SEOMiningSEOMining





Ecommerce Security  «Prev  Next»
Lesson 1

ecommerce security Technologies Introduction

Understanding security technologies

The primary inhibitor to the adoption of e-commerce has been fears surrounding Web-based e-commerce security. Trust in e-commerce has increased over the years as security technologies and implementation have advanced. Nevertheless, it is still a great concern, especially in the, especially the B2C arena. Even though many strides in security have been accomplished, it behooves personnel involved in e-commerce to understand the basics of e-commerce security technologies, and how to deploy those technologies in various e-commerce scenarios. This module focuses on providing a basic understanding of the essential cryptographic techniques that underpin electronic payment systems.
By the end of this module, you will be able to:
  1. Identify symmetric, asymmetric, and one-way encryption schemes
  2. Itemize the benefits provided by security implementations such as hashing, message digests, and digital signatures
  3. Understand the certificate-related infrastructure
  4. Identify the need for secure electronic transactions
  5. Identify encryption schemes such symmetric, asymmetric, and one way
  6. Describe the methods for authentication and identification
  7. Explain the use of certificates
In the next lesson, you will learn about the need for secure electronic transactions.