of service (DDoS) attack Copyright © 2013 Pearson Education, Inc. Slide 5-*
16.
Insight on Business:
Class Discussion Sony: Press the Reset Button ■ What organization and technical failures led to the April 2011 data breach on the PlayStation Network? ■ Can Sony be criticized for waiting 3 days to inform the FBI? ■ Have you or anyone you know experienced data theft? Copyright © 2013 Pearson Education, Inc. Slide 5-*
17.
Most Common Security
Threats (cont.) ■ Sniffing ❖ Eavesdropping program that monitors information traveling over a network ■ Insider attacks ■ Poorly designed server and client software ■ Social network security issues ■ Mobile platform security issues ❖ Same risks as any Internet device ■ Cloud security issues Copyright © 2013 Pearson Education, Inc. Slide 5-*
18.
Insight on Technology:
Class Discussion Think Your Smartphone Is Secure? ■ What types of threats do smartphones face? ■ Are there any particular vulnerabilities to this type of device? ■ What did Nicolas Seriot’s “Spyphone” prove? ■ Are apps more or less likely to be subject to threats than traditional PC software programs? Copyright © 2013 Pearson Education, Inc. Slide 5-*
19.
Technology Solutions ■ Protecting
Internet communications ❖Encryption ■ Securing channels of communication ❖SSL, VPNs ■ Protecting networks ❖Firewalls ■ Protecting servers and clients Copyright © 2013 Pearson Education, Inc. Slide 5-*
20.
Tools Available to
Achieve Site Security Figure 5.5, Page 288 Copyright © 2013 Pearson Education, Inc. Slide 5-*
21.
Encryption ■ Encryption ❖ Transforms
data into cipher text readable only by sender and receiver ❖ Secures stored information and information transmission ❖ Provides 4 of 6 key dimensions of e-commerce security: ■ Message integrity ■ Nonrepudiation ■ Authentication ■ Confidentiality Copyright © 2013 Pearson Education, Inc. Slide 5-*
22.
Symmetric Key Encryption ■
Sender and receiver use same digital key to encrypt and decrypt message ■ Requires different set of keys for each transaction ■ Strength of encryption ❖ Length of binary key used to encrypt data ■ Advanced Encryption Standard (AES) ❖ Most widely used symmetric key encryption ❖ Uses 128-, 192-, and 256-bit encryption keys ■ Other standards use keys with up to 2,048 bits Copyright © 2013 Pearson Education, Inc. Slide 5-*
23.
Public Key Encryption ■
Uses two mathematically related digital keys ❖ Public key (widely disseminated) ❖ Private key (kept secret by owner) ■ Both keys used to encrypt and decrypt message ■ Once key used to encrypt message, same key cannot be used to decrypt message ■ Sender uses recipient’s public key to encrypt message; recipient uses private key to decrypt it Copyright © 2013 Pearson Education, Inc. Slide 5-*
24.
Public Key Cryptography:
A Simple Case Figure 5.6, Page 291 Copyright © 2013 Pearson Education, Inc. Slide 5-*
25.
Public Key Encryption
using Digital Signatures and Hash Digests ■ Hash function: ❖ Mathematical algorithm that produces fixed-length number called message or hash digest ■ Hash digest of message sent to recipient along with message to verify integrity ■ Hash digest and message encrypted with recipient’s public key ■ Entire cipher text then encrypted with recipient’s private key—creating digital signature—for authenticity, nonrepudiation Copyright © 2013 Pearson Education, Inc. Slide 5-*
26.
Public Key Cryptography
with Digital Signatures Figure 5.7, Page 293 Copyright © 2013 Pearson Education, Inc. Slide 5-*
27.
Digital Envelopes ■ Address
weaknesses of: ❖ Public key encryption ■ Computationally slow, decreased transmission speed, increased processing time ❖ Symmetric key encryption ■ Insecure transmission lines ■ Uses symmetric key encryption to encrypt document ■ Uses public key encryption to encrypt and send symmetric key Copyright © 2013 Pearson Education, Inc. Slide 5-*
28.
Creating a Digital
Envelope Figure 5.8, Page 294 Copyright © 2013 Pearson Education, Inc. Slide 5-*
29.
Digital Certificates and Public
Key Infrastructure (PKI) ■ Digital certificate includes: ❖ Name of subject/company ❖ Subject’s public key ❖ Digital certificate serial number ❖ Expiration date, issuance date ❖ Digital signature of CA ■ Public Key Infrastructure (PKI): ❖ CAs and digital certificate procedures ❖ PGP Copyright © 2013 Pearson Education, Inc. Slide 5-*
30.
Digital Certificates and
Certification Authorities Figure 5.9, Page 295 Copyright © 2013 Pearson Education, Inc. Slide 5-*
31.
Limits to Encryption
Solutions ■ Doesn’t protect storage of private key ❖PKI not effective against insiders, employees ❖Protection of private keys by individuals may be haphazard ■ No guarantee that verifying computer of merchant is secure ■ CAs are unregulated, self-selecting organizations Copyright © 2013 Pearson Education, Inc. Slide 5-*
32.
Insight on Society:
Class Discussion Web Dogs and Anonymity: Identity 2.0 ■ What are some of the benefits of continuing the anonymity of the Internet? ■ What are the disadvantages of an identity system? ■ Are there advantages to an identity system beyond security? ■ Who should control a central identity system? Copyright © 2013 Pearson Education, Inc. Slide 5-*
33.
Securing Channels of
Communication ■ Secure Sockets Layer (SSL) and Transport Layer Security (TLS) ❖Establishes a secure, negotiated client-server session in which URL of requested document, along with contents, is encrypted ■ Virtual Private Network (VPN): ❖Allows remote users to securely access internal network via the Internet Copyright © 2013 Pearson Education, Inc. Slide 5-*
34.
Secure Negotiated Sessions
Using SSL/TLS Figure 5.10, Page 300 Copyright © 2013 Pearson Education, Inc. Slide 5-*
35.
Protecting Networks ■ Firewall ❖Hardware
or software ❖Uses security policy to filter packets ❖Two main methods: ■ Packet filters ■ Application gateways ■ Proxy servers (proxies) ❖Software servers that handle all communications originating from or being sent to the Internet Copyright © 2013 Pearson Education, Inc. Slide 5-*
36.
Firewalls and Proxy
Servers Figure 5.11, Page 303 Copyright © 2013 Pearson Education, Inc. Slide 5-*
37.
Protecting Servers and
Clients ■ Operating system security enhancements ❖Upgrades, patches ■ Anti-virus software: ❖Easiest and least expensive way to prevent threats to system integrity ❖Requires daily updates Copyright © 2013 Pearson Education, Inc. Slide 5-*
38.
Management Policies, Business Procedures,
and Public Laws ■ Worldwide, companies spend $60 billion on security hardware, software, services ■ Managing risk includes ❖Technology ❖Effective management policies ❖Public laws and active enforcement Copyright © 2013 Pearson Education, Inc. Slide 5-*
39.
A Security Plan:
Management Policies ■ Risk assessment ■ Security policy ■ Implementation plan ❖ Security organization ❖ Access controls ❖ Authentication procedures, including biometrics ❖ Authorization policies, authorization management systems ■ Security audit Copyright © 2013 Pearson Education, Inc. Slide 5-*
40.
Developing an E-commerce
Security Plan Figure 5.12, Page 305 Copyright © 2013 Pearson Education, Inc. Slide 5-*
41.
The Role of
Laws and Public Policy ■ Laws that give authorities tools for identifying, tracing, prosecuting cybercriminals: ❖ National Information Infrastructure Protection Act of 1996 ❖ USA Patriot Act ❖ Homeland Security Act ■ Private and private-public cooperation ❖ CERT Coordination Center ❖ US-CERT ■ Government policies and controls on encryption software ❖ OECD, G7/G8, Council of Europe, Wassener Arrangement Copyright © 2013 Pearson Education, Inc. Slide 5-*
42.
Types of Payment
Systems ■ Cash ❖ Most common form of payment ❖ Instantly convertible into other forms of value ❖ No float ■ Checking transfer ❖ Second most common payment form in United States ■ Credit card ❖ Credit card associations ❖ Issuing banks ❖ Processing centers Copyright © 2013 Pearson Education, Inc. Slide 5-*
43.
Types of Payment
Systems (cont.) ■ Stored value ❖Funds deposited into account, from which funds are paid out or withdrawn as needed ❖Debit cards, gift certificates ❖Peer-to-peer payment systems ■ Accumulating balance ❖Accounts that accumulate expenditures and to which consumers make period payments ❖Utility, phone, American Express accounts Copyright © 2013 Pearson Education, Inc. Slide 5-*
44.
Payment System Stakeholders ■
Consumers ❖ Low-risk, low-cost, refutable, convenience, reliability ■ Merchants ❖ Low-risk, low-cost, irrefutable, secure, reliable ■ Financial intermediaries ❖ Secure, low-risk, maximizing profit ■ Government regulators ❖ Security, trust, protecting participants and enforcing reporting Copyright © 2013 Pearson Education, Inc. Slide 5-*
45.
E-commerce Payment Systems ■
Credit cards ❖44% of online payments in 2012 (U.S.) ■ Debit cards ❖28% online payments in 2012 (U.S.) ■ Limitations of online credit card payment ❖Security, merchant risk ❖Cost ❖Social equity Copyright © 2013 Pearson Education, Inc. Slide 5-*
46.
How an Online
Credit Transaction Works Figure 5.14, Page 315 Copyright © 2013 Pearson Education, Inc. Slide 5-*
47.
Alternative Online Payment
Systems ■ Online stored value systems: ❖Based on value stored in a consumer’s bank, checking, or credit card account ❖e.g., PayPal ■ Other alternatives: ❖Amazon Payments ❖Google Checkout ❖Bill Me Later ❖WUPay, Dwolla, Stripe Copyright © 2013 Pearson Education, Inc. Slide 5-*
48.
Mobile Payment Systems ■
Use of mobile phones as payment devices established in Europe, Japan, South Korea ■ Near field communication (NFC) ❖ Short-range (2”) wireless for sharing data between devices ■ Expanding in United States ❖ Google Wallet ■ Mobile app designed to work with NFC chips ❖ PayPal ❖ Square Copyright © 2013 Pearson Education, Inc. Slide 5-*
49.
Digital Cash and
Virtual Currencies ■ Digital cash ❖Based on algorithm that generates unique tokens that can be used in “real” world ❖e.g., Bitcoin ■ Virtual currencies ❖Circulate within internal virtual world ❖e.g., Linden Dollars in Second Life, Facebook Credits Copyright © 2013 Pearson Education, Inc. Slide 5-*
50.
Electronic Billing Presentment
and Payment (EBPP) ■ Online payment systems for monthly bills ■ 50% of all bill payments ■ Two competing EBPP business models: ❖ Biller-direct (dominant model) ❖ Consolidator ■ Both models are supported by EBPP infrastructure providers Copyright © 2013 Pearson Education, Inc. Slide 5-*
51.
Copyright © 2013
Pearson Education, Inc. Slide 5-*
Descargar ahora