Enhance your understanding of electronic commerce. Find out how to reduce your risk of falling victim to identify theft by learning how to interact with electronic commerce sites and secure different kinds of connections.
- [Bob] Welcome to the Electronic Commerce Security course, or as some would call it, e-commerce, part of our Cybersecurity Awareness series. I am Bob Bowles, and I will be your instructor for this course. Thank you for choosing to take the time out of your busy schedule to spend the next hour with me. We all deal with e-commerce every day of our lives. I can't think of anything we do these days that does not have some facet of e-commerce. One example of using e-commerce just happened to me last week. This week I am teaching a network forensics course at a university where I teach frequently.
Having not taught this course in a few years, the textbook that was used previously had changed. Realizing that I did not have the current book, I went online to Amazon.com and found the book. For those of you that might not be familiar with Amazon.com, Amazon.com is an e-commerce website where you can find beauty supplies, clothing, jewelry, gourmet food, sporting goods, pet supplies, books, CDs, DVDs, computers, furniture, toys, garden supplies, bedding, and almost anything else you might want to buy.
The site gave me the option to purchase the book either new or used, and it even gave me the option to lease the book. Not knowing when I will teach this course again, I chose to lease the book. So I completed the online order, paid for two-day shipping, and voila, two days later and right on time, FedEx dropped the book on my front doorstep. So I will keep the text until the end of the semester and then FedEx it back to Amazon. So let's take a look at what went on behind the scenes to make all this happen.
This simple example involves Amazon's use of several additional e-business processes. These processes included an electronic search to find the book title, then an electronic procurement and payment to obtain the book from a wholesaler or another dealer, next an electronic authentication of my credit card information, electronic processing to obtain payment from a financial institution, then electronic shipping arrangements for delivery of the book, and finally an electronic customer support to email me an acknowledgment, order number, and expected delivery date.
All of this was done electronically, securely, and transparently to me. What we are going to look at in this course is to try and get a better understanding of e-commerce and its security.
This course was created and produced by Mentor Source, Inc. We are pleased to host this training in our library.