Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.

Slides:



Advertisements
Similar presentations
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Advertisements

Internet & Security Information Systems Today Jessup & Valacich, Chapter.6.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1 Software Testing and Quality Assurance Lecture 32 – SWE 205 Course Objective: Basics of Programming Languages & Software Construction Techniques.
Web server security Dr Jim Briggs WEBP security1.
Factors to be taken into account when designing ICT Security Policies
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Payment Card Industry (PCI) Data Security Standard
WHY SANeFORCE.com Prescription for your Success. SERVICES NO Hardware NO Software ONLY SERVICES Prescription for your Success.
Website Hardening HUIT IT Security | Sep
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CSE 4482, Fall 2009, D Chan Session 2 – Common Security Techniques.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Human-Computer Interface Course 5. ISPs and Internet connection.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Chapter 9: Novell NetWare
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Internet Security for Small & Medium Business Week 6
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Web-based E-commerce Architecture
Computer & Network Security
Technical Details – SAN PHARMA SFA. Front End / Back End Details  ASP  ASP.net  XML  JAVA Script  DHTML  MS SQL SERVER.
The Internet and World Wide Web
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Why is it important to back up your work/information? If you do not back up your work or information then your data might be lost when your computer clashes.
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
An Introduction to E-Commerce Security By Graham Mead.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Networking Network Classification, by there: 3 Security And Communications software.
Janis Buikauskis Joe Kubena Kyle Nelson Chris Schrader.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
CSCE 548 Student Presentation By Manasa Suthram
Chapter 6 Application Hardening
Server Concepts Dr. Charles W. Kann.
CompTIA Security+ Study Guide (SY0-401)
FTP - File Transfer Protocol
Taewan kang, Kevin huangfu
Planning and Security Policies
Data integrity and security
Encryption and Hacking
Unit 4 IT Security Kerris Davies.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Designing IIS Security (IIS – Internet Information Service)
Computer Networks Protocols
Presentation transcript:

Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme

Course Content Functions of Web-based Systems Keeping Data Secure on the Web Creating Web Pages Searching & Extracting Data Information Formats E-commerce Applications / E-Commerce Implementation Issues The Design Process

Keeping Data Secure on the Web Security Strategy  Policy and Action Document Identification of Risks Formulation of Control Measures Take into Account  Hardware  Software  People Regularly Reviewed

Keeping Data Secure on the Web Access Security Account Credentials Account Login Passwords Security Questions  Biometric Security  Fingerprint, Retinal Scan

Keeping Data Secure on the Web Host Security  Encryption HTTPS (Secure Hypertext Transfer Protocol)‏  128 bit Encryption – 256 used by MOD / NASA / CIA  “Hardening” of Servers - “Bug Searching”  Ethical Hacking  Hackersafe/McAfee

Keeping Data Secure on the Web Firewalls  IP “Masking”  DNS “Pass-through” and Mirroring Virus Protection  Virus Signatures  Behavioural and Heuristic Monitoring