Click here to load reader
Upload
ksi12345
View
219
Download
0
Embed Size (px)
Citation preview
8/14/2019 Security in Electronic Payments
http://slidepdf.com/reader/full/security-in-electronic-payments 1/4
SECURITY IN ELECTRONIC PAYMENTS.
Two main issues need to be considered under the topic of payment security: what isrequired in order to make EC payments safe, and the methods that can be used to do so.
Security Requirements. Security requirements for conducting EC are the following:
1. Authentication. The buyer, the seller, and the paying institutions must be assured of the
identity of the parties with whom they are dealing.
2. Integrity. It is necessary to ensure that data and information transmitted in EC, such as
orders, reply to queries and payment authorization, are not accidentally or maliciously
altered or destroyed during transmission.3. Nonrepudiation. Merchants need protection against the customer’s unjustified denialof placing an order. On the other hand, customers need protection against merchants’
unjustified denial of payments made. (Such denials, of both types, are called repudiation.)
4. Privacy. Many customers want their identity to be secured. They want to make sure
others do not know what they buy. Some prefer complete anonymity, as is possible withcash payments.
5. Safety. Customers want to be sure that it is safe to provide a credit card number on theInternet. They also want protection against fraud by sellers or by criminals posing as
sellers.
Introduction
The purpose of this application is to introduce the concept of Java Database Connectivity
(JDBC) and illustrate the use of JDBC as a tool for database access. JDBC is amechanism that allows Java to communicate with databases using a standard ApplicationProgramming Interface (API) to access databases regardless of the driver and the
database product. This servlet-based application provides the capability to connect to any
relational database registered as an ODBC data source using JDBC to browse thedatabase meta-data and instance, and to manipulate the database by issuing ad hoc SQL
statements. The application can be run using a browser (Netscape 4.0 or Internet Explorer
4.0 or higher).
The example JDBC application uses a three-tier architecture to access a registered ODBCdata source. A Java Servlet and a Java Bean act as the middle tier, communicating with
the underlying data source using JDBC (through a JDBC-ODBC driver) and returning the
results, using Java Server Pages (JSP), formatted in HTML to the browser.
8/14/2019 Security in Electronic Payments
http://slidepdf.com/reader/full/security-in-electronic-payments 2/4
Registering an ODBC data source
To configure the ODBC data source implement the following steps:
1. Open the control panel from Windows settings and start the application "ODBC Data
Sources [32bit]"
NOTE: In Windows 2000, the Control Panel does not contain the pointer to the "ODBC
Data Sources". Using Help, search on ODBC and then select the topic "Using DataSources". From there, select "Data Sources" to bring up the ODBC Data Source
Administrator window.
8/14/2019 Security in Electronic Payments
http://slidepdf.com/reader/full/security-in-electronic-payments 3/4
2. Select the Add button to add a new data source.
3. Select the appropriate driver for your database and click the Finish button.
8/14/2019 Security in Electronic Payments
http://slidepdf.com/reader/full/security-in-electronic-payments 4/4
4. Enter a string in the Data Source Name that you want to use to register your database,
and click the Database Select button.
5. Browse to find the actual file of your database and click OK when you're done.
6. Click OK to exit all the windows.