Web-based E-commerce Architecture

Slides:



Advertisements
Similar presentations
DT228/3 Web Development WWW and Client server model.
Advertisements

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
IS Network and Telecommunications Risks
1 CS 502: Computing Methods for Digital Libraries Lecture 22 Web browsers.
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
EMTM 553 Electronic Commerce Systems
Introduction to Web Base Multimedia Application. Web base application TCP/IP (HTTP) protocol Using WWW technology & software Distributed environment.
Introduction to Web Based Application. Web-based application TCP/IP (HTTP) protocol Using WWW technology & software Distributed environment.
EMTM 553 Electronic Commerce Systems
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Introduction to Internet & Web1 Chapter 1: Introduction to Internet & Web Objectives: –To show the developments of Internet and its protocols from a historical.
Building E-Commerce and E-Learning Models Hassanin M. Al-Barhamtoshy
July 16 th, 2005 Software Architecture in Practice RiSE’s Seminars Bass’s at all Book :: Chapters 13 Fred Durão.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Web application architecture
Introduction to Cyberspace
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Module 1: Introduction to Windows Clustering. Overview Defining Clustering Features Introducing Application Architecture Identifying Availability and.
E-Business & Web Technology - 1 © Minder Chen, IT Architectures Minder Chen, Ph.D. Associate Professor of ISOM George Mason University Fairfax,
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Introduction to Internet Programming (Web Based Application)
Internet, intranet, and multimedia database processing l Database processing across local and wide area networks l Alternative architectures for distributing.
11/16/2012ISC329 Isabelle Bichindaritz1 Web Database Application Development.
1999 Final Year Projects Prof. Michael R. Lyu. Lyu9901: TravelNet Design a Web-based travel manager to reserve airplane tickets and hotel. A distributed.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
WEB SCIENCE. What is the difference between the Internet and the World Wide Web? Internet is the entire network of connected computers and routers used.
Security and Ethics Privacy Employment Health Crime Working
IS Network and Telecommunications Risks Chapter Six.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Schedule Introduction to Web & Database Integration Tools and Resources HTML and Styles Forms and Client-Side Scripts DB Engines Forms Processing and Server-Side.
March 24, 2004Craig E. Ward, CMSI 698 Advanced Topics in Database Systems Database Architecture Overview Client-Server and Distributed Architectures.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Web Server.
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Internet Infrastructure Min Ding Smeal College of Business Administration Pennsylvania State University.
It’s World Wide! I NTRODUCTION TO T HE WEB 1 Photo courtesy:
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
Electronic Commerce Semester 1 Term 1 Lecture 7. Introduction to the Web The Internet supports a variety of important tools, such as file transfer, electronic.
Overview Web Technologies Computing Science Thompson Rivers University.
SECURITY IN MOBILE NETWORKS Bharat Bhargava CERIAS and Computer Sciences Departments Purdue University, W. Lafayette, IN Supported.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
2 Copyright © Oracle Corporation, All rights reserved. Basic Oracle Net Architecture.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
Protocols and networks in the TCP/IP model initially.
Web Development & Design Chapter 1, Sections 4, 5 & 6
Computer Network.
EMTM 553 Electronic Commerce Systems
Networking and Security Issues in Digital Library
EMTM 553 Electronic Commerce Systems
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Computer Network.
الانترنت والبريد الإلكتروني
Unit 36: Internet Server Management
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
KNOWLEDGE MANAGEMENT (KM) Session # 34
WJEC GCSE Computer Science
Presentation transcript:

Web-based E-commerce Architecture

Web-based E-commerce Architecture

E-commerce Technologies Internet Mobile technologies Web architecture Component programming Data exchange Multimedia Search engines Data mining Intelligent agents Access security Cryptographic security Watermarking Payment systems

Infrastructure for E-commerce The Internet system of interconnected networks that spans the globe routers, TCP/IP, firewalls, network infrastructure, network protocols The World Wide Web (WWW) part of the Internet and allows users to share information with an easy-to-use interface Web browsers, web servers, HTTP, HTML Web architecture Client/server model N-tier architecture; e.g, web servers, application servers, database servers

E-Commerce Software Content Transport Server Components pull, push, web-caching, MIME Server Components CGI, server-side scripting Programming Clients Sessions and Cookies Object Technology CORBA, COM, Java Beans/RMI Technology of Fulfillment of Digital Goods Secure and fail-safe delivery, rights management

System Design Issues Good architectural properties Functional separation Performance Secure Reliable Available Scalable

Security Concerns about security Client security issues Server security issues Security policy, risk assessment Authentication methods Something you know: passwords Something you have: smart card Something you are: biometrics Firewalls, proxy servers, intrusion detection Denial of service (DOS) attacks, viruses, worms

Terimakasih www.amikom.ac.id www.jogjaweb.com Source : Insup Lee Department of Computer and Information Science University of Pennsylvania www.amikom.ac.id www.jogjaweb.com