1 Pertemuan 7 Sistem Keamanan dalam e-Bisnis Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.

Slides:



Advertisements
Similar presentations
1 Pertemuan 3 Business to Business (B2B) Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
Advertisements

Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
1 Pertemuan 04 Proxy/Cache Matakuliah: H0491/Praktikum Jaringan Komputer Tahun: 2005 Versi: 1/0.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
1 Pertemuan 9 e-Bisnis dalam Industri Jasa Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Cryptography and Network Security Chapter 17
1 Pertemuan 23 Layer Transport Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Pertemuan 06 Kriptografi tradisional Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Minggu 7, Pertemuan 13 Security Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
1 Pertemuan 12 Strategi dan Implementasi e-Bisnis Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
1 Pertemuan 6 Transaksi Dokumen dan pembayaran Elektronik Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 10 e-Bisnis dalam Industri Retail Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
1 Pertemuan 4 Understanding e-Marketplaces Matakuliah: J0324 / Sistem e-Bisnis Tahun: 2005 Versi: 02/02.
1 Pertemuan 5 Model Transaksi e-Commerce Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 8 Web Security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
1 Chapter 3 Infrastructure for Electronic Commerce FEB: EBS 2053 Facilitator: Puan Asleena Helmi (06/07/01)
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Streaming Media A technique for transferring data on the Internet so it can be processed as a steady and continuous stream.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Network Security Celia Li Computer Science and Engineering York University.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Cryptography and Network Security
PREPARED BY: RUMMY MIRANDA
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Secure Electronic Transaction (SET) University of Windsor
Electronic Payment Security Technologies
Presentation transcript:

1 Pertemuan 7 Sistem Keamanan dalam e-Bisnis Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1

2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Menjelaskan sistem keamanan dalam e- bisnis

3 Outline Materi Pengamanan Internet Penjualan di Web Multimedia delivery

4 Internet Network Architecture NAP ISP Backbone © Prentice Hall, 2000

5 Internet Security Authenticity –the sender (either client or server) of a message is who he, she or it claims to be Privacy –the contents of a message are secret and only known to the sender and receiver Integrity –the contents of a message are not modified (intentionally or accidentally) during transmission Non-repudiation –the sender of a message cannot deny that he, she or it actually sent the message

6 Message Text Ciphered Text Message Text SenderReceiver EncryptionDecryption Private Key Private Key Encryption ( Symmetrical Key Encryption ) Data Encryption Standard (DES) is the most widely used symmetrical encryption algorithm Encryption

7 Message Text Ciphered Text Message Text SenderReceiver EncryptionDecryption Public Key of Recipient Private Key of Recipient –Public Key Encryption (As ymmetrical Key Encryption ) Encryption (cont.)

8 –Digital Envelope — combination of symmetrical and public key encryption Message Text Ciphered Text Message Text SenderReceiver EncryptionDecryption Session Key Public key of Recipient Public key of Recipient Session Key Digital Envelop Encryption (cont.)

9 Message Text Message Text SenderReceiver EncryptionDecryption Public Key of Recipient Private Key of Recipient –Digital Signatures : Authenticity and Non-Denial Signature Private Key of Sender Public Key of Sender Ciphered Text Encryption (cont.)

10 Penjualan di Web Function Requirements for an Electronic Storefront –Search for, discover, and compare products for purchase –Select a product to be purchased and negotiate or determine its total price –Place an order for desired products –Have their order confirmed, ensuring that the desired product is available –Pay for the ordered products (usually through some form of credit) –Verify their credit and approve their purchase –Have orders processed –Verify that the product has been shipped –Request post-sales support or provide feedback to the seller

11 Electronic storefront must contain: –A merchant system or storefront that provides the merchant’s catalog with products, prices and promotions –A transaction system for processing orders and payments and other aspects of the transaction –A payment gateway that routes payments through existing financial systems primarily for the purpose of credit card authorization and settlement Penjualan di Web

12 Multimedia Delivery Webcasting— describes Internet-based broadcasting of audio and video content –Types of Webcasts Text Streams— Text-only wordcasts and datacasts –to deliver constant news and stock price updates Ambient Webcasts— Video content –is captured from a Webcam and delivered as single-frame updates that are transmitted at periodic intervals Streaming Audio— Web equivalent of radio –to deliver everything from talk radio to sports broadcasts to music previews to archived music and radio shows Streaming Video –to deliver videoconferences where high quality images are not required and there is not much movement among participants

13 Works in a straightforward way Examples of companies offering both Webcast servers and players –RealNetworks ( ) –Liquid Audio ( ) –Xingtech with its streamworks technology ( ) –Apple with its QuickTime system ( quicktime.apple.com )quicktime.apple.com –Microsoft with its Netshow software ( ) Multicasting –stream a Webcast from a central server to other media servers which are distributed to different locations –when a listener or viewer clicks on a Webcast link they are automatically routed to the closest server Webcasting