4

Click here to load reader

Security in Electronic Payments

Embed Size (px)

Citation preview

Page 1: Security in Electronic Payments

8/14/2019 Security in Electronic Payments

http://slidepdf.com/reader/full/security-in-electronic-payments 1/4

SECURITY IN ELECTRONIC PAYMENTS.

Two main issues need to be considered under the topic of payment security: what isrequired in order to make EC payments safe, and the methods that can be used to do so.

Security Requirements. Security requirements for conducting EC are the following:

1. Authentication. The buyer, the seller, and the paying institutions must be assured of the

identity of the parties with whom they are dealing.

2. Integrity. It is necessary to ensure that data and information transmitted in EC, such as

orders, reply to queries and payment authorization, are not accidentally or maliciously

altered or destroyed during transmission.3. Nonrepudiation. Merchants need protection against the customer’s unjustified denialof placing an order. On the other hand, customers need protection against merchants’

unjustified denial of payments made. (Such denials, of both types, are called repudiation.)

4. Privacy. Many customers want their identity to be secured. They want to make sure

others do not know what they buy. Some prefer complete anonymity, as is possible withcash payments.

5. Safety. Customers want to be sure that it is safe to provide a credit card number on theInternet. They also want protection against fraud by sellers or by criminals posing as

sellers.

Introduction

The purpose of this application is to introduce the concept of Java Database Connectivity

(JDBC) and illustrate the use of JDBC as a tool for database access. JDBC is amechanism that allows Java to communicate with databases using a standard ApplicationProgramming Interface (API) to access databases regardless of the driver and the

database product. This servlet-based application provides the capability to connect to any

relational database registered as an ODBC data source using JDBC to browse thedatabase meta-data and instance, and to manipulate the database by issuing ad hoc SQL

statements. The application can be run using a browser (Netscape 4.0 or Internet Explorer 

4.0 or higher).

The example JDBC application uses a three-tier architecture to access a registered ODBCdata source. A Java Servlet and a Java Bean act as the middle tier, communicating with

the underlying data source using JDBC (through a JDBC-ODBC driver) and returning the

results, using Java Server Pages (JSP), formatted in HTML to the browser.

Page 2: Security in Electronic Payments

8/14/2019 Security in Electronic Payments

http://slidepdf.com/reader/full/security-in-electronic-payments 2/4

Registering an ODBC data source

To configure the ODBC data source implement the following steps:

1. Open the control panel from Windows settings and start the application "ODBC Data

Sources [32bit]"

 NOTE: In Windows 2000, the Control Panel does not contain the pointer to the "ODBC

Data Sources". Using Help, search on ODBC and then select the topic "Using DataSources". From there, select "Data Sources" to bring up the ODBC Data Source

Administrator window.

Page 3: Security in Electronic Payments

8/14/2019 Security in Electronic Payments

http://slidepdf.com/reader/full/security-in-electronic-payments 3/4

2. Select the Add button to add a new data source.

3. Select the appropriate driver for your database and click the Finish button.

Page 4: Security in Electronic Payments

8/14/2019 Security in Electronic Payments

http://slidepdf.com/reader/full/security-in-electronic-payments 4/4

4. Enter a string in the Data Source Name that you want to use to register your database,

and click the Database Select button.

5. Browse to find the actual file of your database and click OK when you're done.

6. Click OK to exit all the windows.