E-Business Systems Architecture Ahmed Salah [email protected].

52
E-Business Fundamentals E-Business Systems Architecture Ahmed Salah [email protected]

Transcript of E-Business Systems Architecture Ahmed Salah [email protected].

Page 1: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Business FundamentalsE-Business Systems Architecture

Ahmed [email protected]

Page 2: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Contents

E-commerce Architecture Three-tier client/server architecture Peer-to-peer architecture

Basic security issuesE-payment systems

Page 3: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Three-Tier Client/Server Arch.

Customer Seller

WebBrowser

HTTP Web-Application

Server

Product-Data bank

Customer-Data bank

Data Server

Tier 1 Tier 2 Tier 3

First tier : user system interface where user services (such as session, text input, dialog, and display management) reside.

Middle tier : application that controls transactions and shares business logic, computations, and a data retrieval engine.

Third tier : database management server.

Page 4: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Three-Tier Client/Server Arch.

WebBrowser

HTTP

Customer Seller

Product-Data bank

Customer-Data bank

Data Server

Tier 1 Tier 2 Tier 3

WebServer

ApplicationServer

Page 5: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Three-Tier Client/Server Arch.

WebBrowser HTTP

Customer Seller

Product-Data bank

Customer-Data bank

Data Server

Tier 1 Tier 3

Data

Application logic

Presentation

Web application

WebServer

Tier 2

Tier 1

Tier 2

Tier 3

Page 6: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Basic E-Commerce Operations

Create a Web site including an order form

Web site can E-mail or fax ordersProcess orders and payments

offline

Fast, easy, and cheap to setupData is not secure

Client Server

Orders

Page 7: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Basic E-Commerce Operations

Convert to a Merchant Server (storefront)

Get server Certificate for SSLSignup with a Payment Gateway

ClientBrowser

MerchantServer

Orders

Payment Gateway

Page 8: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Basic E-Commerce Operations

Web-

ApplicationServer

CatalogPage

Generation

OrderData

Capture

Static Web pages

Catalog data

Order data

Credit CardInfo.

Page 9: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

More Advanced E-Commerce

Systems are more complicated:Separate applications by function

Catalog Content management Transaction processing

Split implementations for security

Page 10: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

More Advanced E-Commerce

Web Server

Customer Mgmt.

Catalog database

Customer data

Order data

Catalog Application

Payment data

Order Capture

Order Processing DataMgmt.

Payment Processing

Fulfillment

Customer Service

Static Web pages

ApplicationServer

Page 11: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

EC Application’s Elements

Products (physical or digital) /services

Website, catalog, content management

Marketing Getting ordersPaymentFulfillmentCustomer services Integration

Page 12: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

EC Application Functionalities

Attract Interact Act React

•Marketing

Generateand keepcustomerinterest

Convertinterest to

ordersManageOrders

ServiceCustomers

•Catalog sales•Content mgmt.

•Order capture•Payment•Fulfillment

•After-sale services

•Order tracking

•Web site design

Page 13: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Basic Security Issues

“On the Internet, no one knows you’re a dog!”

Page 14: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Major Security Concepts

Authentication: how do sender/receiver prove their identities.

Authorization : when and which users can gain access to parts of the system.

Integrity : assure that information is not altered or corrupted.

Privacy and confidentiality : assure that your information is not shared without your knowledge.

Page 15: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security Techniques

Passwords Firewall Cryptography Mathematics based methods to encrypt and decrypt

data. Secret key or symmetric encryption (algorithms : DES,

Triple DES, AES) Public key or asymmetric encryption (algorithm :RSA) Digital Signature, Digital Certificate (authentication

techniques based on encryption) Protocols : SSL (Secure Sockets Layer), SET (Secure

Electronic Transaction)

Page 16: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security Policy

Evaluate risks and identify: Resources to protect▪ information, programs, etc.

Legitimate access requirements Threats and type of attacks Access paths to protect▪ Internet, dial-up ports, physical, etc.

Page 17: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Payment Systems

Paying with credit cards online Consumers were extremely reluctant to use

their credit card numbers on the Web This is changing because:▪ Many of people more aware of security

measures that should be taken to avoid fraud.▪ 85% of the transactions that occur on the Web

are B2B rather than B2C (credit cards are rarely used in B2B transactions)

Page 18: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Payment Systems - cont.

Four parties involved in e-payments Issuer▪ Customers must obtain e-payment accounts

from an issuer▪ Issuers are usually involved in authenticating a

transaction and approving the amount involved Customer/payer/buyer Merchant/payee/seller Regulator

Page 19: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Payment Systems - cont.Key issue of

trust must be addressed PAIN▪ Privacy▪ Authentication

and authorization▪ Integrity▪ Nonrepudiation

Characteristics of successful e-payment methods Interoperability and

portability Security Ease of use Transaction fees

Page 20: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments

Public key infrastructure (PKI) a scheme for securing e-payments using

public key encryption and various technical components

Foundation of many network applications: Supply chain management Virtual private networks Secure e-mail Intranet applications

Page 21: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont)

Public key encryptionEncryption (cryptography)-The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time consuming for an unauthorized person to unscramble (decrypt).

Page 22: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont)

All encryption has four basic parts: Plain text▪ an unencrypted message in human-readable

form Cipher text▪ a plaintext message after it has been encrypted

into unreadable form Encryption algorithm▪ the mathematical formula used to encrypt the

plaintext into ciphertext and vice versa Key▪ the secret code used to encrypt and decrypt a

message

Page 23: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont)

Two major classes of encryption systems: Symmetric (private key)▪ Used to encrypt and decrypt plain text▪ Shared by sender and receiver of text

Asymmetric (public key)▪ Uses a pair of keys▪ Public key to encrypt the message▪ Private key to decrypt the message

Page 24: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont)

Public key encryption method of encryption that uses a pair of

keys▪ a public key to encrypt a message and a private

key (kept only by its owner) to decrypt it, or vice versa

Private key▪ secret encryption code held only by its owner

Public key▪ secret encryption code that is publicly available

to anyone

Page 25: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Private Key Encryption

Page 26: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Public Key Encryption

Page 27: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Key Sizes & Time to Try All Possible Keys

Page 28: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont.)

Digital signatures an identifying code that can be used to

authenticate the identity of the sender of a message or document

Used to:▪ Authenticate the identity of the sender of a

message or document▪ Ensure the original content of the electronic

message or document is unchanged

Page 29: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont.)

Digital Signatures—how they work:

1. Create an e-mail message with the contract in it

2. Using special software, you “hash” the message, converting it into a string of digits (message digest)

3. You use your private key to encrypt the hash of your digital signature

Page 30: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont.)

4. E-mail the original message along with the encrypted hash to the receiver

5. Receiver uses the same special software to hash the message they received

6. Receiver uses your public key to decrypt the message hash that you sent. If their hash matches the decrypted hash, then the message is valid

Page 31: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont.)

Digital certificates verification that the

holder of a public or private key is who he or she claims to be

Certificate authorities (CAs) third parties that issue

digital certificates

Name : “Richard”key-Exchange Key :Signature Key :Serial # : 29483756Other Data : 10236283025273Expires : 6/18/04Signed : CA’s Signature

Page 32: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Security for E-Payments (cont.)

Secure socket layer (SSL) protocol that utilizes standard certificates

for authentication and data encryption to ensure privacy or confidentiality

Transport Layer Security (TLS) as of 1996, another name for the Secure

Socket Layer protocol

Page 33: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Electronic Cards and Smart Cards

Payment cards: electronic cards that contain information that can be used for payment purposes Credit cards—provides holder with credit to

make purchases up to a limit fixed by the card issuer

Charge cards—balance on a charge card is supposed to be paid in full upon receipt of monthly statement

Debit card—cost of a purchase drawn directly from holder’s checking account (demand-deposit account)

Page 34: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Electronic Cards and Smart Cards (cont.)

The Players Cardholder Merchant (seller) Issuer (your bank) Acquirer (merchant’s financial institution,

acquires the sales slips) Card association (VISA, MasterCard) Third-party processors (outsourcers

performing same duties formerly provided by issuers, etc.)

Page 35: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Online Credit Card Processing

Page 36: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Electronic Cards and Smart Cards (cont.)Credit card

gateway an online

connection that ties a merchant’s systems to the back-end processing systems of the credit card issuer

Virtual credit card an e-payment

system in which a credit card issuer gives a special transaction number that can be used online in place of regular credit card numbers

Page 37: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Electronic Cards and Smart Cards (cont.)

Security risks with credit cards Stolen cards Repudiation by the customer: authorizes a

payment and later denies it Theft of card details stored on merchant’s

computer: isolate computer storing information so it cannot be accessed directly from the Web

Page 38: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Electronic Cards and Smart Cards (cont.)

Purchasing cards Special purpose payment cards issued to a

company’s employees to be used solely for purchasing specific materials and services up to a preset dollar limit

Page 39: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Electronic Cards and Smart Cards (cont.)

Benefits of using purchasing cards Productivity gains Bill consolidation Preferred pricing Management reports Control

Page 40: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Participants & Process of Using a Purchasing Card

Page 41: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Smart Cards

Smart card an electronic card containing an embedded

microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card

Page 42: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Smart Cards (cont.)

Categories of smart cards Contact card▪ a smart card containing a small gold plate on the

face that when inserted in a smart-card reader makes contact and so passes data to and from the embedded microchip

Contactless (proximity) card▪ a smart card with an embedded antenna, by

means of which data and applications are passed to and from a card reader unit or other device

Page 43: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Smart Cards (cont.)

Securing smart cards Theoretically, it is possible to “hack” into a

smart card▪ Most cards can now store the information in

encrypted form▪ Same cards can also encrypt and decrypt data

that is downloaded or read from the card Cost to the attacker of doing so far exceeds

the benefits

Page 44: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Smart Cards (cont.)

Important applications of smart card use: Financial Information technology Health and social welfare Transportation Identification

Page 45: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Cash and Innovative Payment Methods

E-cash the digital equivalent of paper currency

and coins, which enables secure and anonymous purchase

Micropayments small payments, usually under $10

Page 46: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Cash and Payment Card Alternatives (cont.)

Mobile paymentsVodafone “m-pay bill” system that enables wireless subscribers to use their mobile phones to make their payments

Qpass (qpass.com)Charges to qpass account, are charged to a specified credit card on a monthly basis

Page 47: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Loyalty and Reward Programs

Loyalty programs online B2C sites spend hundreds of dollars

acquiring new customers Payback only comes from repeat customers

who are likely to refer other customers to a site

Electronic script a form of electronic money (or points), issued

by a third party as part of a loyalty program; can be used by consumers to make purchases at participating stores

Page 48: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Person-to-Person Payments

Person-to-person (P2P) payments e-payment schemes (such as paypal.com)

that enable the transfer of funds between two individuals

Repaying money borrowed Paying for an item purchased at online

auction Sending money to students at college Sending a gift to a family member

Page 49: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Global B2B Payments

Letters of credit (LC) a written agreement by a bank to pay the

seller, on account of the buyer, a sum of money upon presentation of certain documents

Page 50: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Electronic Letters of Credit (LC)

Benefits to sellers Credit risk is

reduced Payment is

highly assured Political/country

risk is reduced

Benefits to buyer Allows buyer to

negotiate for a lower purchase price

Buyer can expand its source of supply

Funds withdrawn from buyer’s account only after the documents have been inspected by the issuing bank

Page 51: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

E-Checking

E-check: the electronic version or representation of a paper check Eliminate need for expensive process

reengineering and takes advantage of the competency of the banking industry

eCheck Secure (from vantaguard.com) and checkfree.com provide software that enables the purchase of goods and services with e-checks

Used mainly in B2B

Page 52: E-Business Systems Architecture Ahmed Salah ahmed.salah@mcit.gov.eg.

Assignment

Choose a successful EB site: Can you describe how the site is secured? Describe the website e-payment system