The primary inhibitor to the adoption of e-commerce has been fears
surrounding Web-based e-commerce security. Trust in e-commerce has increased over the years as security technologies and implementation have
advanced. Nevertheless, it is still a great concern, especially in the, especially the B2C arena. Even though many strides in security have
been accomplished, it behooves personnel involved in e-commerce to understand the basics of e-commerce security technologies, and how to deploy those technologies in various e-commerce scenarios. This module focuses on providing a basic understanding of the essential cryptographic techniques that underpin electronic payment systems.
By the end of this module, you will be able to:
Identify symmetric, asymmetric, and one-way encryption schemes
Itemize the benefits provided by security implementations such as hashing, message digests, and digital signatures
Understand the certificate-related infrastructure
Identify the need for secure electronic transactions
Identify encryption schemes such symmetric, asymmetric, and one way
Describe the methods for authentication and identification
Explain the use of certificates
In the next lesson, you will learn about the need for secure electronic transactions.