E-Commerce.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
IS Network and Telecommunications Risks
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter 15 The Third Component: Powerful Networks.
1 Chapter 10 Internetand New Information Technology Infrastructure.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Slide 5.1 Curtis/Cobham © Pearson Education Limited 2008 Chapter 5 The Internet and the World Wide Web.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Telecommunication and Networks
Communications and Networks
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Lecture 5 Title: Networks and Businesses
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Business Telecommunications
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Networks QUME 185 Introduction to Computer Applications.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Basic Concepts of Internet Technology What is a computer network? Isolated computers vs. networked computers internetworking The Internet What’s a protocol?
The Intranet.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
Elijah Suko & Jamie Kuolt. The Connected World  Networks Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
7.1 © 2010 by Prentice Hall 4 Chapter Telecommunications, the Internet, and Wireless Technology.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Securing Interconnect Networks By: Bryan Roberts.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Chapter 1: Explore the Network
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 1: Explore the Network
NET 3710 WAN Data Networks.
The Intranet.
Virtual Private Network (VPN)
Virtual Private Network
Understand Wide Area Networks (WANs)
Virtual Private Networks
Level 2 Diploma Unit 10 Setting up an IT Network
Chapter 1: Explore the Network
Introduction to Computers
CompTIA Security+ Study Guide (SY0-401)
Network, Internet and e-commerce
Chapter8.
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
Department of Computer Science Course : Pre Computer Skills
Computing Over Distance
Security Protocols in the Internet
Firewalls Routers, Switches, Hubs VPNs
VPN: Virtual Private Network
Chapter8.
KNOWLEDGE MANAGEMENT (KM) Session # 34
Computer Technology Networks & Internet.
Cengage Learning: Computer Networking from LANs to WANs
IST346: Networking Fundamentals
Unit 8 Network Security.
Presentation transcript:

E-Commerce

Managing the Marketplace Technology Infrastructure Topology Security

Technology TCP/IP – Transmission control protocol/Internet protocol Data transport Circuit switching Packet switching A dedicated link between a group of users Packet Switching Can share the network and bandwidth

Technology.. IP – Routing – Routing and addressing Setting a route map dynamically between a sender and receiver

Technology… Addressing InterNIC – Internet Network Information Center A unique 32-bit number to identify networks within TCP/IP (e.g., 127.16.10.1) DNS server - www.buet.ac.bd is converted to an unique IP 203.112.220.202 IPv4

Technology Regional Internet Registries (RIR) Manages allocation and registration of Internet number resources NAT – Network address translator Converts a private IP address to public IP address IPv4 will be depleted by 2015-2020 IPv6 – 128-bit address space (6×16-bits) 2001:0DB8:0000:1111:0000:0000:0000:0200 FE80:0000:0000:0000:0123:4567:89AB:CDEF

Technology… Internet Intranet Extranet Interconnection of networks Interconnection over the internet or LAN Extranet A common platform for interconnection between vendors, suppliers, producers over the internet

Infrastructure NII – network traffic must be forwarded through Cable TV TV and Radio broadcasting Telephone networks Cellular communications Computer networks Internet

Infrastructure MDI – a link between client and server EPI – web BSI – EDI (formatted) Emails (unformatted) HTTP EPI – web URL Protocol (e.g., HTTP) HTML BSI – Encryption Payments Fund transfer Authentication

Infrastructure E-Commerce Application

Electronic Publishing PDF HTML

Topology Networks can be a cooperation within Stakeholders - Internet Adobe supports customers and provide financial and other reports to investors Employees - Intranet Business partners - Extranet A link between Buyer and supplier

Security Access control to the server Authentication

Security… Network security components often include: Antivirus and antispyware Firewall filtering Restricts packets with designated IP address Dedicated firewall systems A device dedicated for intranet to Internet Depending on businesses, restricts on Unauthorized web applications Unauthorized personnel Access control lists (ACL) Intrusion prevention systems (IPS) Virtual Private Networks (VPNs)

Encryption Sniffer program - looking for a number format for credit cards (e.g., 1234 5678 9012 3456) Can be of confidential information or financial reports or business ideas PGP – Pretty Good Privacy A readily available web encryption Encryption Public key - PGP Public - Private key

PGP

Decrypt the following… IQQF PKIJV!