© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.

Slides:



Advertisements
Similar presentations
Copyright © 2005 – Clickshare Service Corp. All rights reserved. Payment Aggregation & Affinity Management Clickshare for the Media Industry For more information.
Advertisements

4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
Mobile Commerce and Ubiquitous Computing
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
COMPUTER APPLICATIONS TO BUSINESS ||
Enterprise Mobility ‘Mobile First’ strategy for your Business
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Ecommerce … or electronic commerce refers to systems that support electronically executed business transactions. B2C B2B C2C In this section: Ecommerce.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Computer fundamentals
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Channels of Distribution
Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman MODULE 13 ELECTRONIC COMMERCE Learning Units 13.1 What is E-Commerce? 13.2 Electronic.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
A Global fully incorporated Virtual ecommerce Software Solution.
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
What Is Enterprise Computing?
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 5 – E-commerce and Enterprise Systems
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Chapter 7. Identifying Assets and Activities to Be Protected
Information Technology
Office 365 is cloud-based productivity, hosted by Microsoft.
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
CIS 333 Course Experience Tradition/ snaptutorial.com
Discovering Computers 2010: Living in a Digital World Chapter 14
Chapter 17 Using Technology in a Competitive Environment.
Top 10 Strategic Technology Trends for 2013
Components of information systems
The Impact of Cloud Technology on Multi-Unit Operators
Doing Business in the Online World
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Telecommunications, the Internet, and Wireless Technology
Chapter 1 Introduction to Electronic Commerce
E-Commerce: Digital Markets, Digital Goods
Marketing in the Digital Age: Making New Customer Connections
IBM Start Now Host Integration Solutions
What is Commerce According to Dictionary.com
Decisions Delivers an Easy Way to Plan, Organize and Run Efficient Board and Leadership Meetings Along with the Security of Microsoft Office 365 OFFICE.
Switchover from Teledeposit to VIRTUAL TERMINAL Moneris Solutions
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Top Emerging E-commerce Magento trends. The progress of E-commerce industry is changing year by year, this evolution has made super easy for the online.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Hosted Private Branch Exchange.
Mobile Commerce and the Internet of Things
McGraw-Hill Technology Education
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
E-Commerce: Digital Markets, Digital Goods
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Lesson 01 Introduction to Electronic Commerce
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Top 10 Strategic Technology Trends for 2013
Mobile Commerce and Ubiquitous Computing
Unit 7 Distribution Chapter 21 Channels of Distribution
Understanding Back-End Systems
Lesson 01 Introduction to Electronic Commerce
Telecommunications, the Internet, and Wireless Technology
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
Software and Software Engineering
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile Commerce and Ubiquitous Computing
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Web portals-B2B-B2C-B2E TRAVELOPRO
Presentation transcript:

© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security Lesson 2 The Internet of Things Is Changing How We Live

Page 2 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Learning Objective(s)  Explain information systems security and its effect on people and businesses.

Page 3 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Key Concepts  The evolution of the Internet of Things (IoT) from the late 1990s to present  The impact that the Internet and IoT have on human and business life  How bricks-and-mortar businesses transform into e- business models with e-commerce and an IoT strategy  How IP mobility is driving IoT to include both personal and business environments  New challenges created by IoT

Page 4 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. The Internet of Things Is Changing How We Live

Page 5 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Drivers for Internet of Things (IoT)

Page 6 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Evolution of IoT  Internet service providers (ISPs)  Radio frequency identification (RFID)  Application service providers (ASPs)  Software as a Service (SaaS)

Page 7 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. How the Internet and TCP/IP Transform Our Lives

Page 8 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. IoT’s Impact on Human and Business Life  The Internet has changed our day-to-day lives Personally Socially Professionally  Use the Internet to: Check weather, news, and social media sites at home Check business s at work

Page 9 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Store-and-Forward vs. Real-Time Communications

Page 10 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. IoT’s Impact on Humans

Page 11 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. IoT’s Impact on Business

Page 12 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Evolution from Bricks and Mortar to E-Commerce  E-commerce Sale of goods and services on the Internet  Business-to-consumer (B2C) Customers purchase goods and services directly from their website  Business-to-business (B2B) Businesses conduct sales with other businesses  Payment Card Industry Data Security Standard (PCI DSS) Protects private customer data

Page 13 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Evolution from Bricks and Mortar to E-Commerce (cont.)  Internet business challenges: Growing the business through the Internet Changing an existing conventional business into an e-business Building secure and highly available websites and e-commerce portals Building a web-enabled customer-service strategy Finding new customers with Internet marketing

Page 14 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. E-business Strategy Elements  E-commerce solution  Internet marketing strategy  E-customer service-delivery strategy  Payment and credit card transaction processing

Page 15 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Why Businesses Must Have an Internet and IoT Marketing Strategy  Must remain competitive  Bricks-and-mortar business model out of date in global market  Customers require continuous access to information, products, and services

Page 16 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. IP Mobility  Personal communication devices and mobile phones are powerful  Cell phones are used to extend mobility  Mobile phones, smartphones, and PDAs match the power and flexibility of small computers  Tablets, smartphones, and netbooks fill need for lightweight portable devices

Page 17 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Mobile Users and Bring Your Own Device (BYOD)  Employees and contractors use their own personal devices to connect to network at office

Page 18 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Mobile Applications  Limited web browsers can’t run some traditional applications  Bad interface design causes application failure on mobile devices  Many users from multiple domains found uses for mobile applications  Medical applications were a good fit for mobile applications

Page 19 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Mobile Applications (cont.)  4G networks provide true IP communications  Mobile IP enables users to: Move between LAN segments and stay connected without interruption Maintain a connection to the network as long as the mobile device stays within network coverage

Page 20 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. IP Mobile Communications

Page 21 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. IP Mobile Communications (cont.)

Page 22 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. IP Mobile Communications (cont.) 1.Mobile node (MN) connects to foreign agent (FA). 2.FA assigns care of address (COA) to MN. 3.FA sends COA to home agent (HA). 4.Correspondent node (CN) sends message to MN. a. CN’s message for MN goes first to HA. b. HA forwards message to COA. c. FA forwards message to MN.

Page 23 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. New Challenges Created by the IoT

Page 24 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Challenges of IT Devices  Deployed in large quantities (such as sensors or consumer items)  Ubiquitous and can have wide reach into the user or household population  Not maintained or updated devices allow vulnerabilities  Upgrades can be difficult to distribute and deploy  No owner visibility of how the device connects to the Internet  Not physically secure  Capture readings and measurements in the open

Page 25 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Privacy Challenges  Privacy policy statement  Definition of data, metadata, or analytical data use and rights  Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement  Determine the domain of privacy

Page 26 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Interoperability and Standards  Internet Engineering Task Force (IETF) ensures interoperability and standards can be pursued for IoT solutions  Interoperability has significant financial impacts if not properly addressed  Goal is to bring the cost of IoT devices and supporting applications down so they are affordable

Page 27 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Interoperability and Standards Challenges  Some manufacturers want to design and deploy proprietary IoT devices and solutions  Cost factors to implement functional, operational, technical, and security capabilities into IoT devices and applications  Time-to-market risk  Technology outdated risk  A void in interoperability and standards for IoT devices can create an environment of bad IoT devices

Page 28 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Legal and Regulatory Issues  Proper handling and protection of sensitive data  Privacy data subject to privacy laws of state you live in as well as state that the IoT hosting company resides in  IoT vendor or solutions provider required to adhere to security control requirements and data protection laws

Page 29 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Legal and Regulatory IoT Questions

Page 30 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. E-Commerce and Economic Development Issues

Page 31 Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Summary  The evolution of the Internet of Things (IoT) from the late 1990s to present  The impact that the Internet and IoT have on human and business life  How bricks-and-mortar businesses transform into e-business models with e-commerce and an IoT strategy  How IP mobility is driving IoT to include both personal and business environments  New challenges created by IoT