Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
36 views13 pages

Unit 4

E-business payment systems have become popular due to their convenience, speed and security. They employ robust security measures like encryption and support a variety of payment methods. Key features of modern payment systems include security, accessibility across different devices, integration with e-commerce platforms, and support for multiple currencies and recurring payments. Payment protocols govern the communication and security of electronic transactions and help ensure sensitive payment information is protected.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views13 pages

Unit 4

E-business payment systems have become popular due to their convenience, speed and security. They employ robust security measures like encryption and support a variety of payment methods. Key features of modern payment systems include security, accessibility across different devices, integration with e-commerce platforms, and support for multiple currencies and recurring payments. Payment protocols govern the communication and security of electronic transactions and help ensure sensitive payment information is protected.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

E-Business Payments and Security:

E-Business Payments: E-Business payments refer to the electronic transactions made


over the internet to facilitate the exchange of goods and services. These payments have
become increasingly popular due to their convenience, speed, and security. Several
types of e-business payment methods are used today, including credit/debit cards,
digital wallets, bank transfers, and electronic funds transfers (EFTs). Here are some
common features of e-business payment systems:

1. Security: E-Business payment systems employ robust security measures to


protect sensitive financial information, such as encryption, tokenization, and
secure sockets layer (SSL) technology.

2. Accessibility: Payment systems are designed to be accessible across various


devices and platforms, enabling customers to make payments from computers,
smartphones, or tablets.

3. Integration: Payment systems can be seamlessly integrated into e-commerce


platforms and websites to enable smooth transactions.

4. Multi-Currency Support: Many e-business payment systems support multiple


currencies, allowing international transactions.

5. Real-time Authorization: E-Business payment systems often offer real-time


authorization to ensure immediate confirmation of successful transactions.

6. Payment Gateways: Payment gateways act as intermediaries between the e-


business and the financial institutions, securely transmitting transaction data.

7. Fraud Prevention: Advanced fraud detection mechanisms help prevent fraudulent


activities and protect both the customers and the businesses.

8. Recurring Payments: E-Business payment systems support recurring billing for


subscription-based services or installment payments.

Features of payment systems,

1. Security: A robust payment system prioritizes security to protect sensitive


financial information and prevent fraud. This includes encryption, tokenization,
multi-factor authentication, and real-time fraud detection mechanisms.

2. Convenience: Payment systems should be user-friendly and easy to use, allowing


customers to make transactions quickly and effortlessly.

3. Accessibility: Modern payment systems are designed to be accessible across


various devices and platforms, including computers, smart phones, and tablets.

4. Multiple Payment Options: Payment systems offer a range of payment options,


such as credit/debit cards, digital wallets, bank transfers, e-checks, and mobile
payments, to accommodate diverse customer preferences.

5. Integration: Payment systems can be seamlessly integrated into e-commerce


websites and mobile applications, providing a smooth checkout experience for
users.

6. Real-Time Transactions: Instantaneous payment processing enables real-time


authorization and confirmation of successful transactions.

7. International Support: Many payment systems support multiple currencies and


facilitate cross-border transactions, making them suitable for global commerce.

8. Recurring Billing: Payment systems often provide features for recurring


payments, making them suitable for subscription-based services or regular
billings.

9. Transaction History: Users can access transaction history and payment details
for tracking purposes, expense management, and reconciliation.

10. Refunds and Disputes: Payment systems include mechanisms for handling
refunds and resolving disputes between buyers and sellers.

11. Low Transaction Fees: Efficient payment systems offer cost-effective


transactions, especially for micro-payments and high-volume transactions.

12. API Integration: Payment systems often provide Application Programming


Interfaces (APIs) that allow businesses to integrate the payment functionality
into their own software or applications.

13. Offline Support: Some payment systems offer offline capabilities, enabling
transactions in areas with limited internet connectivity.

14. Privacy Protection: Payment systems should adhere to data privacy regulations
and protect users' personal and financial information.

15. Scalability: A scalable payment system can handle a high volume of transactions
without compromising performance or security.

16. Loyalty and Rewards Programs: Some payment systems offer loyalty programs
or cashback rewards to incentivize customer usage.

17. Support for Different Industries: Payment systems may cater to specific
industries, such as e-commerce, travel, gaming, or financial services, tailoring
their features accordingly.

18. Settlement and Clearing: Payment systems facilitate the settlement and clearing
of funds between financial institutions involved in a transaction.

By combining these features, payment systems play a critical role in enabling seamless
and secure financial transactions, driving e-commerce growth, and supporting the
digital economy.

Protocols for E-Business Payments:

Payment protocols are the set of rules and procedures that govern the communication
and security aspects of electronic payment transactions. Some commonly used
payment protocols include:

1. Secure Sockets Layer (SSL) and Transport Layer Security (TLS): SSL and TLS
protocols ensure secure communication between the user's browser and the e-
commerce website, encrypting the data during transmission.

2. Payment Card Industry Data Security Standard (PCI DSS): This standard is
designed to protect credit card data during payment processing and storage.

3. 3-D Secure (3DS): Also known as Verified by Visa, MasterCard SecureCode, or


American Express SafeKey, 3DS adds an extra layer of security to online credit
card transactions.

E-Cash,

E-Cash, short for electronic cash, is a form of digital currency that represents the
electronic equivalent of physical cash. It is designed to facilitate secure and anonymous
transactions over the internet. E-cash aims to mimic the properties of physical cash,
such as being fungible, transferable, and divisible, while providing the benefits of digital
transactions.

Key Characteristics of E-Cash:


1. Anonymity: E-cash transactions are designed to be pseudonymous or
anonymous, meaning the identities of the transacting parties are not fully
revealed. This anonymity helps protect user privacy during online transactions.

2. Digital Representation: E-cash is stored and transacted electronically, typically


using digital wallets or smart cards. It exists as a series of bits and bytes rather
than as physical notes or coins.

3. Offline Transactions: One of the significant features of e-cash is its ability to be


used in offline transactions. Users can transfer e-cash to others without requiring
a real-time online connection.

4. Divisibility: Like physical cash, e-cash is divisible into smaller units, allowing for
micro-payments and transactions of various amounts.

5. Security: E-cash systems employ advanced cryptographic techniques to ensure


the security and integrity of transactions. This includes encryption for privacy and
digital signatures for authentication.

6. Limited Double Spending: E-cash systems use methods to prevent or limit the
risk of double-spending, where the same digital money is used for multiple
transactions.

7. Centralized or Decentralized Systems: E-cash systems can be implemented as


either centralized, where a trusted entity issues and manages the e-cash, or
decentralized, using blockchain or distributed ledger technology.

8. Redemption and Exchange: In some cases, e-cash can be redeemed for physical
cash through authorized agents or financial institutions. It may also be
exchanged for goods and services within a closed-loop system or on
participating platforms.

9. Payment Flexibility: E-cash can be used for various types of transactions,


including online purchases, digital content access, mobile payments, and more.

Examples of E-Cash Systems:

1. Cryptocurrencies: Many cryptocurrencies, such as Bitcoin and Litecoin, can be


considered forms of e-cash. They use block-chain technology to enable secure,
peer-to-peer transactions without the need for intermediaries.

2. Prepaid Cards: Some prepaid cards and gift cards function as e-cash, allowing
users to make purchases without linking to traditional bank accounts.
3. Mobile Payment Apps: Certain mobile payment apps enable users to load funds
into a digital wallet and use them for in-store and online payments.

It is important to note that while e-cash offers various advantages, its anonymous
nature has raised concerns about potential misuse in illegal activities, such as money
laundering and illicit transactions. As a result, regulations and compliance measures are
often put in place to address these issues and ensure responsible use of e-cash
systems.

E-Cheque:

E-Cheque, also known as electronic cheque or digital cheque, is a digital version of a


traditional paper cheque. It provides a secure and efficient method for making
payments electronically, enabling users to send money from their bank accounts to
recipients without the need for physical cheques. E-cheques retain the essential
elements of paper cheques, such as the payer's account information, payee details, the
payment amount, and the payer's signature

DEFINITION:-
“Electronic cheque means of paying electronically a payment system in which fund
transfers are made electronically from the buyer's checking account to the seller's bank
account.”

Features of E-Cheques:
1. Digital Format: E-cheques exist in electronic form, either as a file or as a record in
a database, rather than a physical paper document.

2. Bank-to-Bank Transactions: E-cheques facilitate direct transfers between bank


accounts, with the payer's financial institution sending the payment to the
payee's bank.

3. Secure Authentication: E-Cheques use various security measures, including


digital signatures and encryption, to ensure the authenticity and integrity of the
transaction.

4. Processing Time: E-cheques typically take less time to clear than traditional
paper cheques, resulting in faster fund transfers.

5. Reduced Paperwork: As electronic documents, E-cheques eliminate the need for


physical handling and reduce paperwork associated with traditional cheque
processing.

6. Online and Offline Usage: E-Cheques can be used both online and offline,
depending on the payment system's capabilities.

7. Authorization and Control: E-Cheques may require payer authorization or


approval before the transaction is executed, offering the payer control over their
payments.

ADVANTAGES OF E-CHEQUE

1. Secured and Safe: It reduce the risk because no physical movement of cheques so no
fear of loss of cheque in transit. So it is more secured than physical cheque.

2. Saves time and cost: E-cheque is much cheaper than paper cheque or credit card
transaction. No physical movement of cheques so it saves time and money for both
customer and banks.

3. Less error: It also reduce errors and fraud because limited number of people handle
them.

4. Quicker processing: E-cheque provide Faster processing times because paper


cheques take many days for transfer money from one account to the another account
but an electronic cheques often complete this processes in half that time or few days.

5. Reduce Labor: Electronic cheque also require less labor by employees and
management, which allows the business to either reduce its overall labor force that
employee time to customer service, inventory management and other mission critical
efforts.

6. Customer Payment Options: Many customers do not possess a debit or credit card.
This limits purchasing options, especially from online vendors but electronic cheque
provide you with access to goods or services.

7. Easy setup: It is simple to start a savings account and these accounts are especially
good for a young person learning to save for the first time.

8. Liquidity: According to government rules and regulations limits for withdrawals


money per month on savings accounts, but taking money out is as simple as making an
online transfer. You can complete a transfer in minutes online.

9. Convenience: E-cheque transactions are based on internet so the user can do these
transactions at anytime, anywhere by using these service’s interface on internet.

IV. DISADVANTAGES OF E-CHEQUE

1. Unauthorized Transactions: An unauthorized transaction becomes challenge for


banks, in case of any information breach.

2. Need Specific Equipment’s: E-Cheques can be processed and accessed using


specific equipment’s that ask for investments from financial institutions who offer this
system so both payer and payee should have e-cheque facility.

3. Dependent on Networking: E-cheque transactions based on internet so any network


failure may lead to delay the transfer.

4. Multiple Signers: Some problems could be when there is more than one endorser or
signer.

5. Chances of Hacking: Hackers can get access to your banking information. Some
fraudulent businesses also offer electronic cheques for get your banking information or
sensitive information.

6. Bank Fees: You may have to pay account fees to a bank with a savings account,
particularly if you maintain low balances.

7. Educated Customer: No everyone can use these services, only the person who have
knowledge about those services can use.

8. Restrictions: Like amount limits on our credit/debit card, these transactions also has
limits on amount that a user wants to transfer.

Micro Payment Systems:

Micro payment systems are designed for processing small-value transactions, often
involving tiny amounts of money that would be impractical to handle using traditional
payment methods due to high transaction fees. These systems cater to scenarios
where charging small amounts is essential, such as digital content purchases, in-app
purchases, pay-per-view services, or micropayments for online services.

Features of Micro Payment Systems:

1. Low Transaction Fees: Micro payment systems typically charge lower fees per
transaction, making it cost-effective for processing small payments.

2. Quick and Convenient: Micro payment systems facilitate fast and hassle-free
transactions, allowing users to make quick purchases without much friction.

3. Aggregation: Some micro payment systems aggregate small payments over a


period before processing them as a single transaction to further reduce costs.

4. Decentralized and Centralized Systems: Micro payment systems can be


implemented in both decentralized (blockchain-based) and centralized models,
depending on the specific system's architecture.

5. Cross-Border Transactions: Micro payment systems often support cross-border


transactions, enabling global accessibility for digital content and services.

6. Mobile Integration: Many micro payment systems are integrated with mobile
apps, enabling seamless in-app purchases and mobile payments.

7. Security: Despite the low transaction value, micro payment systems still prioritize
security and use encryption and other security measures to protect user data and
financial information.

Examples of Micro Payment Systems:

 PayPal Micropayments: PayPal offers a specific micropayment fee structure for


low-value transactions, making it attractive for businesses handling small
payments.

 Ripple (XRP): Ripple's blockchain-based payment protocol is designed to enable


fast and low-cost transactions, making it suitable for micro payments.
 Brave Browser BAT Tokens: The Brave browser's Basic Attention Token (BAT)
ecosystem allows users to make micro payments to content creators based on
attention and engagement.

Micro payment systems play a crucial role in the digital economy, supporting innovative
business models and providing a practical solution for monetizing digital content and
services that would be otherwise challenging to monetize using traditional payment
methods.

Advantages:

1 Convenience: Micro payment systems make it easy for users to make small
transactions without the need to enter lengthy payment details repeatedly. They provide
a seamless and hassle-free payment experience.

2 Cost-effective: For businesses processing small transactions, traditional payment


methods like credit cards may involve high transaction fees. Micro payment systems
often offer lower processing fees, making them cost-effective for both customers and
merchants.

3 Access to Premium Content: In digital media and content platforms, micro payments
allow users to access premium or exclusive content on a pay-per-use basis, giving them
more control over their spending.

4 Increased Revenue Opportunities: Micro payment systems enable businesses to


monetize services that might have been difficult to monetize with traditional payment
methods due to high overhead costs.

5 Global Reach: Micro payment systems can facilitate transactions across borders
without significant currency conversion fees, making them attractive for international
customers and businesses.

6 Incentivize Small Transactions: By enabling small payments, micro payment systems


can encourage impulse purchases or small donations, driving additional revenue for
businesses or supporting charitable causes.

Disadvantages:
1 Transaction Fees: While micro payment systems generally have lower fees compared
to traditional payment methods, they can still add up for frequent small transactions,
potentially impacting the profitability of businesses.

2 Security Concerns: With frequent small transactions, there might be an increased risk
of fraud and security breaches, making it essential for micro payment systems to
implement robust security measures.

3 Psychological Barrier: Some users might hesitate to make frequent micro


transactions due to the perception that they are spending more money, even if the
individual transactions are small.

4 Limited Adoption: While micro payment systems have gained popularity, they might
not be universally accepted across all platforms and services, limiting their usefulness
in certain contexts.

5 Minimum Withdrawal Limits: Some micro payment systems may have minimum
withdrawal limits, meaning users must accumulate a certain amount before they can
transfer the funds to their accounts, which can be inconvenient for those making
sporadic small payments.

Payment Infrastructure Integration: Integrating micro payment systems into existing


platforms and services might require additional development efforts and costs.

Internet security-cryptography, security protocols, network security

Internet security is a vital aspect of protecting data and information transmitted over
the internet from unauthorized access, data breaches, and cyber-attacks. Three key
components of internet security are cryptography, security protocols, and network
security.

1. Cryptography:

Cryptography involves the use of mathematical algorithms and techniques to encrypt


data, making it unreadable to unauthorized parties. It ensures the confidentiality,
integrity, and authenticity of information during transmission and storage. Some
essential cryptographic concepts include:

 Encryption: The process of converting plaintext data into ciphertext using


encryption algorithms. Only authorized parties with the appropriate decryption
keys can reverse the process and access the original data.
 Decryption: The process of converting ciphertext back into plaintext using
decryption keys to access the original data.

 Public Key Infrastructure (PKI): A system that uses a pair of cryptographic keys
(public key and private key) to facilitate secure communication and digital
signatures.

 Digital Signatures: A cryptographic technique that ensures the authenticity and


integrity of a message or document by associating it with the sender's digital
signature.

2. Security Protocols:

Security protocols define a set of rules and procedures to ensure secure


communication and data exchange between systems or devices. These protocols
establish standards for authentication, data encryption, and other security mechanisms.
Some common security protocols include:

 Secure Sockets Layer (SSL) and Transport Layer Security (TLS): Protocols that
provide secure communication between web browsers and servers, ensuring
data encryption during data transmission.

 IPsec (Internet Protocol Security): A suite of protocols that secure internet


protocol (IP) communication by encrypting data at the IP layer.

 HTTPS (Hypertext Transfer Protocol Secure): A combination of HTTP and


SSL/TLS, ensuring secure communication between web browsers and servers.

 SSH (Secure Shell): A protocol used for secure remote access and data
communication over networks.

3. Network Security:

Network security focuses on protecting computer networks from unauthorized access,


misuse, and cyber-attacks. It involves the implementation of various hardware and
software solutions to secure network infrastructure and data. Some key components of
network security include:

 Firewalls: Network firewalls act as a barrier between an internal network and


external networks, monitoring and controlling incoming and outgoing traffic
based on predefined security rules.

 Intrusion Detection Systems (IDS): IDS monitors network traffic for signs of
potential security breaches or unauthorized access and alerts administrators to
potential threats.

 Intrusion Prevention Systems (IPS): IPS goes a step further than IDS by actively
blocking and mitigating identified threats or attacks.

 Virtual Private Network (VPN): VPNs establish secure encrypted tunnels over
public networks, allowing remote users to access internal resources securely.

 Network Access Control (NAC): NAC ensures that only authorized devices and
users can access the network, preventing unauthorized access and ensuring
compliance with security policies.

Combining these three pillars of internet security—cryptography, security protocols, and


network security—helps protect sensitive data, maintain privacy, and ensure the integrity
of information exchanged over the internet. These measures are essential to
safeguarding the digital infrastructure and maintaining trust in online communications
and transactions.

You might also like