Presentation is loading. Please wait.

Presentation is loading. Please wait.

Electronic Commerce Online Security Issues MIS 6453 -- Spring 2006 Instructor: John Seydel, Ph.D.

Similar presentations


Presentation on theme: "Electronic Commerce Online Security Issues MIS 6453 -- Spring 2006 Instructor: John Seydel, Ph.D."— Presentation transcript:

1

2 Electronic Commerce Online Security Issues MIS 6453 -- Spring 2006 Instructor: John Seydel, Ph.D.

3 Agenda Web page coding demonstrations and exercise Simple forms exercise Dynamic pages  Server-side scripting  Client-side scripting Other  Review guidelines for HTML source code  Forms and bulleted lists in HTML Discussions of online security issues Avery & Brawley team Avery & Brawley Additional comments Some review questions If time: HTML table basics

4 A Look at Dynamic versus Static Pages Login to your computer as follows: UserID = peachtree Password = accounting Domain = BU201... (this computer) Start the following Internet Explorer (open your SuSE1 site) SmartFTP NotePad A static page: www.suse1.astate.edu/~flory/page2_proc.html A dynamic version: www.suse1.astate.edu/~flory/page2.html www.suse1.astate.edu/~flory/page2_proc.html Exercises & demonstrations Forms exercise / server-side scripting demo Forms exercise / client-side scripting exercise & demo

5 Some Guidelines for Source Code Use lowercase for tags & attributes Quote attribute values Use relative references for resources on same server Always use closing tags Nest elements properly; close in reverse order of opening Use indentation consistently and to make code readable No more than 80 characters per line of code; break long tags into multiple lines, typically one per attribute Avoid deprecated elements, e.g., Use no spaces in file names Treat all URLs and other resource names as if case- sensitive

6 HTML Forms Basics At lowest level, a form consists of two elements: Form   The overall container element Input data collection control   A variety of types (textboxes, checkboxes, buttons, etc.) exist and are designated by the type attribute Example: Class: Note: several other data collection controls exist

7 HTML Bullet Lists Consist of two elements: Unordered list   The overall container element List item   One for each bullet point Example: My favorite schools: ASU UALR Whoever’s playing UA Lists can be nested; i.e., one list item can be another unordered list, containing its own list items (sub-bullets)

8 Online Security Framework Components of security Secrecy Integrity Necessity Useful for discussion/analysis at all levels Client Network Server Backend systems (e.g., database servers) Any organization must have a security policy

9 Security Policies Must Address: Authentication: who’s attempting access Access control: who’s allowed access Secrecy: protection of specific data Integrity: keeping the data in tact Audit: who/what causes events to occur and when?

10 Discussion by Avery & Brawley TeamAvery & Brawley


Download ppt "Electronic Commerce Online Security Issues MIS 6453 -- Spring 2006 Instructor: John Seydel, Ph.D."

Similar presentations


Ads by Google