Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Data Communications System By Ajarn Preecha Pangsuban.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
IS Network and Telecommunications Risks
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
Slide 5.1 Curtis/Cobham © Pearson Education Limited 2008 Chapter 5 The Internet and the World Wide Web.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Networks and Telecommunications Strategies Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
E-C OMMERCE S ECURITY Presented by SAGAR CHAKRABORTY.
Chapter 3 The Basics of Networking
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
NETWORK.
Chapter 3 Hardware, Software, and Networks Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
Some Data Comm. Standards
Networks and Networking Chapter 4 Copyright Prentice-Hall, Inc
ZData hierarchy (Figure 6.1) ybit - smallest piece of data ybyte – character yfield - group of bytes yrecord - related fields yfile - related records ydatabase.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
BUSINESS DRIVEN TECHNOLOGY Chapter Sixteen: Integrating Collaborative Partnerships.
By. Shafiq Ahmed Chachar Internet Applications Internet Relay Chat Telnet Search Engines E-Commerce File Transfer Protocol (FTP) Popular Uses of.
Extended Learning Module D
NETWORKS.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Technology Strategies for the Hospitality Industry© 2005 Pearson Education, Inc Nyheim, McFadden, & Connolly Upper Saddle River, New Jersey Networks.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 1 What is the Internet?. The Wired World of the Internet Who runs the Internet? Collection of thousands of networks RFCs, users’ agreement about.
Networking Network Classification, by there: 3 The Rules they use to exchange data: Protocols.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Lecture 13 Business and the Internet SFDV Principles of Information Systems.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Telecommunications and Networking
Electronic Commerce and the Internet Chapter 6. Chapter Objectives Describe what the Internet is and how it works Explain packet-switching and TCP/IP.
Internet Basics. What is it? RESOLUTION by The Federal Networking Council (FNC): "Internet" refers to the global information system that -- (i) is logically.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
7.1 © 2010 by Prentice Hall 4 Chapter Telecommunications, the Internet, and Wireless Technology.
CHAPTER 4 Telecommunications and Networking 1. 1.What Is a Computer Network? 2.Network Fundamentals 3.The Internet and the World Wide Web 4.Network Applications.
Introduction to Technology Infrastructure
Chapter 17 Risks, Security and Disaster Recovery
Introduction to Computers
Introduction to Technology Infrastructure
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

Chapter Seven E-Business Risks

E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business and intranets Distributed e-business and intranets Supply chain linkage Supply chain linkage Collaborative business (e.g., Web Services) Collaborative business (e.g., Web Services)

E-Business Protocols, Software, and Hardware TCP/IP TCP/IP IP addresses IP addresses Client/server architectures Client/server architectures

1 - 4 Internet Communication Standards LayerCommon Standards 5. Application layer HTTP, HTML (Web) IMAP, POP ( ) 4. Transport layer TCP 3. Network layer IP 2. Data link layer Ethernet (LAN) PPP (dial-up via modem for MAN) 1. Physical layer Category 5 twisted pair (LAN) Fiber optic cable (WAN)

The Languages of E-Business HTML HTML XML XML XBRL XBRL ebXML ebXML

Privacy Privacy vs confidentiality Privacy vs confidentiality Privacy and security trade-offs Privacy and security trade-offs Privacy policies Privacy policies Internet tracking tools Internet tracking tools

Information System Security and Availability General network and telecommunications risks and controls General network and telecommunications risks and controls Encryption – SSL, SET, S-HTTP Encryption – SSL, SET, S-HTTP Securing electronic payments Securing electronic payments Securing the web server Securing the web server System availability and reliability System availability and reliability

Transaction Integrity and Business Policies The integrity of transactions – complete, accurate, timely, authorized The integrity of transactions – complete, accurate, timely, authorized Repudiation – origin and reception non- repudiation Repudiation – origin and reception non- repudiation Digital signatures and digital certificates Digital signatures and digital certificates Electronic audit trails Electronic audit trails

Specialized E-Business Applications Electronic Data Interchange (EDI) – VAN vs web-based Electronic Data Interchange (EDI) – VAN vs web-based Collaborative Commerce Collaborative Commerce Security and Privacy – spamming, spoofing, and policies and controls Security and Privacy – spamming, spoofing, and policies and controls

Managing Third Party Providers Third-party services – ISP’s, ASP’s, certificate authorities, and electronic payment providers Third-party services – ISP’s, ASP’s, certificate authorities, and electronic payment providers Independent evaluations of third parties Independent evaluations of third parties

Third Party Assurance Services CPA Trust engagements CPA Trust engagements TRUSTe TRUSTe BBB Online BBB Online Veri-Sign Veri-Sign