Unit 3
Unit 3
11/18/2021
Unit-3
Maze Runner
[COMPANY NAME]
Types of Payment Methods for ECommerce
Credit/Debit card payments:
Payments via cards are one of the most widely used and popular methods
not only in India but on the international level.
Credit cards are simple to use and secure. The customer just has to enter
the card number, expiry date, and CVV, which has been introduced as a
precautionary measure. The CVV helps detect fraud by comparing
customer details and the CVV number.
Coming to debit cards, they can be considered the next popular method for
eCommerce payments.
Debit cards are usually preferred by customers who shop online within their
financial limits. The main difference between credit and debit card is with a
debit card one can only pay with the money that is already in the bank
account, whereas in the case of a credit card, the spent amount is billed,
and payments are made at the end of the billing period.
They usually come in different stored values and the customer has to
choose from them. Prepaid cards have virtual currency stored in them.
Though the adoption rate of prepaid cards is low, they are gradually
becoming popular for certain niche categories.
Bank transfers:
Though not popular nowadays but still bank transfer is considered as an
essential payment method for eCommerce.
It is considered as ‘if all else fails’ kind of payment method. Some of the
eCommerce stores are also keen on using bank transfer payment options.
Customers enrolled in internet banking can do bank transfers for their
online purchases. Bank transfer is the most secure method as the
transactions need to be approved and authenticated by the customers.
It is a simple way of paying for online purchases and does not require the
customer to have a card for payment purposes
E-Wallets:
E-wallet is one of the upcoming trends which gives a new shopping
experience altogether. The use of e-wallets is becoming popular at an
alarming rate.
Cash:
Let’s face it, in India cash is the king. For eCommerce, it comes in the form
of the cash-on-delivery option.
Mobile payments:
Payment acceptance was no exception for mobile penetration.
This digital payment solution offers a quick solution for customers. To set
up a mobile payment method, the customer just has to download software
and link it to the credit card.
Cryptocurrencies:
Though not popular yet, cryptocurrencies are rapidly but surely gaining a
spot as a favorable payment method, particularly with genZ.
paradigm changing events we’ve lived through. The advent of the internet
would be one. Though the technology may be a bit older than some know, the
major initial technological advancements came in the 1990’s and the 2000’s,
devices. Roughly half the world’s population now have powerful pocket
experiencing now. The one pushed aside as a tech fad. The one only computer
nerds knew anything about. The one insiders have been talking about and
dealing in. Cryptocurrencies. The mysterious, shady, dirty money being passed
future of money (or at least a viable alternative). Just as the internet radically
indexing for a local business’ phone number, or even that of your best friend?
Recall going to a store to check prices for the newest models of shoes or CD
buy, watch, read, learn just about anything you could think of. That moment
beacon of the what could be. Email, Amazon, eBay, Napster, MySpace,
Facebook, Google, Apple— all these wonderful interfaces and uses for the
This update was far-reachng, but missed a few key areas. One of these was the
transactions.
currency around without incurring high fees, lag time, and potential security
breaches. But just as the internet gave businesses and people information and
We are familiar with the methods of payment from our youth: cash, checks,
debit cards, and credit cards were the typical ways to pay. If you bounced a
check, overestimated your account balance, deposited your paycheck too late,
or made a late credit card payment, you would face high fees. On the other
hand, when you were waiting for funds to reach your account, the opposite
was true. You were held hostage to bank processing times along with fees. The
imposing middleman, profiteering from what they would call the cost of
This still is true as of late 2019. If you need to pay a bill or another kind of
payment and you live in a developed country, you can probably do it online. It
takes a few days for your payment to clear. If you aren’t lucky, you have to mail
time than it should. If you want to send a relative or friend some money, you
can mail a check or cash, make a bank or wire transfer, or meet the person.
This takes time. A smart device should easily and confidently be able to settle
As a merchant, you have your own set of issues with the system as it stands. If
customers pay you in any form other than cash, your are waiting for days if not
more than a month to receive your money. Chargebacks, merchant fees and
penalties, and fraud are also leaks in your ship. On top of all this, the
convenience comes at a high cost. Though these costs can mostly be explained
infrastructure.
We’ve waited long enough to have easy low-cost access to doing business with
enterprises or individuals, just as email has done for mail, and the internet has
money.
With modern digital assets, we give ourselves freedom of space, time, and a
large part of the middlemen involved with money transactions. Once set up
anywhere from 3 seconds to a few minutes. The costs could range from a few
the inherent nature of blockchain security would thwart even the most
principles, for how it works. Each blockchain has its merits and faults in its
CQ was developed to help clients make the transition, to bridge the gap,
between the past and the cryptocurrency and digital asset future. We
understand merchants may not feel comfortable in this new space. Our rates
create a new standard to move money. To find out more, visit our FAQ page or
pitfalls could all pose as dealbreakers for cryptocurrency adoption. But if these
are overcome, and the public can learn of the possibilities of cryptocurrencies,
then we are witness to the birth of the future of money. COINQVEST is here to
What is eCash?
An eCash user will download the electronic money from their bank account
and store this on their hard drive. When they are ready to use the electronic
cash to pay an Internet merchant or shareware provider, the same software
is then used to take the amount from their eCash “wallet” and add it to the
merchant’s “wallet.”
Another issue that emerged was that shareware providers rarely got paid
for what they offered because there was no viable way to do so unless they
wanted to receive an offline monetary payment. eCash became a solution
that was not only address this new type of transaction, but it was also
cheap, secure, and private.
Last, eCash also has linked offline and online payments together through
the introduction of smart card technology. Money can be loaded onto
these cards and then moved to other smart cards or electronic “wallets.”
While previously smart card technology was just used for phone calls, the
world is now using smart card technology for all types of transactions.
It’s clear the world of financial transactions has changed forever since the
advent of eCash. Checks and paper money could be eventually replaced
with completely digital payments. This will also alter how banks and other
financial intermediaries are involved, delegating them to a much smaller
role as just a storehouse for money, a processor and verifier, and a lender.
The personal relationship with a bank will also fall by the wayside as more
people turn to their computers, tablets, and smartphones for all their
transaction needs.
Payment security
Security is an essential part of any transaction that takes place over the internet.
Customers will lose his/her faith in e-business if its security is compromised.
Following are the essential requirements for safe e-payments/transactions −
Confidentiality − Information should not be accessible to an unauthorized
person. It should not be intercepted during the transmission.
Integrity − Information should not be altered during its transmission over the
network.
Availability − Information should be available wherever and whenever
required within a time limit specified.
Authenticity − There should be a mechanism to authenticate a user before
giving him/her an access to the required information.
Non-Repudiability − It is the protection against the denial of order or denial
of payment. Once a sender sends a message, the sender should not be able
to deny sending the message. Similarly, the recipient of message should not
be able to deny the receipt.
Encryption − Information should be encrypted and decrypted only by an
authorized user.
Auditability − Data should be recorded in such a way that it can be audited
for integrity requirements.
Authentication
Encryption
Integrity
Non-reputability
"https://" is to be used for HTTP urls with SSL, where as "http:/" is to be used for
HTTP urls without SSL.
Privacy
Integrity
Authentication
Non-repudiation
1. Privacy
Privacy includes preventing any activity that will lead to the sharing of
customers’ data with unauthorized third parties. Apart from the online seller
that a customer has chosen, no one else should access their personal
information and account details.
2. Integrity
4. Non-repudiation
A Motivating Example
Consider an e-commerce scenario where Alice, a purchasing agent, wants to
order some products from Bob, her supplier.Requirements for the
transaction:Alice wants to be sure that she is really dealing with Bob and not
an impostor (authentication).Bob wants to know that Alice is really Alice and
not an impostor (authentication), because Alice gets special prices as
negotiated.Alice wants to keep the order secret from her competitors; and Bob
does not want other customers to see Alice’s special prices (privacy).Alice and
Bob both want to be sure that crackers cannot change the price or quantity
(integrity).Bob wants to ensure that Alice cannot later claim that she did not
place the order (non-repudiation).CSI 5389
General Requirements
Authentication: The sender knows that the message is going to the intended
recipient; and the recipient knows that the message was sent by the proper
sender.Privacy: The message is secret: only the sender and the intended
recipient know its contents.Integrity: The message was not modified
(intentionally or accidentally) while in transit.Non-repudiation: The author of
the message cannot later deny having sent the message.Cryptographic
techniques can be used to satisfy the above requirements.CSI 5389
Hacker attacks are common in e commerce. How can you protect yourself? We spend
a lot of time discussing the risks related to the governmental invigilation, privacy
breaches, and fintech problems, yet somehow forget the very common issue of e-
commerce industry security. Actually, the same problems affect all services that take
part in any kind of money flow. What can a typical e-commerce service owner do to
avoid the risk?
This article is going to focus on describing the most common types of dangers that
affect e-commerce businesses. In order to learn how to secure yourself, read
our interview with TestArmy’s Head of Security.
Online thieves (later related to as hackers) rarely work solely for fun. They rather
focus on building complex enterprises and in every enterprise time is the most
important value. Thus, the try to optimize their operations. It leads to looking for
victims, who have high value and are not protected well enough. Hackers look for
targets that will allow them to make big money as fast as possible and with the least
possible effort. This is why the best target for them are e-commerce services.
Internet shops create and keep their customer base mostly thanks to their reputation,
so it may also be an obvious reason for an attack. By taking over a company’s
infrastructure, a hacker can blackmail its owners by threatening to disclose the
information about the break-in. It would obviously lead to losing the customers’ trust
and compromising the enterprise’s reputation. Such attacks happen in all kinds of
industries, not only in e-commerce. In 2017 Uber tried to bribe hackers in order to
stop them from publishing the information about their “success”. After all, the
information was disclosed and Uber had to pay high fines. Many of Uber’s board
members were forced to leave the company.
This risk does not only concern large companies – they can usually afford to survive
the difficult period just after the attack and data leak. The emerging businesses, on the
other hand, those without a strong and global brand, can be literally ruined by a
sabotage. We had a chance to observe attacks on companies of all sizes, both huge
corporations, such as Acer, Sony and eBay and small ones that went bankrupt,
because couldn’t survive the loses generated by just one single attack.
It all comes down to the attackers’ creativity and who gains access to the systems.
Quite often automated hacking bots, which
do not care about a particular company’s profile, and just encrypt HDDs right away in
order to execute ransomware attacks.
Precise and carefully planned attacks that are aimed at particular targets also happen,
their goal, however, is to extract data or steal tangible resources.
Payment redirection
Being able to modify an operating application’s source code, hackers can redirect the
users to maleficent services and make a percent of transferred money go to the
thieves’ accounts. Sometimes hackers perform small code injections that are meant to
substitute the original payment forms and the whole process goes without any
violations, but this code sends the credit card/bank details to the hackers. Then, they
can use it on their own or sell it to other thieves (so-called carders) who specialize in
credit card frauds.
More on what hackers want to do to your business and what to do to protect your
business soon. Meanwhile, you can learn the most important lessons from Dawid’s
podcast, available on TestArmy YouTube Channel.
The process of secure electronic transactions used digital certificates that were
assigned to provide electronic access to funds, whether it was a credit line or bank
account. Every time a purchase was made electronically, an encrypted digital
certificate was generated for participants in the transaction–the customer, merchant,
and financial institution–along with matching digital keys that allowed them to
confirm the certificates of the other party and verify the transaction. The algorithms
used would ensure that only a party with the corresponding digital key would be
able to confirm the transaction. As a result, a consumer’s credit card or bank
account information could be used to complete the transaction without revealing any
of their personal details, such as their account numbers. Secure electronic
transactions were meant to be a form of security against account theft, hacking, and
other criminal actions.
What is SSL?
SSL, or Secure Sockets Layer, is an encryption-based Internet security protocol. It was
first developed by Netscape in 1995 for the purpose of ensuring privacy,
authentication, and data integrity in Internet communications. SSL is the predecessor
to the modern TLS encryption used today.
A website that implements SSL/TLS has "HTTPS" in its URL instead of "HTTP."
There have been several iterations of SSL, each more secure than the last. In 1999 SSL
was updated to become TLS.
Originally, data on the Web was transmitted in plaintext that anyone could read if
they intercepted the message. For example, if a consumer visited a shopping website,
placed an order, and entered their credit card number on the website, that credit
card number would travel across the Internet unconcealed.
SSL was created to correct this problem and protect user privacy. By encrypting any
data that goes between a user and a web server, SSL ensures that anyone who
intercepts the data can only see a scrambled mess of characters. The consumer's
credit card number is now safe, only visible to the shopping website where they
entered it.
SSL also stops certain kinds of cyber attacks: It authenticates web servers, which is
important because attackers will often try to set up fake websites to trick users and
steal data. It also prevents attackers from tampering with data in transit, like a
tamper-proof seal on a medicine container.
Is SSL still up to date?
SSL has not been updated since SSL 3.0 in 1996 and is now considered to be
deprecated. There are several known vulnerabilities in the SSL protocol, and security
experts recommend discontinuing its use. In fact, most modern web browsers no
longer support SSL at all.
TLS is the up-to-date encryption protocol that is still being implemented online, even
though many people still refer to it as "SSL encryption." This can be a source of
confusion for someone shopping for security solutions. The truth is that any vendor
offering "SSL" these days is almost certainly providing TLS protection, which has
been an industry standard for over 20 years. But since many folks are still searching
for "SSL protection," the term is still featured prominently on many product pages.
One of the most important pieces of information in an SSL certificate is the website's
public key. The public key makes encryption possible. A user's device views the
public key and uses it to establish secure encryption keys with the web server.
Meanwhile the web server also has a private key that is kept secret; the private key
decrypts data encrypted with the public key.
There are several different types of SSL certificates. One certificate can apply to a
single website or several websites, depending on the type:
SSL certificates also come with different validation levels. A validation level is like a
background check, and the level changes depending on the thoroughness of the
check.