Chapter 17: Information Management in Treasury Outline: Basics of E-Commerce EDI Infrastructure Treasury Management Systems (TMSes) Other Issues in Treasury.

Slides:



Advertisements
Similar presentations
Chapter 12 Designing System Interfaces, Controls, and Security
Advertisements

E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Chapter 17 Controls and Security Measures
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Chapter 8-1 The Islamic University of Gaza Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Factors to be taken into account when designing ICT Security Policies
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Electronic Data Interchange Computer readable forms for business documents such as invoices, purchase orders, delivery notes needed in B2B e- commerce.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Chapter 7 Internal Control and Cash
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
ECE Lecture 1 Security Services.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
ACM 511 Introduction to Computer Networks. Computer Networks.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Unit 9: Electronic Fraud Professor Thomas Genovese.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
DIGITAL SIGNATURE.
1 Accounting Information Systems: A Business Process Approach Chapter Twelve: Using Technology to Enhance Business Processes.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
14 Systems Analysis and Design in a Changing World, Fourth Edition.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
Chapter 17 Risks, Security and Disaster Recovery
E-business Auditing Revised on 2014.
BY GAWARE S.R. DEPT.OF COMP.SCI
Computer-Based Processing: Developing an Audit Assessment Approach
EMTM 553 Electronic Commerce Systems
Module 4 System and Application Security
Presentation transcript:

Chapter 17: Information Management in Treasury Outline: Basics of E-Commerce EDI Infrastructure Treasury Management Systems (TMSes) Other Issues in Treasury Technology v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter

Basics of E-Commerce Terminology Electronic commerce Electronic data interchange (EDI) Electronic funds transfer (EFT) Benefits Improved productivity No data reentry Lower error rates Faster data processing Eliminates mail time Improved communication capabilities v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter

The Languages of E-Commerce Electronic data interchange (EDI) HyperText markup language (HTML) eXtensible markup language (XML) eXtensible business reporting language (XBRL) v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter

Basics of E-Commerce Security v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter Privacy Assurance that the message is readable only to the intended recipient and that data will not be used for unintended purposes Authentication The ability to know, with a reasonable amount of certainty, who sent or received a message Integrity The ability to ensure that a message was not modified in transit, which is especially important for financial transactions Non-repudiation The inability of the sender or receiver of a message to deny having sent or received the message

TMS Security Database management issues Security risks Data loss Unauthorized user access Computer viruses Security safeguards Disaster recovery and business continuity v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter

Security Safeguards Storing computer systems and software in a location with restricted access Instituting basic access requirements (e.g., passwords) Monitoring log-on activity Using digital certificates Limiting sign-on attempts Using smart card and/or biometric controls Enforcing periodic password changes Establishing different levels of access and segregation of duties Using backup storage Scanning information at the system-wide and workstation levels to ensure that data are not compromised Employing electronic security (e.g., encryption and message authentication) by means of electronic signatures or certificates Removing or disabling computer access of former employees v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Chapter

Exam Preparation Steps Complete the online post- test to practice for the CTP exam. Complete the online flashcards. Review the test-your- understanding questions at the end of each chapter. Complete or review all Exam Practice (Describe and Differentiate) questions. Review the online calculations. (Each has four variations.) Review the online Test- Taking Tips. v3.0 © 2011 Association for Financial Professionals. All rights reserved. Session 12: Module 6, Summary - 7