SlideShare a Scribd company logo
Encryption And E-Payments
Modes
Chapter-9
What is encryption?


A process that converts original information, also
called plain text into a difficult-to-interpret form
called ciphertext.



Done by using an encryption algorithm, a formula
used to turn plain text into ciphertext.



Two types: Asymmetric and Symmetric
Asymmetric Encryption
Symmetric Encryption
Which one is better?


Although, symmetric encryption is fast, it is not as
safe as asymmetric encryption because someone
could “steal” the key and decode the messages.
But because of its speed, it's commonly used for ecommerce transactions.



Asymmetric encryption is more complex--and more
secure. Asymmetric encryption's added safety
comes at a price: More computation is required, so
the process takes longer.
Who’s using encryption?


If you use a computer and the internet, you’re
using encryption!



Enables all organizations regardless of their size, to
be both user-and-IT friendly.
Why use encryption?


Authentication
 Protects



personal data such as passwords.

Privacy
 Provides



for confidentiality of private information.

Integrity
 Ensures



that a document or file has not been altered.

Accountability
 Prevents

denial or plagiarism.
How do you manage
encryption?


Make sure the encryption system has a complete
key management application.
 This

will help manage and protect the data and keys,
and help you safely match encrypted data with the
right key.
Examples of Encryption


Web browser encryption



Email encryption



Hard drive encryption



Operating system protection
A few vendors and their product
coverage


Blackberry
 System,



software, hardware, and service.

Global Technologies Group, Inc. (GTGI)
 Software



Hewlett-Packard Company
 System,



and hardware.

software, hardware, and service.

Intellect Security Ltd.
 Software
Electronic Payments Modes
Electronic Payment


Electronic payment is a payment that is
transmitted electronically including telephone
lines and Internet
Electronic Payment Options




Credit Cards: 90% of the transactions are made by
credit cards.
E-checks: encrypted version of paper checks. Echeck Electronic funds transfer or EFT refers to the
computer-based systems used to perform financial
transactions electronically.
Electronic Payment Options






E-Cash/Electronic money
It is money that is exchanged electronically.
This involves the use of computer networks,
the internet and digital stored value systems.
Bank deposits, electronic funds transfer (EFT), direct
deposit, payment processors and digital currencies
such as bit-coin are all examples of electronic money.
Electronic Payment Issues
Electronic payment methods should lower
cost
 Stealing of credit card number can be an
issue
 Consumer privacy could be a problem

A credit card payment
transaction
An electronic cash payment transaction
Smart card(chip)


A smart card can be programmed as
required. It can store electronic money, or
be used as credit card or an electronic
check.
Benefits of Electronic Payment
- Very convenient for the consumer. In most cases, you only need to enter
your account information -Electronic payment lowers costs for businesses. The more payments they
can process electronically, the less they spend on paper and postage.

- 24/7 online bill payment. Most of these services are free to bank
customers and coordinate easily with personal software programs such
as Quicken or MS Money
Concerns About Electronic Payment
The privacy and the possibility of identity theft.
 Solutions
 - Using virus protection software and a firewall on your computer.
-You should also make sure that you send your credit card information
over a secure server. Your Internet browser will notify you when a server
is secure by showing a lock or key icon. In addition, the URL on a
secure site is usually designated by the prefix "https" instead of "http."
Retailers do their part by using data encryption, which codes your
information in such a way that only the key holder can decode it.
Authentication










Authentication, is used to verify that the information
comes from a trusted source
There are several ways to authenticate a person or
information on a computer;
-password
-pass card
-digital signature
-Fingerprint scan
-Retina scan
-face scan
-Voice identification
Set Up E-Payment for A Business




In-house handling
All-in-one solution, services like PayPal and ProPay
make it easy for you to accept credit cards and other
forms of electronic payment from your site. When a
customer enters his or her information on your site, your
payment service authorizes the transaction and transfers
funds to your account.
In-House Handling Requires





Shopping Cart. Coolcart.com.
Secure Server. Secure Socket Layer (SSL) technology
is used to encrypt the data.
A system to process credit card payments and an
Internet merchant account with a bank. Credit card
payment processing services are available through online
companies.

More Related Content

PPT
Secure payment systems
PPTX
PPTX
Security and trust in e payment
PPTX
E transaction
PPTX
Digital signature and adv payment gateway
PPT
e-cheque
PPTX
Online Payment System - Debit Cards, Direct Debit and Electronic Cash
PPTX
Secure Electronic Transaction
Secure payment systems
Security and trust in e payment
E transaction
Digital signature and adv payment gateway
e-cheque
Online Payment System - Debit Cards, Direct Debit and Electronic Cash
Secure Electronic Transaction

What's hot (17)

PPTX
Cyber cash
PPTX
Electronic transactions 123
PPT
Secure electronic transactions (SET)
PPTX
Online payment and e cash
PPTX
Security in E-commerce
PPT
Set Secure Electronic Transaction (SET)
PPT
Secnet
PPT
Chp8 electronic payment system
PDF
Secure electronic transaction (set)
PPT
E Payment
PPTX
E-payment
PPTX
internet banking
PPT
secure electronics transaction
PPTX
Secure Electronic Transaction (SET)
PPTX
Online Security and Payment System - PayPal
PPT
Payment Gateway
Cyber cash
Electronic transactions 123
Secure electronic transactions (SET)
Online payment and e cash
Security in E-commerce
Set Secure Electronic Transaction (SET)
Secnet
Chp8 electronic payment system
Secure electronic transaction (set)
E Payment
E-payment
internet banking
secure electronics transaction
Secure Electronic Transaction (SET)
Online Security and Payment System - PayPal
Payment Gateway
Ad

Viewers also liked (20)

PPT
Unac-Experiencia De Un Lider De Desarrollo J2EE
DOC
Bkb dirección departamental educación sonsonate
PPTX
Portafolio 743-1
PPTX
Presentacion aguirre theorizing mediated public diplomacy -slideshare
DOC
Respondiendo a Lucía. Emilio Llopis.
PPT
Curso E Commerce Menorca
PPTX
Ejercicio P 9.8 Deflexión de Vigas
PDF
Inscripción talleres Universidad Popular de Calasparra curso 2014/15
PDF
Rapport d'activité 2009 de *designers interactifs*
PDF
Epaper Surya 11 Agustus 2013
PPT
Prathap\'s Work
PDF
6 essential questions when selecting a file sharing solution
PDF
ICFAI TECH Hyderabad
PDF
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...
PDF
Introducción a gvNIX y Spring Roo
PPT
Learning made visible
PPT
Sakud Ocupacional
PPT
Origenes de vida
PDF
La educación ya no volverá a ser como antes
Unac-Experiencia De Un Lider De Desarrollo J2EE
Bkb dirección departamental educación sonsonate
Portafolio 743-1
Presentacion aguirre theorizing mediated public diplomacy -slideshare
Respondiendo a Lucía. Emilio Llopis.
Curso E Commerce Menorca
Ejercicio P 9.8 Deflexión de Vigas
Inscripción talleres Universidad Popular de Calasparra curso 2014/15
Rapport d'activité 2009 de *designers interactifs*
Epaper Surya 11 Agustus 2013
Prathap\'s Work
6 essential questions when selecting a file sharing solution
ICFAI TECH Hyderabad
Finasteride riduce la progressione clinica della IPB in pazienti con ingrossa...
Introducción a gvNIX y Spring Roo
Learning made visible
Sakud Ocupacional
Origenes de vida
La educación ya no volverá a ser como antes
Ad

Similar to Final eb ch 09 encryption and e payments modes (2) (20)

PPTX
Vaishnavi e commerce
PPTX
Electronic payment system
PPT
Electronic payment by ahmad
PDF
Week10
PPTX
PPTX
E payment
PPTX
Electronic Payment Systems (EPS)
PPSX
Payment systems for electronic commerce
PDF
Presentation2 edited.pdf
PPTX
PDF
Web technology and commerce unit 4
PPTX
e payment system ppt
PDF
E-Business security
PPTX
E-payment Systems .pptx
PPTX
E commerce
PPT
E payment systemsEcommerceEcommerce
PPTX
Electronic Payment Systems in E Commerce
PPTX
Electronic payment systems - Presentation by IrfanAnsari.com
PPTX
Electronic payment systems
Vaishnavi e commerce
Electronic payment system
Electronic payment by ahmad
Week10
E payment
Electronic Payment Systems (EPS)
Payment systems for electronic commerce
Presentation2 edited.pdf
Web technology and commerce unit 4
e payment system ppt
E-Business security
E-payment Systems .pptx
E commerce
E payment systemsEcommerceEcommerce
Electronic Payment Systems in E Commerce
Electronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems

More from azmatmengal (20)

PPT
2 hrly gs ch 08 vertebrates part 2
PPT
2 hrly gs ch 08 vertebrates part 1
PPT
1 hrly gs ch 01 solar system part 2
PPT
1 hrly gs ch 01 solar system part 1
PPT
Final gs ch p the energy crisis in pakistan
PPT
Final gs ch p telepathy madiha ashraf
PPT
Final gs ch p smoking
PPT
Final gs ch p negative effects of technology on human's wildlife
PPT
Final gs ch p dreams
PPT
Final gs ch p digestion
PPT
Final gs ch 11 light pollution
PPT
Final gs ch 10 noise pollution
PPT
Final gs ch 09 photosynthesis
PPT
2hrly gs ch p wind energy
PPT
2hrly gs ch p supernatural belief vs science perspective
PPT
2 hrly gs ch p psychological issues and youth amber alitaf shaikh
PPT
2hrly gs ch p personality
PPT
2hrly gs ch p perception
PPT
2hrly gs ch p facts about human skeleton
PPT
2hrly gs ch p bermuda triangle
2 hrly gs ch 08 vertebrates part 2
2 hrly gs ch 08 vertebrates part 1
1 hrly gs ch 01 solar system part 2
1 hrly gs ch 01 solar system part 1
Final gs ch p the energy crisis in pakistan
Final gs ch p telepathy madiha ashraf
Final gs ch p smoking
Final gs ch p negative effects of technology on human's wildlife
Final gs ch p dreams
Final gs ch p digestion
Final gs ch 11 light pollution
Final gs ch 10 noise pollution
Final gs ch 09 photosynthesis
2hrly gs ch p wind energy
2hrly gs ch p supernatural belief vs science perspective
2 hrly gs ch p psychological issues and youth amber alitaf shaikh
2hrly gs ch p personality
2hrly gs ch p perception
2hrly gs ch p facts about human skeleton
2hrly gs ch p bermuda triangle

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Types and Its function , kingdom of life
PPTX
Institutional Correction lecture only . . .
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Computing-Curriculum for Schools in Ghana
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
01-Introduction-to-Information-Management.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
RMMM.pdf make it easy to upload and study
Cell Types and Its function , kingdom of life
Institutional Correction lecture only . . .
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
VCE English Exam - Section C Student Revision Booklet
O7-L3 Supply Chain Operations - ICLT Program
2.FourierTransform-ShortQuestionswithAnswers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Renaissance Architecture: A Journey from Faith to Humanism
Computing-Curriculum for Schools in Ghana
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf
Insiders guide to clinical Medicine.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
O5-L3 Freight Transport Ops (International) V1.pdf

Final eb ch 09 encryption and e payments modes (2)

  • 2. What is encryption?  A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext.  Done by using an encryption algorithm, a formula used to turn plain text into ciphertext.  Two types: Asymmetric and Symmetric
  • 5. Which one is better?  Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for ecommerce transactions.  Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.
  • 6. Who’s using encryption?  If you use a computer and the internet, you’re using encryption!  Enables all organizations regardless of their size, to be both user-and-IT friendly.
  • 7. Why use encryption?  Authentication  Protects  personal data such as passwords. Privacy  Provides  for confidentiality of private information. Integrity  Ensures  that a document or file has not been altered. Accountability  Prevents denial or plagiarism.
  • 8. How do you manage encryption?  Make sure the encryption system has a complete key management application.  This will help manage and protect the data and keys, and help you safely match encrypted data with the right key.
  • 9. Examples of Encryption  Web browser encryption  Email encryption  Hard drive encryption  Operating system protection
  • 10. A few vendors and their product coverage  Blackberry  System,  software, hardware, and service. Global Technologies Group, Inc. (GTGI)  Software  Hewlett-Packard Company  System,  and hardware. software, hardware, and service. Intellect Security Ltd.  Software
  • 12. Electronic Payment  Electronic payment is a payment that is transmitted electronically including telephone lines and Internet
  • 13. Electronic Payment Options   Credit Cards: 90% of the transactions are made by credit cards. E-checks: encrypted version of paper checks. Echeck Electronic funds transfer or EFT refers to the computer-based systems used to perform financial transactions electronically.
  • 14. Electronic Payment Options     E-Cash/Electronic money It is money that is exchanged electronically. This involves the use of computer networks, the internet and digital stored value systems. Bank deposits, electronic funds transfer (EFT), direct deposit, payment processors and digital currencies such as bit-coin are all examples of electronic money.
  • 15. Electronic Payment Issues Electronic payment methods should lower cost  Stealing of credit card number can be an issue  Consumer privacy could be a problem 
  • 16. A credit card payment transaction
  • 17. An electronic cash payment transaction
  • 18. Smart card(chip)  A smart card can be programmed as required. It can store electronic money, or be used as credit card or an electronic check.
  • 19. Benefits of Electronic Payment - Very convenient for the consumer. In most cases, you only need to enter your account information -Electronic payment lowers costs for businesses. The more payments they can process electronically, the less they spend on paper and postage. - 24/7 online bill payment. Most of these services are free to bank customers and coordinate easily with personal software programs such as Quicken or MS Money
  • 20. Concerns About Electronic Payment The privacy and the possibility of identity theft.  Solutions  - Using virus protection software and a firewall on your computer. -You should also make sure that you send your credit card information over a secure server. Your Internet browser will notify you when a server is secure by showing a lock or key icon. In addition, the URL on a secure site is usually designated by the prefix "https" instead of "http." Retailers do their part by using data encryption, which codes your information in such a way that only the key holder can decode it.
  • 21. Authentication          Authentication, is used to verify that the information comes from a trusted source There are several ways to authenticate a person or information on a computer; -password -pass card -digital signature -Fingerprint scan -Retina scan -face scan -Voice identification
  • 22. Set Up E-Payment for A Business   In-house handling All-in-one solution, services like PayPal and ProPay make it easy for you to accept credit cards and other forms of electronic payment from your site. When a customer enters his or her information on your site, your payment service authorizes the transaction and transfers funds to your account.
  • 23. In-House Handling Requires    Shopping Cart. Coolcart.com. Secure Server. Secure Socket Layer (SSL) technology is used to encrypt the data. A system to process credit card payments and an Internet merchant account with a bank. Credit card payment processing services are available through online companies.