Q50929 What are the Components of Effective Electronic Payment system?

Best for Jain Assignment Solution and others

Answer:

The components of Electronic Payment system are described as below in details:

(1). Computer Network:

  • A computer network is a group of interconnected computers. Network s maybe classified according to a wide variety of characteristics.
  • Based on their scale, networks can be classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), etc.
  • Computer networks can also be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such as Optical fibre, Ethernet, Wireless LAN, Home PNA, or Power line communication. Ethernet uses physical wiring to connect devices. Frequently deployed devices include hubs, switches, bridges and/or routers.
  • Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium. Computer networks maybe classified according to the functional relationships which exist among the elements of the network, e.g., Active Networking, Client-server and Peer-to-peer (workgroup) architecture.
  • Computer networks may be classified according to the network topology upon which the network is based, such as Bus network, Star network, Ring network, Mesh network, Star-bus network.
  • Tree or Hierarchical topology network, Network Topology signifies the way n which devices in the network see their logical relations to one another. The use of the term “logical” here is significant.
  • That is, network topology is independent of the “physical” layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a Bus Topology, in this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout.

(2).   Internet:

  • The Internet is a specific internet work. It consists of a worldwide incoming connection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite.
  • It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of Defense.
  • The internet is also the communications backbone underlying the World Wide Web (WWW).
  • The ‘Internet’ is most commonly spelled with a capital ‘I’ as a proper noun, for historical reasons and to distinguish it from other generic internet works.
  • Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol
  • Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries.
  • Service providers and large enterprises exchange information about the reach ability of their address spaces through the [Border Gateway Protocol] (BGP), forming a redundant worldwide mesh of transmission paths.

(3).   Basic Hardware Components:

  • All networks are made up of basic hardware bà11ing blocks to interconnect network nodes, such as Network Interface Cards
  • (NICs), Bridges, Hubs, Switches, and Routers.
  • In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable.
  • Less common are microwave links (as in IEEE 802.11) or optical cable (“optical fibre”).

(4).   Network Interface Cards

  • A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network.
  • It provides physical access to a networking medium and often ‘provides a low-level addressing system through the use of MAC addresses.
  • It allows users to connect to each other either by using cables or wirelessly.

(5).   Repeater

  • Repeater is an electronic device that receives a signal and retransmits it at a higher rate, or to the other side of an obstruction, so that the signal can cover longer distances without degradation.
  • In most twisted pair Ethernet configurations, repeaters are required for cable runs longer than 100 meters away from the computer.

(6).  Hubs

  • A Hub contains multiple ports.
  • When a packet arrives at one port, it is copied to all the ports of the hub for transmission.
  • When the packets are copied, the destination address in the frame does not change to a broadcast address.
  • It simply copies the data to all of the Nodes connected to the hub.

(7).   Bridges

  • Network Bridge connects multiple network segments at the data link layer (layer 2) of the OSI model.
  • Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports.
  • Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received.
  • Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports.
  • Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port.
  • The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

  1. Local bridges: Directly connect local area networks (LANs)
  2. Remote bridges: Can be used to create a wide area network (WAN) link between

LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced by routers.

  1. Wireless bridges: Can be used to join LANs or connect remote stations to LANs.

(8).   Switches

  • A switch is a device that performs switching. Specifically, it forwards and filters
  • OSI layer 2 data grams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets.
  • This is distinct from a hub in that it only forwards the datagram to the ports involved in the communications rather than all ports connected.
  • Strictly speaking, a switch is not capable of routing traffic based on IP address (layer 3) which is necessary for communicating between network segments or within a large or complex LAN.
  • Some switches are capable of routing based on IP addresses but are still called switches as a marketing term.
  • A switch normally has numerous ports, with the intention being that most or the entire network is connected directly to the switch, or another switch that is in. turn connected to a switch.
  • Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier).
  • Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end).
  • A device that operates simultaneously at more than one of these layers is called a multilayer switch.

(9).   Routers

  • Routers are networking devices that forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets.
  • Routers work at the network layer of the TCP/IP model or layer 3 of the OSI model.
  • Routers also provide interconnectivity between like and unlike media (RFC 1810).
  • This is accomplished by examining the Header of a data packet, and making a decision on the next hop to which it should be sent (RFC 1810).
  • They use preconfigured static routes, status of their hardware interfaces, and routing protocols to select the best route between any two subnets.
  • A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network.
  • Some DSL and cable modems, for home (and even office) use, have been integrated with routers to allow multiple home/office computers to access the Internet through the same connection.
  • Many of these new devices also consist of wireless access points (waps) or wireless routers to allow for IEEE 802.1 lg /b wireless enabled devices to connect to the network’ without the need for cabled connections.

A.    E-Security

While there are benefits associated with the widespread popularity of the Internet and ever-increasing growth rate of the computers being connected to it, there is a down side too. The task of protection of the data and information stored in the computers and travelling across the Internet has never been so challenging. Computer and Internet Security, therefore, has become a specialized area in itself. The internet provides great opportunities for business to reach new markets and more customers than ever before, but unfortunately, with those opportunities come some e-security risks. When online, unwanted intruders can:

  • Install malicious software such as spyware and viruses, which can steal sensitive business information as well as slow down your computer.
  • Intercept financial transactions, steal credit card details and access customer information.
  • Steal your download limit without your knowledge and at your cost.
  • Take over your website and modify it.
  • Steal sensitive business information from your business by using a portable device such as a USB.

E Security Computer and Internet Security Services is a modest effort to provide professional services to the Internet community, especially that of GNSE Group. We offer a broad array of services.

21 8 image 89

Definition

According to G.S.Gill

“E-security refers to the process of ensuring the confidentiality, integrity, and availability of electronic information and protecting it against malicious attackers who could use or alter the information to disrupt critical national infrastructure and industry.”

Security is of prime importance for conducting e-business. It is important to know few measures that organizations can employ to enable secure e-business transactions. Cryptography is one of the measures. It is the art and science of encrypting and decrypting data under secret keys for the purpose of secrecy or authenticity. It facilitates the secure storage and transmission of critical data in an insecure network. PKI also ensures the security of communication and transfer of critical information through the Internet. It involves the use of digital certificates and CA ,digital signatures and secure channels. E-Business can be conducted by the use of two different payment systems, namely, stored account payment system and SAPS. The stored account payment system involves the existing electronic payment system like that of a credit card system or a debit card system. The SAPS replaces cash with e-cash. E-Cash is a way of accepting payment over the Internet in which the currency is converted into its digital equivalent. Finally, the chapter talks about acceptable use policy which is an agreement that covers certain rules and principles that govern the fair use of Internet service. Indian companies mainly use firewalls as a security measure to prevent unwanted traffic from permeating the walls of the network. Two approaches that ensure protection from e-mail related threats are the proxy approach and the appliance approach. In the former approach, e-mail filtering tools acts only as a web content filtering tool blocking the e-mail websites and not the e-mail itself. Appliance approach involves the installation of e-mail filtering tools in line with several e-mail servers.

Both unacceptable e-mails and attachments are blocked in this approach. The assessment of an e-mail filtering solution is done based on its extent of integration, review of its actual working mechanism and reporting features. Web bug is a technology that helps in tracing the path of an e-mail and knowing if the e- mail has been checked and further forwarded or not. Security issues that earlier confronted computer systems are making wireless devices like PDAs, palm tops and cell phones their victims. Phishing and

Pharming are two forms of identity theft. Phishing is a fraudster campaign that makes the recipients of an e- mail disclose sensitive personal information like log-on IDs and account numbers. This kind of attack is activated when users click on a link in the e-mail message. A pharming attack involves redirecting recipients of messages to look alike websites. Layered security approach is one of the most reliable Internet security approaches. It provides protection at five important access levels – the perimeter, the network hub, the host file, the network application, and the stored data. A protection system should comprise three components

— IDS/IPS software, VMS and an endpoint compliance policy. Sender ID framework and Domain Keys are two recent developments developed for enhanced security with e-mails.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.