E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;

Slides:



Advertisements
Similar presentations
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Advertisements

IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Security+ Guide to Network Security Fundamentals
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
E-Commerce Security Brett Hinshaw Kevin Hooker Jeff Hunter Shane Worrell.
Unit 28- Website Development Assignment 1- THEORY P3
What do you know about E-commerce?. EC: E-commerce  Electronic Commerce  Business-to-business  Business-to-consumer  Business-to-government  Consumer-to-consumer.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Discovering Computers 2010
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Unit 19 INTERNET SECURITY
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Index Definition E-commerce : is the buying and selling of goods and services on the Internet, especially the World Wide Web. E-commerce has many.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT Chuck Williams.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
1 7. Technology & the Internet E-Commerce. 2 Information Management Monitor performance & track customers/competitors through –Databases Electronic warehouses.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Advantages of Using a Network By Ryan Riddell. Shared Files The same files can be accessed from different computers on the network Files can be traded,
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
Data Security.
Network Security & Accounting
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
CPT 123 Internet Skills Class Notes Internet Security Session B.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Electronic Commerce Semester 1 Term 1 Lecture 14.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
LOGO Technical English E-commerce. Logo Contents E-commerce companiesE-commerce featuresTransaction securityOnline transactions.
1 4. E-Commerce & Marketing. 2 Internet & Marketing Four functions of Internet: –Communications (e.g., ) –Information E-bulletin boards (announcements),
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Getting Online, Working Online
Overview of E-Commerce
E-Commerce services.
Chapter 5 Electronic Commerce | Security Threats - Solution
E-Commerce Services. E-Commerce Services What does electronic commerce services mean? Electronic commerce is the process by which businesses and consumers.
Port Knocking Benjamin DiYanni.
E-Commerce Basics You know your excited.
Section 12.1 Section 12.2 Discuss the functions of a Web site
Chapter 5 Electronic Commerce | Security Threats - Solution
Introduction to Computers
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
E-Commerce Security.
The introduction and the essential elements of E- Commerce.
Web Designing Company-WondersMind. Mobile Application Development- WondersMind.
5 Techniques for a Proper Website Security Testing.
E-Commerce.
Buying and selling over the Internet
12 E-Commerce Overview.
Web Service Accounting System
Online Learning.
By Seferash B Asfa Wossen Strayer University 3rd December 2003
E-business and Network Security
Getting Online, Working Online
Getting Online, Working Online
Presentation transcript:

E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual; Consumer-to-consumer (C2C): when an individual sells to another individual; Business-to-business (B2B): when a company sells a service or product to another company; m-commerce: buying products and services from a mobile phone. www.themegallery.com Company Logo

E-commerce Security cyber attacks (attacks on a computer from the internet) on a network perimeter (the network boundary between a private user network and the internet). Students also read about improving the security of a computer system: installing firewalls like a web application protection firewall (WAF); encryption, which means encoding; Secure Socket Layer (SSL), which is a method of encryption; www.themegallery.com Company Logo

Outbound traffic is the information leaving the network and Two-factor authentication – this means giving two independent forms of identification (for example, your name and a password or PIN number). Hackers are people who try to gain illegal access to a computer system. A local area network (LAN) is a computer network over a limited geographical area. Outbound traffic is the information leaving the network and inbound traffic is the information coming into the network. Restricted traffic is information not everyone has access to. Allowed traffic is traffic that anyone in the system can access. www.themegallery.com Company Logo

Thank You !