390 likes | 468 Views
Chapter 1 Overview of EC. To learn the activities encompassed by e-commerce and the role of the Internet and WWW. To understand the benefits that can be achieved through the use of e-commerce. To compare various e-commerce business models.
E N D
Chapter 1 Overview of EC • To learn the activities encompassed by e-commerce and the role of the Internet and WWW. • To understand the benefits that can be achieved through the use of e-commerce. • To compare various e-commerce business models. • To examine the general nature of security concerns surrounding e-commerce.
Security Concerns • frequently cause potential Internet purchasers from buying • have made some businesses reluctant to expand their electronic commerce businesses to the web, at least into the virtual transaction space • arise for firms migrating to the web without appropriately designed sites
Chapter 3Regulatory Environment • To identify the primary legal issues surrounding web-based electronic commerce. • To understand the impact an international environment has on a country’s domestic legal framework. • To explore the relative benefits of self-regulatory practices versus government regulation
Cryptography Issues • Cryptography methods transform a message into a non-decipherable form. • This process is conducted with the use of algorithms. • In general, the key size of the encryption process reflects the strength of the algorithmic process.
Digital Signatures • The American Bar Association contends that the use of digital signatures, when performed correctly, not only meets the following criteria, but can surpass handwritten technologies: • signer authentication • document authorization • affirmative act • efficiency
Chapter Four EDI, EC and the Internet • To understand the evolution of EDI from traditional systems to fully-integrated web-based systems • Be able to differentiate EDI from financial EDI • Identify the potential benefits of web-based EDI • Understand the role of trading partners, VANs, and the necessity of standards for EDI to work properly
Electronic Data Interchange... • is the electronic exchange of business documents between trading partners using a standardized format. • Traditional EDI • High start-up costs • Used primarily by large firms • Generally, even large firms could only connect with 20% of their trading partners
Benefits of EDI Systems • Reduced purchasing lead times • Reduced errors in producing manual documents and data entry • Reduced processing costs, and • Increased inventory supply and claim processing information for customers
EDI Systems and the Internet • The Internet provides universal connectivity and it allows lower cost EDI options for small and medium sized firms • It also allows for increased sharing of information and greater tracking of marketing data
Chapter 5 Risks of Insecure Systems • To identify the risks of insecure systems faced by business trading partners and consumers • To differentiate between intranets, extranets, and the Internet and to understand their relative risks and benefits • To understand different categories of malicious code techniques that may harm an insecure system
What is risk, in the context of electronic commerce? • The possibility of loss of confidential data or the destruction, generation, or use of data or programs that physically, mentally, or financially harms another party, as well as the possibility of harm to hardware.
Risks to Customers • Malicious Web Sites • Man in the Middle Attacks • Privacy • Cookies • Party Line Connections
Risks to Selling Agents • Customer Impersonation • Denial of Service Attacks • File Upload Attacks • Sabotage by Employees • Sniffers • Downloading of Data • Email Spoofing & Social Engineering
Other Risks • Intranets vs Extranets vs Internet • Viruses • Hoaxes • Internal vs External Controls
Chapter 6 Risk Management • To understand the risk management paradigm and methodology • To differentiate between control weakness and control risk • To understand the role of internal controls in risk management • To understand the objectives of disaster recovery plans
Risk Management • The assessment of the potential for future events (which are unknowable at the present time) that can cause adverse effects; and • the implementation of cost-efficient strategies that can deal with these risks
Corrective actions CONTROL IDENTIFY MONITOR ANALYZE PLAN Tracking devices Proactive vs. reactive COMMUNICATION NETWORK Assess probabilities & prioritize Available resources assigned Lines of communication Source: Adapted from SEI’s Risk Management Paradigm
Internal Enterprise Level Risks • disruption in information processing operation • ineffective personnel hiring and training practices • change in management responsibilities • inadequate access controls to assets by employees • an unassertive or ineffective top management or audit committee
Five Internal Control Elements • Integrity, ethical values and competence - tone at the top and personnel skills sets • Directives by the Board of Directors or Audit Committee and the attention given by them to control matters • Management’s philosophy and operating style- cautious or impulsive • Assignment of authority and responsibility - formal vs. informal - appropriate alignment • Human resources policies and practices - scrutiny of employees
Disaster Recovery Plans • No one that is a victim of a disaster ever wakes up the morning of the disaster and says: • I think our server will go down because one of the technicians will make an error today • I think our building will have fire damage because of an unknown wiring problem • I think our telecommunications devices will not work today because of an ice storm
External Enterprise Level Risks • new technological developments • new marketing strategies of competitors • unfavorable regulatory changes • natural disasters • unfavorable economic environment and foreign markets
Chapter 7 Internet Standards & Protocols • To understand the necessity of standards. • To understand the impact that the global environment has on standard setting processes. • To identify the seven layers in the Open Systems Interconnections Model. • To identify common Internet protocols and languages.
OSI Model APPLICATION LAYER PRESENTATION LAYER SESSION LAYER TRANSPORT LAYER NETWORK LAYER DATA LINK LAYER PHYSICAL LAYER UPPER LAYERS LOWER LAYERS
Chapter 8 Cryptography & Authentication • To understand and compare alternative encryption techniques • To understand the role of certificate authorities in key management • To identify important key management tasks
SECURITY ISSUE SECURITY OBJECTIVE SECURITY TECHNIQUES Confidentiality Privacy of Message Encryption Message Integrity Detecting Message Hashing (Digest) Tampering Authentication Origin Verification Digital Signatures Challenge-response Passwords Biometric Devices Non-repudiation Proof of Origin, Receipt, Digital Signatures and Contents Transaction Certificates Time Stamps Confirmation Services Bi-Directional Hashing Access Controls Limiting entry to Firewalls authorized users Passwords Biometric devices
Encryption…. • Is the best device for ensuring message confidentiality • involves transforming cleartext into ciphertext • the level of secrecy is a function of • strength of the algorithm • key length • key management policies
Chapter 9 Firewalls • To learn the TCP/IP and OSI models. • To understand the underlying components of firewalls, including their benefits and limitations. • To learn important factors to consider in designing a firewall.
Characteristics of Good Firewalls • All traffic from inside the corporate network to outside the network, and vice-versa, must pass through it; • Only authorized traffic, as defined by the security policy, is allowed to pass through it; and • the system itself is immune to penetration. Cheswick and Belloven, 1994
TCP/IP MODEL OSI MODEL APPLICATION APPLICATION PRESENTATION SESSION TRANSPORT TRANSPORT INTERNET (IP) NETWORK NETWORK INTERFACE DATA LINK PHYSICAL
Chapter 10 Electronic Payment Mechanisms • To distinguish between alternative electronic payment mechanisms • To understand the underlying structure of the SET protocol and how it is different from SSL • To understand the role of certificate authorities in electronic payment processes
Set vs. SSL FEATURE SET SSL Secure Transmission of Data Yes Yes Identify Authorized Purchasers Yes No Verify Validity of Account Yes No Identify Legitimate of Payment Brand for Merchants Yes No Track Sales Slips and Totals Yes No Validate Merchant’s Credit Policy Yes No
Chapter 11 Intelligent Agents • To understand the nature of intelligent agents and agent societies. • To identify potential applications of agent technologies. • To understand the limitations of agent technologies.
Issue Commands Display Results Monitor stock Issue Commands & Delegate Tasks (monitor XXX stock price) Agents Agents Agents Share Results (XXX price dropped 1 point) Request advice or input (purchase stock?) Agents Social Interaction Cooperation & Negotiation Ability to act autonomously, Respond to environment, Adapt to “perceived” Changes in environment, and Determine new or different tasks that need to be performed Agents
Predictive/ProactiveAgent ServicePerformingAgent GopherAgent
How can intelligent agents impact electronic commerce? • gather product and pricing information • monitor the environment • more greatly customize services • reduce negotiation cycle time • allow around around the clock business
Chapter 12 Web-based Marketing • To understand the impact of the WWW on business and marketing strategies. • To apply the four marketing “Ps” to the WWW. • To understand the importance of personalisation. • To learn and categorise Internet marketing techniques.
Information Systems & Technology Mission and Goals Marketing Mission and Goals Web-based E-Commerce Mission and Goals Web-based E-Commerce Plan Environmental Changes Environmental Changes Corporate Mission and Goals
PASSIVE AGGRESSIVE Initiative Providers of information Site registration with multiple search engines Targeted e-mail to users requesting periodic sales and information notices Targeted services to users requesting such services Interactive site providing visitors with general, useful information Banner advertising Television, magazine & other off-line advertising Targeted e-mail to past visitors or customers Spam mail Chain-mail advertising, with a potential reward for perpetuating the chain
THANK YOU!It was a pleasure Teaching You Good Luck in the Exams and for those of you who are finishing this year Best Wishes for the Future.