CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.

Slides:



Advertisements
Similar presentations
Working with the Internet
Advertisements

Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURE SITES. A SECURE CONNECTION TERMS Secure Sockets Layer (SSL) An older Internet protocol that allows for data transmission between server and client.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
XP Tutorial 9 New Perspectives on JavaScript, Comprehensive1 Working with Cookies Managing Data in a Web Site Using JavaScript Cookies.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Chapter 7 The Web and 1.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Session 11: Security with ASP.NET
IS 247 Introduction to Web Application Development Tim Wu.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Being Ecommerce Sophon Thanasrivilai #100485
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 10 Developing a Web-Based Online Shopping Application (I)
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
WEB security From COOKIES to Packet Sniffers – What Is This Stuff Anyway and Why Should I Care.
Protecting Students on the School Computer Network Enfield High School.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
A Little Bit About Cookies Fort Collins, CO Copyright © XTR Systems, LLC A Little Bit About Cookies Instructor: Joseph DiVerdi, Ph.D., M.B.A.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
CP476 Internet Computing CGI1 Cookie –Cookie is a mechanism for a web server recall info of accessing of a client browser –A cookie is an object sent by.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
COEN 350: Network Security E-Commerce Issues. Table of Content HTTP Authentication Cookies.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
8-Mar-16 More About Servlets Session Tracking. Persistent information A server site typically needs to maintain two kinds of persistent (remembered) information:
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Computer Concepts 2014 Chapter 7 The Web and .
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Facebook privacy policy
Setting and Upload Products
Application layer tcp/ip
Section A: Web Technology
SSL Certificates for Secure Websites
Chapter 8 Building the Transaction Database
Unit 12 Using the Internet & Browsing the Web
Latest Updates on BlackHawk Mines Music : Privacy Policy
How to Check if a site's connection is secure ?
E-Commerce Security.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures

Objectives Privacy Cookies E-commerce - Secure Transactions SSL- Secure Socket Layer & Certificates

Privacy Privacy: The right of people to choose freely under what circumstances and to what extent they reveal themselves, their attitude, and their behavior to thers Two basic threats to privacy: government and business. Should government have access to certain types of information? Privacy vs. safety (counter-terrorism) Business access to information: good or bad? Targeted advertisements.

Cookies Cookies are small text files, stored on your computer by a server. They are used to maintain information between page requests to the server - for example, to maintain the contents of a shopping cart. Problem with cookies: third-party cookies A web site may contract with an ad agency to place ads on its page. When you visit the server, it sends a request to the ad agency to display an ad - but then it is suddenly allowing that ad company to place a cookie on your computer, without your realizing it. If you later visit a different Web server that contracts with the same ad agency, it will be able to retrieve those cookies and the ad agency will now know which other companies you interacted with. You can change the browser settings to deny cookies, or to warn you when cookies are being stored.

E-Commerce - Secure Transactions information sent over the Internet can be intercepted by a third party, so credit card numbers might be collected. To keep information secure, it must be encrypted SSL- Secure Socket Layer protocol for secure transactions. Web pages using this protocol are accessed using https. SSL uses certificates to verify that a Web server is really what it claims to be.

is NOT secure. PGP can be used to encrypt messages.