1 Three things about e-Business Chris Avram Computer Science and Software Engineering Monash University.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Chapter 1 The Study of Body Function Image PowerPoint
© UNCTAD End. © UNCTAD End Direct Trader Input A short description of how Direct Trader Input ( DTI) is implemented using the ASYCUDA ++
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Introduction to HTML, XHTML, and CSS
Intermediate 2 Computing
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Communicating over the Network
Chador Wangdi Page 1of15. Analog (up to 56k/ dial up access) Using a modem connected to your PC, users connect to the internet when the computer dials.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
1 Chapter One Introduction to Computer Networks and Data Communications.
Gold Country Computer Learning Center March 2006 Is Wireless for You? Roger Thornburn.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Authentication Applications
1 Authentication Applications Ola Flygt Växjö University, Sweden
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
© 2012 National Heart Foundation of Australia. Slide 2.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Getting Started with D2A
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Services Course Windows Live SkyDrive Participant Guide.
Executional Architecture
Getting Familiar with Web Pages 1 2 The Internet Worldwide collection of interconnected computer networks that enables businesses, organizations, governments,
1 Early Intervention Central Billing Office Electronic Claims Submission.
The Internet–Illustrated Introductory, Fourth Edition
25 seconds left…...
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Services Course Windows Live SkyDrive Participant Guide.
REGISTRATION OF STUDENTS Master Settings STUDENT INFORMATION PRABANDHAK DEFINE FEE STRUCTURE FEE COLLECTION Attendance Management REPORTS Architecture.
20&27 May Agenda 1.Highlight the difference between system flow of e- Invoice and paper invoice – 15 minutes 2.Demonstrate the operation procedure.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
S3 Computer Literacy Internet Technology.
Cryptography and Network Security
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Technology Infrastructure: The Internet and the World Wide Web
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
Internet Security Terms and Techniques Chris Avram Faculty of Information Technology Monash University 1U-Cubed ‘99Chris Avram.
Chapter 8 Web Security.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Lesson 2 — The Internet and the World Wide Web
Transfer of data in ICT systems This section covers: Elements of a network Characteristics of a network Communication of data and use of communication.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Part 2.  Transmission methods used  Bandwidth:  The speed at which Data can be carried.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
The Internet. The Internet and Systems that Use It Internet –A group of computer networks that encircle the entire globe –Began in 1969 Protocol –Language.
Chapter 1 Introduction to Networking
Wednesday, September 19, 2018 What Is the Internet?
Cryptography and Network Security
Presentation transcript:

1 Three things about e-Business Chris Avram Computer Science and Software Engineering Monash University

e-Business tech talk Chris AvramE-Bus 2 Agenda u Security - safe enough at this speed u B2C - usability - the three Ss –speed of transfer –speed of response –more speed u Mobile technologies - futures –wireless LAN, WAP, GPS

e-Business tech talk Chris AvramE-Bus 3 Security is u Confidentiality –only those authorised have access to data u Authentication – the identity claimed can be verified u Availability –access is available as and when required u Integrity –information is modified only as it should be

e-Business tech talk Chris AvramE-Bus 4 Security is needed for u Legal and ethical need –OECD privacy guidelines –Australian privacy act and commission –OECD guidelines for security of information u Technical need –e-Business –public networks –packet switched networks u Customer confidence

e-Business tech talk Chris AvramE-Bus 5 Internet strategy u Local area network u Wide area network u Internet - global network –customer/client access –inter-organisation systems u Intranet –Internet technology for WAN

e-Business tech talk Chris AvramE-Bus 6 The networked organisation LAN Internet customers LAN SOHO Legend Another organisation Secure line Insecure

e-Business tech talk Chris AvramE-Bus 7 Outdated security measures u Passwords to identify users/clients –access restricted to logged on users –Netware, NT encrypt passwords –eaves dropping on other P/Ws possible u Physical access controls –guarantees server identity –reduces electronic eaves dropping u Typical of EDI service providers services

e-Business tech talk Chris AvramE-Bus 8 Threats u Impersonation –of clients –of servers u Passive electronic eaves dropping u Modification of information in transit u Traffic analysis u Denial of service

e-Business tech talk Chris AvramE-Bus 9 Current security measures u Public key crypto-systems –allow electronic signature and verification –allow confidential exchange of information u Certificates –signed by a certificate authority (CA) –proof of identity »containing a public key u SSL (for WWW), pgp, s/mime (for )

e-Business tech talk Chris AvramE-Bus 10 Public key crypto-systems Send message Receive message Secret key Public key Public key directory Make Keys Eavesdropper

e-Business tech talk Chris AvramE-Bus 11 Public key signature-systems Sign message Check signature Secret key Public key Public key directory Make Keys Fraudster clear

e-Business tech talk Chris AvramE-Bus 12 Certificates Certificate Authority Client Server Signed server certificate Signed server certificate CA public key Source Certificate request

e-Business tech talk Chris AvramE-Bus 13 Secure links ClientServer Info. Request Certificate eg. Visa number time eg. fee for service info.

e-Business tech talk Chris AvramE-Bus 14 Certificate authorities - Public u Public CAs –Australia Post –RSADSI –AT&T  Customers will get browsers with CA certificates included  $US250 per server per annum 

e-Business tech talk Chris AvramE-Bus 15 Certificate authorities - Private u Software from »Netscape »Microsoft »public domain u Organisation –chooses level of proof of identity –makes CA certificates available, manages revocation list   No ongoing fees

e-Business tech talk Chris AvramE-Bus 16 Recommendation u If a large organisation plans to use the Internet for more than the distribution of public information –eg. selling, collecting $ or personals, customer confidential communications u Then it should consider running a private certificate authority: –1. Create a secure version of your WWW server –2. Install CA software –3. Begin testing with selected mobile staff... u Small organisations should use a service provider

e-Business tech talk Chris AvramE-Bus 17 Reference u RSA DSI u CA demo u Secure servers –Netscape –Apache –Microsoft u SSL capable WWW client Netscape 2.02 or later; IE u This file is

e-Business tech talk Chris AvramE-Bus 18 B2C - usability - the three Ss u The Internet delivers data u Measured in bits, carried in files –file format, coding –file compression –Netscape; View; Page Info shows details u Data transfer time is a function of file size and transfer speed (in bits per second) u Response time?

e-Business tech talk Chris AvramE-Bus 19 Customer premises equipment u PC to Modem to phone line33,000 bits/s u PC to Mobile phone 9,600 bps u PC to “Broadband” 500,000 bps – –Cable modem to Cable TV network –ADSL to exchange –Satellite dish to S. & Modem to phone u PC to ISDN TA to exchange64,000 bps u WAP 9,600 bps

e-Business tech talk Chris AvramE-Bus 20 Speed of transfer & Response ClientServer Info. Request 1 File 1 sent time Server response time Info. Request 2 Server response time File 2 sent Info. Request 3 WWW page in 3 parts File 1 transfer time

e-Business tech talk Chris AvramE-Bus 21 Usability - the three Ss u Time to display a page is the sum of the component transfer times (total information to be sent) PLUS one average response time per component u look at some poorly designed pages - –too many files, one image or clickable map would be better »use Netscape; View; Page Info »

e-Business tech talk Chris AvramE-Bus 22 Internet at home and about

e-Business tech talk Chris AvramE-Bus 23 Reference u Telstra Bigpond Broadband u Tesltra Bigpond Home Internet u Usability sources –I like vodo usability –I like why test 5 –I like the need for speed u This file is

e-Business tech talk Chris AvramE-Bus 24 Mobile technologies - futures u Internet anywhere –wireless LAN –WAP –PDA –Mobile phone u Location based services –GPS

e-Business tech talk Chris AvramE-Bus 25 wireless LAN u Range 400 m, office floor u Can be linked: “campus” wide mobility u Like the move to mobile phones, lower building operation costs, no fixed wires (well power still needed) u Little effect on e-Business

e-Business tech talk Chris AvramE-Bus 26 WAP u Wireless Application Protocol u Mobile phone small screen based Internet web browsing, charged by the minute u SMS short messages very popular for person to person messages; pager function over SMS popular; usability testing shows WAP has a long way to go u Little short term effect on e-Bus, may be 3 years before it has any

e-Business tech talk Chris AvramE-Bus 27 PDA u Speculation is that PDAs will become phones (hands free), screen size still a problem, at least wont have the ear to eye flipping u Notebooks with built in phones, now that’s for me u Need the next generation of network to get the speed up look at phone Internet demo...

e-Business tech talk Chris AvramE-Bus 28 Mobile phone u Mobile phone connected to notebook, see the previous slide u Notebook/PDA/Phone convergence with the new networks over three years away in Australia u This is the state of the art in mobile Internet, plan for it at 9,600 bits/sec u A web page design/usability issue

e-Business tech talk Chris AvramE-Bus 29 GPS u $US 15,000,000,000 per year business u Transport applications –dynamic dispatch u Precision Agriculture u In 5 years, sub decimetre location in the open

e-Business tech talk Chris AvramE-Bus 30 Reference u GPS u This file is