Ecommerce

14
E-COMMERCE Submitted By: Suraj Thapaliya

description

Simpl

Transcript of Ecommerce

Page 1: Ecommerce

E-COMMERCE Submitted By: Suraj Thapaliya

Page 2: Ecommerce

PROJECT OBJECTIVE

The objective of this project is to increase and globalize the business of small handicraft shop. The business of these types of shops is limited. They focus on the market of local tourism and small segment of tourists thou the potential sales are limited. The reason is clear. Customers who need to reach physical location of the shop within the limit of time will have the most livelihood of being repeat customers.

Page 3: Ecommerce

PROJECT OBJECTIVE

To reach the customers around the global. To ability to be open twenty-four hours a day,

seven days a week. To automate the process of taking and

fulfilling orders. To receive many more orders at one time

then one salesperson working at the physical location.

Page 4: Ecommerce

PROJECT MODULES

Product Catalog Search and Display all the handicraft products.

Shopping Cart Adding multiple products and other customer

information like shipping address Payment Credit Card Handling

Payment will handling through the paypal SDK. Tracking Information

All orders are tracking so that the customer will know how long it takes to reach out their project

Page 5: Ecommerce

PROJECT MODULES

User Account Login All customer should have to register to buy the

product. Administration Panel

Administrator panel will control all the content that display to user.

Report Management All reports are control from the administration

section of the system. Sales, Orders, Transaction Report will be generate daily, quarterly, and monthly. Custom report will help to generate the required need of the system.

Page 6: Ecommerce

TECHNOLOGY AND TOOLS

ASP.NET Microsoft’s technology set for building dynamic

web content. C#

.NET-compliant languages from Microsoft that is an object-oriented programming language.

Microsoft Visual Studio Microsoft SQL Server 2008 Express Edition Internet Information Services (Web Server) Firefox, Internet Explorer (Web Client)

Page 7: Ecommerce

FLOW CHART- SEARCH

Search Criteria

Query Database

Result Found

Display No Result

Display ResultSearch Again Search Again

YESNO

START

END

Page 8: Ecommerce

FLOW CHART-SHOPPING CART

START

Select Product

Add to Cart

Calculate Subtotal

Is Checkou

t

Continue Shopping

Customer Exists

Log In

Process Payment

Register Account

YESNO

YESNO

END

Page 9: Ecommerce

DATA FLOW DIAGRAM: BROWSE

BROWSE

Handicraft Information

CustomerHandicraft

Review

Handicraft

SEARCH

Handicraft

Handicraft Information

Customer

Handicraft Review

Read Review

Handicraft_Review

Write Review

Page 10: Ecommerce

DATA FLOW DIAGRAM: SHOPPING CART

Shopping Cart

Shopping_Cart_Items

Customer Shopping Cart Items

Inventory

Shopping_Cart_Items

Customer Shopping Cart Items

Inventory

Modify Cart View Cart

Page 11: Ecommerce

EXAMINING THE RISKS

System Downtime Processing Payments Physical and Logical Attacks Physical Attack Logical Attack Prevention Sensitive Information and Data

Page 12: Ecommerce

SECURITY VULNERABILITIES

SQL Injection Buffer overflows Cross-site scripting Remote command execution Weak Authentication and Authorization

Page 13: Ecommerce

SECURITY

Privacy: information must be kept from unauthorized parties.

Integrity: message must not be altered or tampered with.

Authentication: sender and recipient must prove their identities to each other.

Non-repudiation: proof is needed that the message was indeed received.

Page 14: Ecommerce

SECURITY

Digital Signatures and Certificates A plain text message is run through a hash

function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient.

Secure Socket Layers SSL uses PKI and digital certificates to ensure

privacy and authentication. PCI, SET, Firewalls

Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network.