1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008.

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Unit 28- Website Development Assignment 1- THEORY P3
E-Commerce Security and Fraud Issues and Protections
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Information Security in an Introductory Course. Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering.
Internet Security facilities for secure communication.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Computer Security, Ethics and Privacy Chapter 11.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
COPYRIGHTS: In law, the exclusive right to produce copies and to control an original literary, musical, or artistic work, granted by law for a specified.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
E-commerceEssentials Kenneth C. Laudon Carol Guercio Traver first edition Copyright © 2014 Pearson Education, Inc.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
1 'According to the 2007 Internet Crime Report, Internet Crime Complaint Center (IC3) received 206,884 complaints of Internet crimes More than 90,000.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 Introduction to Computing  Computer Programming  Terrorisom.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
ICOM 5995 (crypto) - Noack Crypto - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus.uprm.edu/~noack/ Make.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
1 C23 - April Business 54 - Introduction to eCommerce Spring 2008.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
1 Host versus Network Security Steven M. Bellovin
Information Systems Week 7 Securing Information Systems.
Any criminal action perpetrated primarily through the use of a computer.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Securing Information Systems
Lecture 5. Security Threats
Securing Information Systems
Securing Information Systems
– Communication Technology in a Changing World
Week 7 Securing Information Systems
ISNE101 Dr. Ken Cosh Week 13.
Securing Information Systems
Staying safe on the internet
E-Commerce Security and Fraud Issues and Protections
برنامج أمن أنظمة الحاسب
Prepared By : Binay Tiwari
Chapter 9 E-Commerce Security and Fraud Protection
Introduction to Cybercrime and Security
Presentation transcript:

1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

2 Class Game Plan C12 - March 19, 2008  Post-break Assignments Due.  Internet Security.  Lab Time – What is my IP?

3 C12 - March 19, 2008 Basic of Internet Security  It’s still the Wild, Wild West out there.  Scams are real.  IP theft is real.  Spam is real.  Solution exists.  And they start with exercising some Common Sense!

4 C12 - March 19, 2008 Basic of Internet Security  Why is there a problem?  No different than the Offline World PLUS…...  The web is international in scope.  Difficult to get agreement.  Desire not to cause ’purchase friction”.  Unaware consumers.  Arms Race.  The Mystique and Appeal of Hacking & Hackers.

5 C12 - March 19, 2008 Basic of Internet Security  Hacking vs. Crimes.  Types of Hacking / Security Breaches:  Pfishing.  Spoofing.  Shuffling.  Snooping.  Sniffing.  Trojans.  Worms.  Viruses.  Zombies.

6 C12 - March 19, 2008 Basics of Internet Security Confidentiality Availability Integrity

7 C12 - March 19, 2008 Basic of Internet Security Confidentiality Availability Integrity Authentication Authorization Non-Repudiation

8 C12 - March 19, 2008 Basic of Internet Security  Denial of Service / The Ping of Death.  Spyware.  Malware.  Cookies.  Open Source.  Spam.

9 C12 - March 19, 2008 Defenses  Firewalls. .Scanning Software.  Spam Blockers.  SLL.  HTTPS.  Ways to Encrypt:  Algorithmic / Caesarean Ciphers.  Book Ciphers.  Physical Security.  Bio-Metric Security.  Honey Pots.

10 C12 - March 19, 2008 Questions…… (and maybe some) Answers

11 C12 - March 19, 2008 Lab Time Go to Browse the site. What do you think?