Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.
Unit 28- Website Development Assignment 1- THEORY P3
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Internet Security facilities for secure communication.
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Types of Electronic Infection
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter 8 Browsing and Searching the Web. 2Practical PC 5 th Edition Chapter 8 Getting Started In this Chapter, you will learn: − What is a Web page −
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
CHAPTER-4 THE DIGITAL FIRM: E-COMMERCE AND E- BUSINESS.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Any criminal action perpetrated primarily through the use of a computer.
Computer Concepts 2014 Chapter 7 The Web and .
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
Chapter 5 Electronic Commerce | Security Threats - Solution
CONNECTING TO THE INTERNET
Browsing and Searching the Web
Chapter 5 Electronic Commerce | Security Threats - Solution
Secure Electronic Transaction
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Presentation transcript:

Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the concepts of Web security, cookies, caches, Web site protection, digital certificates, encryption, and firewalls

Course ILT Topic A Topic A: Internet transactions Topic B: Web security considerations

Course ILT Internet transactions E-commerce business models: –Business-to-business –Business-to-consumer –Business-to-employee –Business-to-government –Government-to-consumer –Consumer-to-consumer

Course ILT To ensure secure ordering, check: Store credentials The company has a registered Web site The company’s contact information is listed The company’s return and refund policies The Web site host is a secure server

Course ILT Topic B Topic A: Internet transactions Topic B: Web security considerations

Course ILT Cookies Store information on user’s computer Contain details of user’s visit Used by Web site for revisits Stored in the folder C:/Windows/Cookies

Course ILT Cache Stores a local copy of a Web page Increases the speed of browsing Displays a local copy

Course ILT Protecting a Web site Encrypt HTML code Disable page caching Disable right-clicking and printing Password-protect the site Insert a copyright notice Install firewalls

Course ILT Digital certificates Authenticate the holder Are issued by a trusted third party Two types of certificates: –Server –Personal

Course ILT Encryption Translates information into an unreadable format Used to protect –Code – messages –Internet transactions –Any communication between server and client

Course ILT Firewalls Electronic mechanism to block –Unauthorized users –Spam –Viruses Software program, hardware device, or combination of both Inspect and filter all incoming traffic Placed between an intranet and the Internet

Course ILT Unit summary Learned about purchasing goods online by using credit cards and Web- based forms Learned about the concepts of Web security, cookies, caches, Web site protection, digital certificates, encryption, and firewalls