Download presentation
Presentation is loading. Please wait.
Published byColleen Walton Modified over 9 years ago
2
Electronic Commerce Online Security Issues MIS 6453 -- Spring 2006 Instructor: John Seydel, Ph.D.
3
Agenda Web page coding demonstrations and exercise Simple forms exercise Dynamic pages Server-side scripting Client-side scripting Other Review guidelines for HTML source code Forms and bulleted lists in HTML Discussions of online security issues Avery & Brawley team Avery & Brawley Additional comments Some review questions If time: HTML table basics
4
A Look at Dynamic versus Static Pages Login to your computer as follows: UserID = peachtree Password = accounting Domain = BU201... (this computer) Start the following Internet Explorer (open your SuSE1 site) SmartFTP NotePad A static page: www.suse1.astate.edu/~flory/page2_proc.html A dynamic version: www.suse1.astate.edu/~flory/page2.html www.suse1.astate.edu/~flory/page2_proc.html Exercises & demonstrations Forms exercise / server-side scripting demo Forms exercise / client-side scripting exercise & demo
5
Some Guidelines for Source Code Use lowercase for tags & attributes Quote attribute values Use relative references for resources on same server Always use closing tags Nest elements properly; close in reverse order of opening Use indentation consistently and to make code readable No more than 80 characters per line of code; break long tags into multiple lines, typically one per attribute Avoid deprecated elements, e.g., Use no spaces in file names Treat all URLs and other resource names as if case- sensitive
6
HTML Forms Basics At lowest level, a form consists of two elements: Form The overall container element Input data collection control A variety of types (textboxes, checkboxes, buttons, etc.) exist and are designated by the type attribute Example: Class: Note: several other data collection controls exist
7
HTML Bullet Lists Consist of two elements: Unordered list The overall container element List item One for each bullet point Example: My favorite schools: ASU UALR Whoever’s playing UA Lists can be nested; i.e., one list item can be another unordered list, containing its own list items (sub-bullets)
8
Online Security Framework Components of security Secrecy Integrity Necessity Useful for discussion/analysis at all levels Client Network Server Backend systems (e.g., database servers) Any organization must have a security policy
9
Security Policies Must Address: Authentication: who’s attempting access Access control: who’s allowed access Secrecy: protection of specific data Integrity: keeping the data in tact Audit: who/what causes events to occur and when?
10
Discussion by Avery & Brawley TeamAvery & Brawley
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.