SlideShare ist ein Scribd-Unternehmen logo
1 von 89
E-business  Infrastructure  and  Security Ron Cenfetelli Web Server Browser TCP/IP
History of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History of the Internet ,[object Object],[object Object],[object Object],Dr. J.C.R. Licklider  A message can be thought of as a short sequence of “bits” flowing through the network from one multiaccess computer to another. It consists of two types of information: control and data. Control information guides the transmission of data from source to destination. ... In short, the message processors function in the system as traffic directors, controllers, and correctors.  -Licklider & Taylor 1968
History of the Internet ,[object Object],[object Object]
History of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Feb 1996
Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
Internet usage, Canada & US
January 16, 2008 “ Internet penetration continues to show signs of hitting a plateau. The percentage of former users who say they have no intention of going back online continues to increase, and less than half of those who have never used the Internet plan to log on in the coming year. “
Digital Divide? Age ,  Education ,  Income  and  Location  appear to be highly predictive of broadband access
Internet Infrastructure Intranet T1 line Phone line T3 line Backbone Internet ISP Company A Person 2 POP NAP
Inside the Public Internet: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet: A Network of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Internet: A Network of Networks
Source: Fitzgerald & Dennis
http://www.caida.org/tools/visualization/walrus/gallery1/ries-t2.png
BusinessWeek: 15 Jan 2007
Jan 2000 Cooperative Association for Internet Data Analysis http://www.caida.org/analysis/topology/as_core_network/historical.xml
May 2003 http://www.caida.org/analysis/topology/as_core_network/historical.xml
April 2005 http://www.caida.org/analysis/topology/as_core_network/historical.xml
IP Addresses and the Domain Name System (DNS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Addresses and DNS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uniform Resource Locator (URL) http://www.sauder.ubc.ca/bcom/ PROTOCOL FOR THE WEB DIRECTORY Domain Name Uniform Resource Locater (URL) Host Computer Top Level Domain (TLD)
More on IP Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet: Client/Server Paradigm ,[object Object],[object Object],[object Object],[object Object]
The Client-Server Paradigm ,[object Object],[object Object],[object Object]
Protocols ,[object Object],[object Object]
Protocol Examples ,[object Object],[object Object],[object Object],[object Object],[object Object]
Putting Client/Server and Protocols Together ,[object Object],[object Object],[object Object],[object Object]
Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Protocol – TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP: Reliable Communication ,[object Object]
TCP Helps IP Guarantee Delivery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More on TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “Packet”
Routers Internet Routers POP NAP
Routers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP – Organized Chaos Brad sends “HELLO” to Al Al H E L Internet L O Packet Router
Internet in Action Internet 101.org © 1997-2004 Scott Cottingham
Internet    World Wide Web ,[object Object],[object Object],Internet  WWW
HTML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Protocol - HTTP ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with a lack of Connection & State ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cookies ,[object Object],www.msblabs.org FALSE /tools/scratch-pad/ FALSE 1227994064 data Ron%20is%20leaving%20a%20cookie Try it out at  http://www.msblabs.org/tools/scratch-pad/index.php Search for “cookies.txt” file under Documents and Settings
Web 2.0 – Moving beyond HTML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “Mashup” of Google Maps and Craigslist  ,[object Object],[object Object],[object Object],[object Object]
A summary of Internet Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security
Why Security Matters to e-Business Peter Steiner  -p. 61, The New Yorker, (July 5, 1993)
Wednesday, 2 January 2008,
 
 
Malware marries Web 2.0 “ Where human beings solve the puzzles the viruses cannot."
See link On WebCT
Security in the Physical World Lock Security forces Safe Signature Physical barriers Fingerprint Seal Contract
E-business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Simulation… ,[object Object],[object Object],[object Object],[object Object]
A Simulation… ,[object Object]
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Message Integrity – Threats & Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components:  Digital Signature ,[object Object]
Hashing ,[object Object],[object Object],[object Object],[object Object]
Hash Example ,[object Object],[object Object],[object Object],[object Object]
Hashing Hashing algorithm A value say X Hashing algorithm Y Sender Receiver If X = Y, message sent and received are the same. X message message X=Hash Value message X message
PKI Components: Digital Signature (cont.)  Note how the private/public key process is reversed! Compute digest from hashing algorithm Encrypt Digest Transmission Decrypt Digest Compute expecteddigest from hashing algorithm Confirm or deny integrity of message Cleartext  message Sender encrypts with his  private  key Cleartext message Receiver  decrypts w/ Sender’s public  key Digital Signature Digest Digest Expected Digest
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Hierarchies of Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components:  Digital certificate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components: Certification Authority ,[object Object],[object Object],[object Object],[object Object]
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Putting it all together… Customer Internet merchant Certificate authority Customer’s info requests and Merchant’s info are exchanged. Customer verifies Merchant (received msg’s are signed with a hash that can be  decrypted  with the merchant’s public keys held by CA)  Provides  encrypted information for purchases ( encrypted  with merchant’s public key). Credit card and message digest is signed with    customer’s  private  key. Merchant verifies Customer (received msg’s are signed with a hash that can be  decrypted  with the customer’s public keys held by CA) Customer’s Public Key Merchant’s Public Key
More Security and Identification We’ve discussed how to ID ourselves across the Internet, but how do we ID ourselves at our “point of presence”?
Physical Security Means ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
You've got security  (Wired News Sep. 21, 2004)   ,[object Object]
 
How the SmartCard (SecurID) Works  ,[object Object],[object Object],[object Object],[object Object],[object Object]
How the SmartCard (SecurID) Works  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics: Face Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Biometrics: Voice Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Biometrics: Fingerprint Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Security Limitations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations ,[object Object],[object Object]
Combination is Best Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viruses ,Worms, and Trojan horses… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Viruses,  Worms  and Trojan horses…
[object Object],[object Object],Viruses, Worms and  Trojan horses …
“ Symantec says the Trojan.Silentbanker has so far targeted over 400 banks around the world, but according to a blog posted by Symantec's Liam O’Murchu on January 14 [2008], the most worrying aspect is that the Trojan can perform  man-in-the-middle  attacks (where an attacker can read, insert and modify messages between two parties without either party knowing).”  http://m-net.net.nz/2157/latest-news/latest-news/trojan.silentbanker-defeats-2-factor-authentication-attacks-400-b.php
A local Trojan Horse Vancouver Sun - October 6, p. A3
Questions?  Comments?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
e commerce ppt
e commerce ppte commerce ppt
e commerce ppt
 
E business application
E business applicationE business application
E business application
 
E business.ppt
E business.pptE business.ppt
E business.ppt
 
Framework for e business-v2
Framework for e business-v2Framework for e business-v2
Framework for e business-v2
 
E-CRM
E-CRME-CRM
E-CRM
 
E-commerce Chapter No.1
E-commerce Chapter No.1E-commerce Chapter No.1
E-commerce Chapter No.1
 
Problems in ecommerce
Problems in ecommerceProblems in ecommerce
Problems in ecommerce
 
Online marketing communications
Online marketing communicationsOnline marketing communications
Online marketing communications
 
Global e Marketing
Global e MarketingGlobal e Marketing
Global e Marketing
 
E Procurement
E ProcurementE Procurement
E Procurement
 
E - Marketing
E - Marketing E - Marketing
E - Marketing
 
Viral marketing
Viral marketingViral marketing
Viral marketing
 
Knowledge Management framework of Hansen, Earl and Alvesson
Knowledge Management framework of Hansen, Earl and AlvessonKnowledge Management framework of Hansen, Earl and Alvesson
Knowledge Management framework of Hansen, Earl and Alvesson
 
Customer relationship management unit 1 introduction
Customer relationship management  unit 1 introductionCustomer relationship management  unit 1 introduction
Customer relationship management unit 1 introduction
 
01 introduction to e-marketing
01   introduction to e-marketing01   introduction to e-marketing
01 introduction to e-marketing
 
Electronic Customer Relationship Management (E-CRM)
Electronic Customer Relationship Management (E-CRM)Electronic Customer Relationship Management (E-CRM)
Electronic Customer Relationship Management (E-CRM)
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Introduction to e business & e-commerce
Introduction to e business  & e-commerceIntroduction to e business  & e-commerce
Introduction to e business & e-commerce
 
Online Marketing
Online MarketingOnline Marketing
Online Marketing
 

Ähnlich wie E-business Infrastructure and Security

How does the internet work
How does the internet workHow does the internet work
How does the internet workmraheel205
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Workssumit kumar
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxwalterl4
 
How does internet works
How does internet worksHow does internet works
How does internet worksRamonNavarro46
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet ProtocolMiles Priar
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraAmit Chandra
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technologyAnware Kade
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]Cr Faezah
 

Ähnlich wie E-business Infrastructure and Security (20)

How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
 
How does internet works
How does internet worksHow does internet works
How does internet works
 
Session 2
Session 2Session 2
Session 2
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
CIS 1203 Introduction to the Web
CIS 1203 Introduction to the WebCIS 1203 Introduction to the Web
CIS 1203 Introduction to the Web
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
 
Internet
InternetInternet
Internet
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]
 
The Internet
The InternetThe Internet
The Internet
 
Internet
InternetInternet
Internet
 

Mehr von Kimmy Chen

Shoplus thailand social e commerce tool
Shoplus thailand social e commerce toolShoplus thailand social e commerce tool
Shoplus thailand social e commerce toolKimmy Chen
 
2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 Kimmy Chen
 
發現你的天才與舞台
發現你的天才與舞台發現你的天才與舞台
發現你的天才與舞台Kimmy Chen
 
Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Kimmy Chen
 
直播效益與趨勢
直播效益與趨勢直播效益與趨勢
直播效益與趨勢Kimmy Chen
 
LIVEhouse.in OTT solution
LIVEhouse.in OTT solutionLIVEhouse.in OTT solution
LIVEhouse.in OTT solutionKimmy Chen
 
分析工具面面觀 Wow
分析工具面面觀   Wow分析工具面面觀   Wow
分析工具面面觀 WowKimmy Chen
 
About www.100co.com.tw
About www.100co.com.twAbout www.100co.com.tw
About www.100co.com.twKimmy Chen
 
UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案Kimmy Chen
 
SocialBuy Inc.
SocialBuy Inc. SocialBuy Inc.
SocialBuy Inc. Kimmy Chen
 
B2 B Sc And Emarkets
B2 B Sc And EmarketsB2 B Sc And Emarkets
B2 B Sc And EmarketsKimmy Chen
 
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Kimmy Chen
 
Changes Management - ACE case study
Changes Management - ACE case studyChanges Management - ACE case study
Changes Management - ACE case studyKimmy Chen
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificKimmy Chen
 
HOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeHOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeKimmy Chen
 
Diversity Management in Financial Insitution
Diversity Management in Financial InsitutionDiversity Management in Financial Insitution
Diversity Management in Financial InsitutionKimmy Chen
 
What Diversity Means to Me
What Diversity Means to MeWhat Diversity Means to Me
What Diversity Means to MeKimmy Chen
 
Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Kimmy Chen
 

Mehr von Kimmy Chen (19)

Shoplus thailand social e commerce tool
Shoplus thailand social e commerce toolShoplus thailand social e commerce tool
Shoplus thailand social e commerce tool
 
Shoplus
ShoplusShoplus
Shoplus
 
2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班
 
發現你的天才與舞台
發現你的天才與舞台發現你的天才與舞台
發現你的天才與舞台
 
Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢
 
直播效益與趨勢
直播效益與趨勢直播效益與趨勢
直播效益與趨勢
 
LIVEhouse.in OTT solution
LIVEhouse.in OTT solutionLIVEhouse.in OTT solution
LIVEhouse.in OTT solution
 
分析工具面面觀 Wow
分析工具面面觀   Wow分析工具面面觀   Wow
分析工具面面觀 Wow
 
About www.100co.com.tw
About www.100co.com.twAbout www.100co.com.tw
About www.100co.com.tw
 
UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案
 
SocialBuy Inc.
SocialBuy Inc. SocialBuy Inc.
SocialBuy Inc.
 
B2 B Sc And Emarkets
B2 B Sc And EmarketsB2 B Sc And Emarkets
B2 B Sc And Emarkets
 
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
 
Changes Management - ACE case study
Changes Management - ACE case studyChanges Management - ACE case study
Changes Management - ACE case study
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay Pacific
 
HOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeHOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbe
 
Diversity Management in Financial Insitution
Diversity Management in Financial InsitutionDiversity Management in Financial Insitution
Diversity Management in Financial Insitution
 
What Diversity Means to Me
What Diversity Means to MeWhat Diversity Means to Me
What Diversity Means to Me
 
Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

E-business Infrastructure and Security

  • 1. E-business Infrastructure and Security Ron Cenfetelli Web Server Browser TCP/IP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
  • 7. Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
  • 9. January 16, 2008 “ Internet penetration continues to show signs of hitting a plateau. The percentage of former users who say they have no intention of going back online continues to increase, and less than half of those who have never used the Internet plan to log on in the coming year. “
  • 10. Digital Divide? Age , Education , Income and Location appear to be highly predictive of broadband access
  • 11. Internet Infrastructure Intranet T1 line Phone line T3 line Backbone Internet ISP Company A Person 2 POP NAP
  • 12.
  • 13.
  • 14.
  • 18. Jan 2000 Cooperative Association for Internet Data Analysis http://www.caida.org/analysis/topology/as_core_network/historical.xml
  • 21.
  • 22.
  • 23. Uniform Resource Locator (URL) http://www.sauder.ubc.ca/bcom/ PROTOCOL FOR THE WEB DIRECTORY Domain Name Uniform Resource Locater (URL) Host Computer Top Level Domain (TLD)
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 37.
  • 38. TCP/IP – Organized Chaos Brad sends “HELLO” to Al Al H E L Internet L O Packet Router
  • 39. Internet in Action Internet 101.org © 1997-2004 Scott Cottingham
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 49. Why Security Matters to e-Business Peter Steiner -p. 61, The New Yorker, (July 5, 1993)
  • 51.  
  • 52.  
  • 53. Malware marries Web 2.0 “ Where human beings solve the puzzles the viruses cannot."
  • 54. See link On WebCT
  • 55. Security in the Physical World Lock Security forces Safe Signature Physical barriers Fingerprint Seal Contract
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. Hashing Hashing algorithm A value say X Hashing algorithm Y Sender Receiver If X = Y, message sent and received are the same. X message message X=Hash Value message X message
  • 65. PKI Components: Digital Signature (cont.) Note how the private/public key process is reversed! Compute digest from hashing algorithm Encrypt Digest Transmission Decrypt Digest Compute expecteddigest from hashing algorithm Confirm or deny integrity of message Cleartext message Sender encrypts with his private key Cleartext message Receiver decrypts w/ Sender’s public key Digital Signature Digest Digest Expected Digest
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71. Putting it all together… Customer Internet merchant Certificate authority Customer’s info requests and Merchant’s info are exchanged. Customer verifies Merchant (received msg’s are signed with a hash that can be decrypted with the merchant’s public keys held by CA) Provides encrypted information for purchases ( encrypted with merchant’s public key). Credit card and message digest is signed with customer’s private key. Merchant verifies Customer (received msg’s are signed with a hash that can be decrypted with the customer’s public keys held by CA) Customer’s Public Key Merchant’s Public Key
  • 72. More Security and Identification We’ve discussed how to ID ourselves across the Internet, but how do we ID ourselves at our “point of presence”?
  • 73.
  • 74.
  • 75.  
  • 76.
  • 77.
  • 78. Biometrics: Face Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 79. Biometrics: Voice Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 80. Biometrics: Fingerprint Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. “ Symantec says the Trojan.Silentbanker has so far targeted over 400 banks around the world, but according to a blog posted by Symantec's Liam O’Murchu on January 14 [2008], the most worrying aspect is that the Trojan can perform man-in-the-middle attacks (where an attacker can read, insert and modify messages between two parties without either party knowing).” http://m-net.net.nz/2157/latest-news/latest-news/trojan.silentbanker-defeats-2-factor-authentication-attacks-400-b.php
  • 88. A local Trojan Horse Vancouver Sun - October 6, p. A3