The Internet Book - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

The Internet Book

Description:

Title: PowerPoint Presentation Author: Barbara Hotta Last modified by: Leanne Chun Created Date: 4/1/2000 3:15:00 AM Document presentation format – PowerPoint PPT presentation

Number of Views:59
Avg rating:3.0/5.0
Slides: 24
Provided by: Barbar257
Category:
Tags: book | browser | guard | internet

less

Transcript and Presenter's Notes

Title: The Internet Book


1
The Internet Book
2
Chapter 30
3
E-Commerce Is Big Business
  • The term electronic commerce (e-commerce) refers
    to all commercial transactions conducted over the
    Internet.
  • May Include
  • Banking
  • Sending orders
  • Investing

4
Security Made E-Commerce Possible
  • The most common form of e-commerce transaction
    consists of a retail purchase from a catalog.
  • Provides a way for user to
  • Purchase the item
  • Manipulate a shopping cart
  • Select a payment method

5
Secure Sockets
  • A browser keeps messages private by using
    encryption technology.
  • Sends information over the Internet by to the
    server.
  • Handles the details
  • Encrypts the message before sending it

6
Public Key Encryption Provides Authenticity
  • Public key encryption is surprisingly general.
  • Guarantees confidential messages
  • Used to verify authenticity

7
Digital Signatures
  • Encryption technology guarantees that a digital
    signature cannot be forged.
  • Created by encrypting the senders private key
  • Cannot be a scanned version of a conventional
    signature

8
Certificates Contain Public Keys
  • Trusted companies register public keys and
    communicate them as needed.
  • Provides browser with public key
  • Called a digital certificate
  • Uses encryption to guarantee security

9
What Is Digital Money?
  • Digital cash should be the equivalent of the cash
    people carry with them to make small purchases.
  • Could be in the form of a debit card
  • Allows user to replenish the amount available

10
Digital Cash Is Not Widely Available
  • Several steps are required to make digital cash
    operate.
  • Not possible for a bank to transfer real money to
    an electronic wallet
  • Must obtain authorization from user
  • Suited for small purchases
  • Reduced profit margin

11
Business And E-Commerce
  • How does e-commerce affect business?
  • Affected by two aspects of a company
  • External
  • Business-to-business communication
  • Internal
  • Reports for summarization
  • Sales
  • Delivery
  • Items on hand

12
A Business Must Protect Its Networks
  • The final item a business needs for e-commerce is
    protection against malicious attack.
  • Hackers
  • Break into computers
  • Steal or change information
  • Display antisocial behavior

13
Firewalls Protect Networks
  • The most widely used mechanism to protect private
    networks from outside attack is known as an
    Internet firewall.

14
Figure 30.1 Illustration of a firewall that
protects a companys internal networks and
computers from outside attack.
15
A Firewall Filters Packets
  • A firewall prevents accidental access.
  • Prevents outsiders from accessing files
  • Protects against all access to unknown services

16
Firewalls Guard Against Trojan Horses
  • Firewalls protect the company from inside the
    company as well.
  • Eliminates vulnerability to a Trojan horse attack
  • Can arrive in email

17
Conclusion
  • Why is digital cash not widely available?
  • What is a Trojan horse?

18
(No Transcript)
19
Glossary
  • Digital Signature
  • An encrypted message that authenticates the
    author of a document.
  • Electronic Commerce
  • (e-commerce) A general reference to any business
    conducted over the Internet.

20
Glossary
  • Firewall
  • A security mechanism placed between a company and
    the Internet to protect the companys computers
    from attack.
  • Key
  • A string used to encrypt data to keep it secure.

21
Glossary
  • Private Key
  • One of two keys issued to a user for security. A
    user must keep their private key secret.
  • Public Key
  • One of two keys issued to a user for security. A
    user tells everyone their public key.

22
Glossary
  • Secure Socket Layer
  • (SSL) A mechanism invented by Netscape, Inc. to
    provide secure communication between a browser
    and a server.

23
Glossary
  • Trojan Horse
  • A security attack in which someone inside a
    company is tricked into running a computer
    program that sends information from the persons
    computer to an outsider.
Write a Comment
User Comments (0)
About PowerShow.com