ECheck and eCheckSecure

Slides:



Advertisements
Liknende presentasjoner
Everyone Print Kalle Snarheim.
Advertisements

Ordspr./ proverbs 4,18 Rettferdiges sti er som morgenens lysskjær, det vokser til det blir høylys dag. The way of the righteous is like the first gleam.
Jara NetBusiness Vedlikeholdsrelease , 11. februar 2008.
DESEMBERKONFERANSEN Kristian Siem SS7 New Vessels
Organization and board
Régis Laurent Director of Operations, Global Knowledge Competencies include: Gold Learning Silver System Management Touch, flip and fold Håvard Haukeberg.
Gruppemedlemmer Gruppa består av: Magnus Strand Nekstad – s156159
- derfor går vi mobilt Espen Olsen Langfeldt, redaksjonssjef VG Mobil, Fagpressedagen 2013.
The Trondheim Toll Ring System
Ledelsesinformasjonsystem
Slide 2:. Forretningsmodellen forklart på engelsk og norsk
Mobile Phone authorised Services through Near Field Communications Hans-Christian Haugli, Elin Melby, Josef Noll.
Key takes from the CXPA breakfast meeting 19th of march 2013 Summarized by KOBRA – Full text from Post It notes available in notes 1.
Gitte Holten Ingerslev - DPU Tekst Forskerens og didaktikerens blik på mødet mellem tekst og læser.
Det er ganske underlig med disse sentrale salmene. Selv om du ikke er religiøs burde du lese dette.
Network- based Regional Specialisation in Child and Adolecent Psychiatry Making it Work Tromsø 23 september 2005 Olav Eldøen og Randi Nesje Myhr.
Making a Home Page. Why a Web Page? Easier to submit labs electronically (lack of color printers at university); Easier to submit labs electronically.
Nettverk Software Protocol Hierarchies
Nettverk Software Protocol Hierarchies
Nytte og relevans av IT-studiene: Nyansattes erfaringer 30. november 2012 Tormod Fjeldberg.
(1) Viability performance – reporting The Hydro Way Presented by Kirsten Margrethe Hovi 2008 June 3 rd.
EQUASS Assurance - en fordypning ”Å dele er å forbedre”. (”To share is to improve”). ERFA-konferansen i Trondheim nov
Men hva mener de som har klart det? Børge Haugset (NTNU&SINTEF)
1 Information search for the research protocol in IIC/IID Medical Library, 2013.
WHY WE’RE STRENGTHENING ROTARY. OBJECTIVES  Clarify what Rotary stands for, how it’s different and why people should care  Elevate awareness and understanding.
Triggere Mutasjoner i basen. Triggers Triggers are stored procedures that execute automatically when something (event) happens in the database: : data.
Web Accessibility Initative (WAI) Flere akronymer.
WAI 2.0 Flere akronymer.. WCAG 2.0 Working Draft: Fire prinsipper Content must be perceivable Innholdet skal presenteres slik at det kan bli oppfattet.
Forskningsetikk og premiering av deltakere i forskning: Hva sier NESHs retningslinjer og hvilke forskningsetiske spørsmål reises? Bergen, 27, februar 2009.
1 Infomøte 4.KomTek Hovedprofil TØ: Teleøkonomi 20.april 2010 Harald Øverby (Steinar Andresen)
1 About critical attitude when reading Lill Kristiansen, Prof. Dr. Scient Department of Telematics, NTNU Material was originally written.
Økonomiske forutsetninger Gullfaks landsbyen 2007.
Citation and reference tools for your master thesis
Trondheim 6. mars 2014 Mørke skyer i horisonten?.
fra nachspiel ide til eksport vare
INTERNASJONAL PRIVATRETT Lovvalg i kontrakt – uten partenes valg Professor dr. juris Giuditta Cordero Moss.
1 | 2010 Internetteknologi 2 (ITNET2) Kort teknisk ASP.NET introduktion Mandag den 4/ Jesper Tørresø.
Publisering i åpne kanaler Anne Storset Institutt for mattrygghet og Infeksjonsbiologi.
IT services and support Information to new employees at UIB.
Problem set 2 By Thomas and Lars PS: Choose the environment, choose many pages per sheet. Problem set 2 Exercise 11/29 Laget av: Thomas Aanensen og Lars.
Planning and controlling a project Content: Results from Reflection for action The project settings and objectives Project Management Project Planning.
Engelsk mal: Startside The Ageing Society – current situation, challenges and opportunities Steinar Barstad Warszawa 25th November 2014 Specialist Director.
The Thompson Schools Improvement Project Process Improvement Training Slides (Current State Slides Only) October 2009.
Primary French Presentation 10 Colours L.I. C’est de quelle couleur?
SmartSwap.
CAMPAIGNING From vision to action.
Welcome to an ALLIN (ALLEMED) workshop!
Biological quality assurance in Norway– Biological standards
LO2 – Understand Computer Software
Kaveet Patel – Education Officer
Database.
Transferring Education Benefits
Getting to Genuine Collaboration
WG Joint Inter-Change Date: Authors: Name Company
Chapter 2: Economic Systems Section 3
Chapter 9 Designing Databases
We are now using Chain SMS to message patients!
ACCG Project Development & Approval Process
TGr Closing Report May 2005 Date: Authors: January 2002
A Roadmap to Upa Yoga Facilitator Training
Developing an Educational Web Application for Student Training in Geographical Information Systems (GIS) Derek Morris Jr. , Edsel Norwood , Disaiah Bennett.
Introduction to Computers and Technology
(You can delete these instructions before sharing with students.)
Jakub Kocvara, Dr. Martin Hlosta, Prof. Zdenek Zdrahal
BY: LAURYN PETTYJOHN AND Paige gerry
Formalities in the final months May 22, 2019
Nottingham City Diabetes Service PLT Tuesday March 2017
Types of Sentences.
Burnaby District Scholarships
Utskrift av presentasjonen:

ECheck and eCheckSecure Group 19 Marie M. Moltubakk, Iqbal Habib, Bjørnar Waage, Silje Øie, Samson A. Tedla

Part one of the exercise: What specific information is needed to pay with an eCheck? After making a purchase, from the site:

What you want to purchase and the amount of the product or/and service. First name, last name, address, city, ZIP code, Bank Branch Location and home phone number. Written in a sign-in chart to confirm your personal or company account information. Date of birth and US Drivers License or StateID. They then write the check information for you automatically, and they ask you to “Please remove and VOID the next check in your check book and enter the following information from that check carefully.” Then they ask you if your paper check is similar or not to their example, this is so they can give you an explanation on where to find the numbers you are to write in. The numbers are your routing number, account number and check number. Then you get a visual example of how your paper check look like when is filled out with all the information needed. And you are asked to type your name, as a signature, to verify that you agree with the information given in the visual check above. ·        And finally you get a confirmation that your check has been approved. With the text

Check

eCheckSecureä Privacy Statement Information Collection and Use ECheckSecure will not sell, share, or rent this information to others in any way other than what is disclosed in this statement eCheckSecure Usage A user must be passed to eCheckSecure via an authorized online merchant or broker. Payment ECheckSecure request information from the user on our verification forms. Cookies eCheckSecure does not use cookies some of our business partners and other entities use cookies on their sites prior to the user arriving at eCheckSecure (for example, advertisers). HoeCheckSecurever, eCheckSecure have no access to, or control over these cookies. Log Files ECheckSecure use IP addresses to analyse trends, administer the site, track users’ movement, and gather broad demographic information for aggregate use

Correction/Updating Personal Information Sharing ECheckSecure may share aggregated demographic information with our partners and advertisers from time-to-time. This is not linked to any personal information that can identify any individual person. ECheckSecure partner with a credit verification company to verify the identification and credit history of users’ checking accounts This company may retain, share, store or use information for any secondary purpose and is beyond our control. Links This eCheckSecureb site contains links to other sites. Security The eCheckSecure eCheckSecurebsite takes every precaution to protect our users’ information. When users submit sensitive information via the eCheckSecurebsite, that information is protected both on and off-line. Correction/Updating Personal Information Information provided to eCheckSecure by the user cannot be changed by anyone once the transaction has been processed. It is the responsibility of the user to insure that all the information provided is correct prior to completing the transaction. Notification of Changes ECheckSecure will always use information in accordance with the privacy policy under which the information was collected.

Conclusion The demo was easy enough to use, but I had no feeling that this was a secure way to do it. It is easy for newcomers in the EC , and Internet shopping.(compared to a routine you already have.)

How does eCheck Secure guarantee online checks? Security When our verification forms ask users to enter sensitive information (such as driver’s license and financial information) protected with state-of-the-art SSL encryption technology and Digital certificates. authorized eCheckSecure administrators who need the information to perform a specific job (for example, our billing clerk or a customer service representative).

Why we use eSecure /eCheck? Data: By 2004 only 80% of online payments will be made with a creadit card while the number of US households that do not have a credit car will double between 1998 and 2003. The personal information given by the costumer and user is used to identify the user and checking information for the purpose of creating an electronic check transaction The data are then converted by eCheck Secure into an electronic check that can be securely transmitted to the Automated Clearing House (ACH) network. Once the information is verified through one of the man risk management services available And the transaction has completed electronically via ACH and founds are deposited into the merchants bank within the usual 2-4 working days The electronically is a Financial Service Mark-up Language (FSML) that use HTML for sending payment messages that includes eChecks Risk Managemnet Services Equifax is the leading provider of consumer credit infromation in US. Back Office Account Mangemnet The eCheck secure back office is a secure data repository of all eCheck Secure transaction history and merchant account profiles. Users can view reports, query transaction status.

Fully Electronic Check Settlement –ACH Freeing consumers and marchants the inconvenences posed by papper drafts. E-mail confirmation

Next Group 23 Kjersti Grov, Geir Tommy Nilson, Kari Janne Pedersen, Rune Nygård

Bolt.com upoc.com

Hva er bolt.com? Kanal for å etablere dialoger med 15 – 24 år gamle mennesker Bolts medlemmer kommer til bolt for å dele deres meninger og synspunkter Møte nye mennesker fra rundt omkring I verden Styrer diskusjoner og innhold gjennom alle plattformer

Hva er bolt.com? (forts.) Forsørger brukere med gratis hjemmesider, e-mail, musikknedlasting, øyeblikkelige meldinger, spill og mer

Hva er bolt.com? (forts) PC Trådløse mekanismer Mobiltelefoner

Markedsføringsstrategi Har gjort minimalt med konsumentmarkedsføring Har hovedsaklig vokst gjennom jungeltelegrafen og gjennom strategiske partnerskap med noen av de største merkene på webben

Partnere AT & T Coca-Cola Nike Clairol Ford Motor Company Kodak Maybelline Neutrogena Cosmetics Paramount Home Video PDFA Microsoft Cingular Sony Pictures Entertainment Procter & Gamble

Upoc.com Upoc.com startet i 1999 Upoc.com å legger muligheten til rette for bedrifter å sende innformasjon om kampanjer og happenings til mobil brukere. Er ledende på mobil markedsføring service i USA

Hva tilbyr upoc.com kunden? Upoc.com har to former for kunder,mobiltelefon brukerer og bedrifter. Bedrifter: Upoc.com tilbyr bedrifer direkte kontakt med kunder Bedrifter har mulighet til å informere og påvirke kundene til en hver tid.

Hva tilbyr upoc.com kunden? Mobiltelefon brukere Får tilgang til gratis informasjon om valgte interesse områder. Man kan sende gratis innformasjon og tekst meldinger til andre mobiltelefoner.

Eksempel 1

Eksempel 2

Markedet? 58% av amerikanerne fra 12 år og oppover eier en mobiltelefon. Dette er i kontinuerlig vekst. I USA vil det i løpet av året bli sendt ca 6,4 billioner SMS meldinger.

Hvordan tjener upoc.com penger? Bedrifter betaler for mobil markedaservice Upoc.com legger forholdene til rette for bedrifter å nå kunden Kunder tar i mot informasjon Det er bedriftene upoc tjener penger på, men det hadde ikke vært mulig uten mobiltelefon brukerne.

Konklusjon Begge er ledene i markedet på sitt område Begge har gratis tjenester for medlemmer Begge er reklamefinnasiert Begge fokuserer på kundetilpassert informasjon Upoc.com er spasialisrt på M- commerce Bolt.com går på tvers av plattformen.

Return to Lecture Summary on Security

The E-commerce Security Environment Page 234, Figure 5.2 Copyright © 2002 Pearson Education, Inc.

Dimensions of E-commerce Security Page 235, Table 5.1 Copyright © 2002 Pearson Education, Inc.

The Tension Between Security and Other Values Ease of use The more security measures that are added to an e-commerce site, the more difficult it is to use and the slower the site becomes, hampering ease of use. Security is purchased at the price of slowing down processors and adding significantly to data storage demands. Too much security can harm profitability, while not enough can potentially put a business out of business. Copyright © 2002 Pearson Education, Inc.

Vulnerable Points in an E-commerce Environment Page 239, Figure 5.4 Copyright © 2002 Pearson Education, Inc.

Examples of Malicious Code Page 241 Table 5.2 Copyright © 2002 Pearson Education, Inc.

Tools Available to Achieve Site Security Page 247, Figure 5.5 Copyright © 2002 Pearson Education, Inc.

Public Key Cryptography - A Simple Case Page 251, Figure 5.6 Copyright © 2002 Pearson Education, Inc.

Public Key Cryptography with Digital Signatures Page 252, Figure 5.7 Copyright © 2002 Pearson Education, Inc.

Digital Certificates and Public Key Infrastructure Page 255, Figure 5.9 Copyright © 2002 Pearson Education, Inc.

Secure Negotiated Sessions Using SSL Page 259, Figure 5.10 Copyright © 2002 Pearson Education, Inc.

Securing Channels of Communications Secure Hypertext Transfer Protocol (S-HTTP) is a secure message-oriented communications protocol designed for use in conjunction with HTTP. Cannot be used to secure non-HTTP messages Virtual Private Networks (VPN) allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocol (PPTP) PPTP is an encoding mechanism that allows one local network to connect to another using the Internet as a conduit Copyright © 2002 Pearson Education, Inc.

Firewalls and Proxy Servers Page 262, Figure 5.11 Copyright © 2002 Pearson Education, Inc.

Developing an E-commerce Security Plan Page 264, Figure 5.12 Copyright © 2002 Pearson Education, Inc.