Breaking

गुरुवार, 9 अप्रैल 2020

BCA-6th Sem Notes-Internet Security(unit-5th e-commerce)


  • UNIT-I 
Introduction to E-Commerce
The Scope of Electronic Commerce 
Definition of Electronic Commerce,
Electronic E-commerce and the Trade Cycle
Electronic Markets, Electronic Data Interchange
Internet Commerce, E-Commerce in Perspective
Business Strategy in an Electronic Age: Supply Chains
Porter’s Value Chain Model, Inter-Organizational Value Chains
Competitive Strategy, Porter’s Model
First Mover Advantage Sustainable Competitive Advantage
Competitive Advantage using E-Commerce
Business Strategy, Introduction to Business Strategy
Strategic Implications of IT, Technology
Business Environment, Business Capability
Exiting Business Strategy, Strategy Formulation & Implementation Planning
E-Commerce Implementation
E-Commerce Evaluation



  • UNIT-II 
  • Business-to-Business Electronic Commerce
    Characteristics of B2B EC
    Models of B2B Ec
    Procurement Management Using the Buyer’s Internal Marketplace
    Just in Time Delivery
    B2B Models
    Auctions and Services from Traditional to Internet-Based EDI
    The Role of Software Agents for B2B EC
    Electronic marketing in B2B
    Solutions of B2B EC
    Managerial Issues
    Electronic Data Interchange (EDI)
    EDI: The Nuts and Bolts
    EDI & Business



  • UNIT-III 
  • Internet and Extranet
    Automotive Network Exchange
    The Largest Extranet
    Architecture of the Internet
    Intranet and Extranet
    Intranet software
    Applications of Intranets
    Intranet Application Case Studies
    Considerations in Intranet Deployment
    The Extranets,
     The structures of Extranets
    Extranet products & services
    Applications of Extranets
    Business Models of Extranet Applications, Managerial Issues
    Electronic Payment Systems
    Is SET a failure
    Electronic Payments & Protocols
    Security Schemes in Electronic payment systems
    Electronic Credit card system on the Internet
    Electronic Fund Transfer and Debit cards on the Internet
    Stored – value Cards and E-Cash
    Electronic Check Systems
    Prospect of Electronic Payment Systems
    Managerial Issues

  • UNIT-V                 

  • Internet Security


    Security is a fundamental piece of any exchange that happens over the web. Clients will lose his/her confidence in e-business if its security is undermined. Following are the basic necessities for safe e-installments/exchanges − 

    Secrecy − information ought not to be open to an unapproved individual. It ought not be blocked during the transmission. 

    Honesty − Information ought not to be modified during its transmission over the system. 

    Accessibility − Information ought to be accessible any place and at whatever point required inside a period limit indicated. 

    Genuineness − There ought to be a system to validate a client before giving him/her entrance to the necessary data. 

    Non-Repudiability − It is the insurance against the disavowal of request or forswearing of installment. When a sender communicates something specific, the sender ought not to have the option to deny sending the message. Correspondingly, the beneficiary of the message ought not to have the option to deny the receipt. 

    Encryption − Information ought to be scrambled and unscrambled distinctly by an approved client. 

    Auditability − Data ought to be recorded so that it very well may be reviewed for honesty prerequisites. 

    Measures to guarantee Security 

    Significant safety efforts are following − 

    Encryption − It is a compelling and functional approach to protect the information being transmitted over the system. The sender of the data scrambles the information utilizing a mystery code and just the predetermined recipient can unscramble the information utilizing the equivalent or an alternate mystery code. 

    Advanced Signature − Digital mark guarantees the genuineness of the data. An advanced mark is an e-signature validated through encryption and secret key. 

    Security Certificates − Security declaration is a one of a kind advanced id used to check the character of an individual site or client. 

    Security Protocols in the Internet 

    We will talk about here a portion of the well-known conventions utilized over the web to guarantee made sure about online exchanges. 

    Secure Socket Layer (SSL) 

    It is the most regularly utilized convention and is generally utilized over the business. It meets following security prerequisites − 

    Verification 

    Encryption 

    Uprightness 

    Non-reputability 

    "https://" is to be utilized for HTTP urls with SSL, whereas "http:/" is to be utilized for HTTP urls without SSL. 

    Secure Hypertext Transfer Protocol (SHTTP) 

    SHTTP broadens the HTTP web convention with open key encryption, validation, and computerized signature over the web. Secure HTTP bolsters numerous security components, giving security to the end-clients. SHTTP works by arranging encryption plot types utilized between the customer and the server. 

    Secure Electronic Transaction 

    It is a protected convention created by MasterCard and Visa in cooperation. Hypothetically, it is the best security convention. It has the accompanying segments − 

    Card Holder's Digital Wallet Software − Digital Wallet permits the cardholder to make secure buys online by means of point and snap interface. 

    Vendor Software − This product encourages traders to speak with potential clients and money related establishments in a protected way. 

    Installment Gateway Server Software − Payment entryway gives programmed and standard installment process. It bolsters the procedure for the shipper's endorsement demand. 


    Endorsement Authority Software − This product is utilized by money related organizations to give advanced testaments to cardholders and dealers, and to empower them to enroll their record understandings for secure electronic trade.

    कोई टिप्पणी नहीं:

    एक टिप्पणी भेजें