WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

E-commerce capabilities assessment: -security of e-payment systems- case of the democratic republic of congo

( Télécharger le fichier original )
par Espérant Ngongo Mbuli
University of Walles - Master in Advanced information technology and Business Management 2013
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

II.7.3. Overview of security of E-commerce network

In the previous sections, the research presents an overview of threats that e-commerce and e-payment systems are likely to face.

Because of the diversity of threats and the way the networks are attacked in today's internet era, organization or business cannot rely on a single security technology; it must use security technologies at different layers of the network.

Figure 7 below shows the three layers of the network which needs to be protected.

Figure 6: layered security

Source: Turban et al. 2008, p 532

- Router level : perimeter security to internet

- Firewall: isolation of traffic communication between the internet and the LAN - LAN switch: access security on local resources

Page | 27

II.7.3.1 Firewalls

Turban et al. (2008, p 533) defines firewall as a network resource «consisting of both hardware and software that isolates a private network from a public network».

Firewall examines all packets passing through it and allows or denies the traffic according to the rules defined by the network administrator.

Firewall can protect against many threats such as unauthorized access, viruses, spams, harmful macro, applications backdoors, etc.

In e-commerce environment, firewall is used to block all packets coming from un-trusted source or accessing to a specific resource on the LAN.

II.7.3.2 Demilitarized zone (DMZ)

Demilitarized zone is defined by Turban (Turban et al., 2008, p534) as «a network area that sits between an organization's internal network and the internet, providing physical isolation between the two networks that is controlled by rules enforced by a firewall».

In e-commerce infrastructure web server will sit in the DMZ, publicly accessible area and the database server will be installed in the internal LAN protected by another firewall. In such deployment, network has two firewalls to hardener the security.

Figure 7: DMZ deployment

Source: Turban et al.,2008, p535

Page | 28

II.7.3.3 Personal firewalls

Actually many home users have broadband connection to the internet which allows them to get permanent connection to the Internet. This permanent exposure to internet expose computer to attacks.

Personal firewall have been developed to protect desktop or laptop by monitoring traffic flowing on the LAN interface card and taking action according to the rule defined by the user.

II.7.3.4 Virtual Private Network (VPN)

G. Schneider (2011, p 86) defines a Virtual Private Network as «an extranet that uses public networks and their protocols to send sensitive data to partners, customers, suppliers, and employees using a system called IP tunneling or encapsulation».

IP tunneling creates a private communication channels on the internet in which information is encrypted to make it invisible to the other internet users which are not involved in the communication transaction.

Protocol tunneling permits to encrypt data packets and encapsulate them into packets to ensure confidentiality and integrity of data, to be transmitted over the internet.

II.7.3.5 Overview of intrusion detection systems (IDS)

The necessity of monitoring the Information system for unauthorized access permits the development of special systems and software that can monitor activity on the network and detect illegal activities.

These appliances and software are called Intrusion prevention system (IDS). II.8. Securing e-payment systems for B2C e-commerce

E-commerce needs a special payment system to enable online payment of goods and services sold online.

According to the Laudon's (Kenneth C. Laudon and Jane P. Laudon, 2006, p416), «electronic payment systems for the internet include systems for digital credit card payments, digital wallets, accumulated balance payment systems, store value payment systems, digital cash, peer-to-peer payment systems, digital checking and electronic billing presentment systems».

With the development of mobile telephony, another payment system is available and consists of paying good and service using mobile phone. This is known as m-payment system and will be developed shortly in e-commerce transaction.

Page | 29

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Là où il n'y a pas d'espoir, nous devons l'inventer"   Albert Camus