Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

LAB7

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Cyber Lab 7

1. NUR’AIN FATHIHAH BT ABD MALEK (19001526 | BM)


1. JAZLAN JUFFRY BIN NAHARUDEEN (20001925 | BM)
1. IRSYAD IZAC B MD AIZIL (19001523 | BM)
1. FIKRI AIMAN BIN ROSLAN (19001573|BM)

1. CSR Information

➢ Customer cardholder
• Organization Name: Irsyad Izac
• Email Address: izac@utp.edu.my
• Locality: Perak
• Country Name: Malaysia
• Organizational Unit: MH Dept

Irsyad Izac, the customer, will fill out the CSR information to establish a digital certificate in
order to open the account. Izac will need to fill in these personal details in order to request a
valid digital certificate. The nation, location name, organisation name, organisation unit name,
common name to be used on the certificate, and email address are all required pieces of
personal information.

2. Digital Certificate Issued by and issues to

Credit card holders, merchants, issuing banks, payment processing businesses, and public-key
certificate authority all participate in SET. Indicates the SET system's participants, which
include the following:
Customer/ Cardholder opens an account

The customer/ cardholder registers for a service. The customer opens a credit card account with
a bank that accepts electronic payments and SET, such as MasterCard or Visa.

A certificate is given to the customer.

Izac will receive her digital certificate when he opened her account, which will be when he
obtains her card. The customer's personal information, the certificate authority (CA), and the
certificate validity date are all included in the digital certificate. The CA for his certificate is
Fikri Aiman Bin Roslan, according to the digital certificate he got. This indicates that he is the
one who signed Izac's certificate.

➢ Certificate Authority (Fikri Aiman) issued certificate to Cardholder (Irsyad Izac)

Consumers and corporate buyers connect with merchants using personal computers and the
Internet in the electronic environment. A cardholder is a person who has been permitted to use
a payment card that has been provided by a company.
3. Each merchant has their own set of certificates.

A merchant who takes a specific brand of card must have two certificates for two public keys
that he or she owns: one for signing messages and the other for key exchange. A copy of the
payment gateway's public-key certificate is also required by the merchant.

The merchant has been verified. In addition to the order form, the merchant gives a copy of its
certificate to the buyer so that he or she may confirm that they are dealing with a legitimate
business.

The merchant (Lazada) must enter in their company's CSR information in order to create a
digital certificate.

4. CSR Information (Lazada)


• Organization Name :Lazada Malaysia
• Email Address: Lazada@gmail.com
• Locality: KualaLumpur
• Country NameMalaysia
• Organizational Unit : E-commerce
The merchant (Lazada) now obtains their own digital certificate after the process is done. The
digital certificate includes the personal information of the merchant (Lazada), the certificate
authority (CA), and the certificate validity date. Bank Negara is the CA for the merchant
(Lazada). This signifies that the certificate for the merchant was signed by Bank Negara
(Lazada).

5. The customer makes a purchase.

This is a procedure that may begin with the client exploring the merchant's website to select
items and assess pricing. The customer then sends the merchant a list of the products they want
to buy, and the merchant responds with an order form that includes the list of items, their prices,
a total price, and an order number.

Encryption:

Both the digital certificates possessed by the consumer and the merchant require signature and
verification from the Certificate Authority in order for them to be true and valid (CA).

Decryption:

When the CA (certificate authority) receives encrypted material, the next step is for them to
decrypt the encrypted documents so they may access or view them. To decode it, the CA will
need the correct key. It is the most effective way of concealing communication using encoded
data, in which everyone has the symmetric key to decrypt data.
6. Verified the Signature

The buyer sends the business his or her order and payment details, as well as his or her
certificate. The order indicates that the items listed on the order form have been purchased.
Credit card information is included in the payment. The payment information is encrypted so
that the merchant is unable to read it. The merchant can verify the customer using the
customer's signature.

7. Payment authorisation is requested by the merchant.

The merchant transmits the digital certificate to the acquirer, asking for approval that the
customer's available credit is sufficient for this purchase.

8. The order is confirmed by the merchant.

The customer receives an order confirmation from the vendor.

9. The items or service are provided by the merchant.

The client receives the goods or receives the service from the vendor.

10. Payment is requested by the merchant.

This request is forwarded to the payment gateway, which is in charge of the entire payment
procedure.

You might also like