E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Slide 5.1 Curtis/Cobham © Pearson Education Limited 2008 Chapter 5 The Internet and the World Wide Web.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Chapter 19 Security.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
Kittiphan Techakittiroj (24/08/58 22:49 น. 24/08/58 22:49 น. 24/08/58 22:49 น.) Digital Certification Kittiphan Techakittiroj
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
E-C OMMERCE S ECURITY Presented by SAGAR CHAKRABORTY.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Internet Security for Small & Medium Business Week 6
Chapter 10 Developing a Web-Based Online Shopping Application (I)
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
BUSINESS DRIVEN TECHNOLOGY Chapter Sixteen: Integrating Collaborative Partnerships.
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
7/19: Internet & eCommerce How companies use the Internet –Collaboration (internal & external) –Communication (internal & external): , etc. –Gather.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Lecture 13 Business and the Internet SFDV Principles of Information Systems.
Web Portals Web portal- a "cyber door" on the web that you can enter to customize its contents. This is a starting point for web surfers. You can customize.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at
Chapter 17: Information Management in Treasury Outline: Basics of E-Commerce EDI Infrastructure Treasury Management Systems (TMSes) Other Issues in Treasury.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
ACCOUNTING INFORMATION SYSTEMS
Electronic Commerce Systems
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
BY GAWARE S.R. DEPT.OF COMP.SCI
Computer-Based Processing: Developing an Audit Assessment Approach
Secure Electronic Transaction (SET)
Chapter 5 Electronic Commerce | Security
Review Exam 2.
Electronic Payment Security Technologies
Module 4 System and Application Security
Presentation transcript:

E-Business Risks Chapter Seven

E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative business

E-Business Protocols, Software, and Hardware TCP/IP IP addresses Client/server architectures

The Languages of E-Business HTML XML XBRL ebXML

Privacy Privacy vs confidentiality Privacy and security trade-offs Privacy policies Internet tracking tools

Information System Security and Availability General network and telecommunications risks and controls Encryption – SSL, SET, S-HTTP Securing electronic payments Securing the web server System availability and reliability

Transaction Integrity and Business Policies The integrity of transactions – complete, accurate, timely, authorized Repudiation – origin and reception non-repudiation Digital signatures and digital certificates Electronic audit trails

Specialized E-Business Applications Electronic Data Interchange (EDI) – VAN vs web-based Collaborative Commerce Security and Privacy – spamming, spoofing, and e- mail policies and controls

Managing Third Party Providers Third-party services – ISP’s, ASP’s, certificate authorities, and electronic payment providers Independent evaluations of third parties

Third Party Assurance Services CPA Trust engagements TRUSTe BBB Online Veri-Sign