Skip to content Skip to navigation

OpenStax-CNX

You are here: Home » Content » Security and Authentication

Navigation

Recently Viewed

This feature requires Javascript to be enabled.
 

Security and Authentication

Module by: Azrina Jamal. E-mail the author

Overview - Electronic Commerce Security Techniques

The internet is based on an open network standard which can be connected using the TCP/IP protocols. IP stands for Internet Protocol and it handles addressing and delivery. TCP stands for Transmission Control Protocol and it maintains message integrity.

TCP/IP is a network protocol which allows different users using different platforms to interact and communicate.

Open network allows any computer on the Internet to link to other computers using the Internet address or IP address or a domain name regardless of the matter of connection (dial-up or cable). This simply means if you are connected to the World Wide Web you can access to any other public domains as long as you have the correct addresses.

Other advantages of using the World Wide Web is that:

  • It easily communicates multimedia contents and has a user-friendly interface
  • Web browsers are easy to use
  • Hypertext Markup Language (HTML) is very easy to learn and use that web users are being pro-active on the web by becoming content providers as appose to content receivers.
  • The birth of E-Commerce because the Internet can be used as a tool to communicate and perform commercial transactions.

“Electronic commerce based on an open Internet will affect all aspects of a market instead duplicating traditional seller-to-buyer market relationship, yielding up a whole new area of economic research.” Choi, Stahl and Whinston, 2003

When there some good, there is bound to be some disadvantages. One would be that the receiving party cannot identify the original sender because messages can be wiretapped during transmission and then modified and sent to other party. Hence essential security requirements for computer transactions should be implemented for better securities measures.

This unit will cover Security and Authentication and Secret key encryption.

References

CHOI, S., WHINSTON, A. $ STAHL, D. (2009). ECONOMICS OF ELECTRONIC COMMERCE. MACMILLAN COMPUTER PUBLISHING

Content actions

Download module as:

Add module to:

My Favorites (?)

'My Favorites' is a special kind of lens which you can use to bookmark modules and collections. 'My Favorites' can only be seen by you, and collections saved in 'My Favorites' can remember the last module you were on. You need an account to use 'My Favorites'.

| A lens I own (?)

Definition of a lens

Lenses

A lens is a custom view of the content in the repository. You can think of it as a fancy kind of list that will let you see content through the eyes of organizations and people you trust.

What is in a lens?

Lens makers point to materials (modules and collections), creating a guide that includes their own comments and descriptive tags about the content.

Who can create a lens?

Any individual member, a community, or a respected organization.

What are tags? tag icon

Tags are descriptors added by lens makers to help label content, attaching a vocabulary that is meaningful in the context of the lens.

| External bookmarks