SlideShare une entreprise Scribd logo
1  sur  89
E-business  Infrastructure  and  Security Ron Cenfetelli Web Server Browser TCP/IP
History of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History of the Internet ,[object Object],[object Object],[object Object],Dr. J.C.R. Licklider  A message can be thought of as a short sequence of “bits” flowing through the network from one multiaccess computer to another. It consists of two types of information: control and data. Control information guides the transmission of data from source to destination. ... In short, the message processors function in the system as traffic directors, controllers, and correctors.  -Licklider & Taylor 1968
History of the Internet ,[object Object],[object Object]
History of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Feb 1996
Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
Internet usage, Canada & US
January 16, 2008 “ Internet penetration continues to show signs of hitting a plateau. The percentage of former users who say they have no intention of going back online continues to increase, and less than half of those who have never used the Internet plan to log on in the coming year. “
Digital Divide? Age ,  Education ,  Income  and  Location  appear to be highly predictive of broadband access
Internet Infrastructure Intranet T1 line Phone line T3 line Backbone Internet ISP Company A Person 2 POP NAP
Inside the Public Internet: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet: A Network of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Internet: A Network of Networks
Source: Fitzgerald & Dennis
http://www.caida.org/tools/visualization/walrus/gallery1/ries-t2.png
BusinessWeek: 15 Jan 2007
Jan 2000 Cooperative Association for Internet Data Analysis http://www.caida.org/analysis/topology/as_core_network/historical.xml
May 2003 http://www.caida.org/analysis/topology/as_core_network/historical.xml
April 2005 http://www.caida.org/analysis/topology/as_core_network/historical.xml
IP Addresses and the Domain Name System (DNS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Addresses and DNS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uniform Resource Locator (URL) http://www.sauder.ubc.ca/bcom/ PROTOCOL FOR THE WEB DIRECTORY Domain Name Uniform Resource Locater (URL) Host Computer Top Level Domain (TLD)
More on IP Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet: Client/Server Paradigm ,[object Object],[object Object],[object Object],[object Object]
The Client-Server Paradigm ,[object Object],[object Object],[object Object]
Protocols ,[object Object],[object Object]
Protocol Examples ,[object Object],[object Object],[object Object],[object Object],[object Object]
Putting Client/Server and Protocols Together ,[object Object],[object Object],[object Object],[object Object]
Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Protocol – TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP: Reliable Communication ,[object Object]
TCP Helps IP Guarantee Delivery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More on TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “Packet”
Routers Internet Routers POP NAP
Routers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP – Organized Chaos Brad sends “HELLO” to Al Al H E L Internet L O Packet Router
Internet in Action Internet 101.org © 1997-2004 Scott Cottingham
Internet    World Wide Web ,[object Object],[object Object],Internet  WWW
HTML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Protocol - HTTP ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with a lack of Connection & State ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cookies ,[object Object],www.msblabs.org FALSE /tools/scratch-pad/ FALSE 1227994064 data Ron%20is%20leaving%20a%20cookie Try it out at  http://www.msblabs.org/tools/scratch-pad/index.php Search for “cookies.txt” file under Documents and Settings
Web 2.0 – Moving beyond HTML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “Mashup” of Google Maps and Craigslist  ,[object Object],[object Object],[object Object],[object Object]
A summary of Internet Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security
Why Security Matters to e-Business Peter Steiner  -p. 61, The New Yorker, (July 5, 1993)
Wednesday, 2 January 2008,
 
 
Malware marries Web 2.0 “ Where human beings solve the puzzles the viruses cannot."
See link On WebCT
Security in the Physical World Lock Security forces Safe Signature Physical barriers Fingerprint Seal Contract
E-business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Simulation… ,[object Object],[object Object],[object Object],[object Object]
A Simulation… ,[object Object]
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Message Integrity – Threats & Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components:  Digital Signature ,[object Object]
Hashing ,[object Object],[object Object],[object Object],[object Object]
Hash Example ,[object Object],[object Object],[object Object],[object Object]
Hashing Hashing algorithm A value say X Hashing algorithm Y Sender Receiver If X = Y, message sent and received are the same. X message message X=Hash Value message X message
PKI Components: Digital Signature (cont.)  Note how the private/public key process is reversed! Compute digest from hashing algorithm Encrypt Digest Transmission Decrypt Digest Compute expecteddigest from hashing algorithm Confirm or deny integrity of message Cleartext  message Sender encrypts with his  private  key Cleartext message Receiver  decrypts w/ Sender’s public  key Digital Signature Digest Digest Expected Digest
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Hierarchies of Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components:  Digital certificate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components: Certification Authority ,[object Object],[object Object],[object Object],[object Object]
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Putting it all together… Customer Internet merchant Certificate authority Customer’s info requests and Merchant’s info are exchanged. Customer verifies Merchant (received msg’s are signed with a hash that can be  decrypted  with the merchant’s public keys held by CA)  Provides  encrypted information for purchases ( encrypted  with merchant’s public key). Credit card and message digest is signed with    customer’s  private  key. Merchant verifies Customer (received msg’s are signed with a hash that can be  decrypted  with the customer’s public keys held by CA) Customer’s Public Key Merchant’s Public Key
More Security and Identification We’ve discussed how to ID ourselves across the Internet, but how do we ID ourselves at our “point of presence”?
Physical Security Means ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
You've got security  (Wired News Sep. 21, 2004)   ,[object Object]
 
How the SmartCard (SecurID) Works  ,[object Object],[object Object],[object Object],[object Object],[object Object]
How the SmartCard (SecurID) Works  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics: Face Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Biometrics: Voice Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Biometrics: Fingerprint Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Security Limitations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations ,[object Object],[object Object]
Combination is Best Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viruses ,Worms, and Trojan horses… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Viruses,  Worms  and Trojan horses…
[object Object],[object Object],Viruses, Worms and  Trojan horses …
“ Symantec says the Trojan.Silentbanker has so far targeted over 400 banks around the world, but according to a blog posted by Symantec's Liam O’Murchu on January 14 [2008], the most worrying aspect is that the Trojan can perform  man-in-the-middle  attacks (where an attacker can read, insert and modify messages between two parties without either party knowing).”  http://m-net.net.nz/2157/latest-news/latest-news/trojan.silentbanker-defeats-2-factor-authentication-attacks-400-b.php
A local Trojan Horse Vancouver Sun - October 6, p. A3
Questions?  Comments?

Contenu connexe

Tendances

Digital Transformation Best Practices
Digital Transformation Best PracticesDigital Transformation Best Practices
Digital Transformation Best Practicesarrkgroup
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part IHem Pokhrel
 
Essentials of a platform business model
Essentials of a platform business modelEssentials of a platform business model
Essentials of a platform business modelValueCoders
 
Introduction to e_commerce
Introduction to e_commerceIntroduction to e_commerce
Introduction to e_commerceRevi Shahini
 
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...Monica Blanco
 
Traditional Marketing vs Digital Marketing
Traditional Marketing vs Digital MarketingTraditional Marketing vs Digital Marketing
Traditional Marketing vs Digital MarketingMouttou C Viramouttou
 
Traditional marketing vs e-marketing..
Traditional marketing vs e-marketing..Traditional marketing vs e-marketing..
Traditional marketing vs e-marketing..Amit Gupta
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Internet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business modelInternet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business modelSandesh Jonchhe
 
Online marketing mix ppt
Online marketing mix pptOnline marketing mix ppt
Online marketing mix pptloki03
 

Tendances (20)

E business
E businessE business
E business
 
Digital Transformation Best Practices
Digital Transformation Best PracticesDigital Transformation Best Practices
Digital Transformation Best Practices
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
Essentials of a platform business model
Essentials of a platform business modelEssentials of a platform business model
Essentials of a platform business model
 
Introduction to e_commerce
Introduction to e_commerceIntroduction to e_commerce
Introduction to e_commerce
 
E Commerce in B2B
E Commerce in B2BE Commerce in B2B
E Commerce in B2B
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
E commerece and-entrepreneurship.pptx;filename= utf-8''e-commerece and entrep...
 
Traditional Marketing vs Digital Marketing
Traditional Marketing vs Digital MarketingTraditional Marketing vs Digital Marketing
Traditional Marketing vs Digital Marketing
 
Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce
 
M-Commerce
M-CommerceM-Commerce
M-Commerce
 
M-Commerce
M-CommerceM-Commerce
M-Commerce
 
Traditional marketing vs e-marketing..
Traditional marketing vs e-marketing..Traditional marketing vs e-marketing..
Traditional marketing vs e-marketing..
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Internet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business modelInternet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business model
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
E commerce business model
E commerce business modelE commerce business model
E commerce business model
 
Online marketing mix ppt
Online marketing mix pptOnline marketing mix ppt
Online marketing mix ppt
 

Similaire à E-business Infrastructure and Security

How does the internet work
How does the internet workHow does the internet work
How does the internet workmraheel205
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Workssumit kumar
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxwalterl4
 
How does internet works
How does internet worksHow does internet works
How does internet worksRamonNavarro46
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet ProtocolMiles Priar
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraAmit Chandra
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technologyAnware Kade
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]Cr Faezah
 

Similaire à E-business Infrastructure and Security (20)

How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
 
How does internet works
How does internet worksHow does internet works
How does internet works
 
Session 2
Session 2Session 2
Session 2
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
CIS 1203 Introduction to the Web
CIS 1203 Introduction to the WebCIS 1203 Introduction to the Web
CIS 1203 Introduction to the Web
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
 
Internet
InternetInternet
Internet
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]
 
The Internet
The InternetThe Internet
The Internet
 
Internet
InternetInternet
Internet
 

Plus de Kimmy Chen

Shoplus thailand social e commerce tool
Shoplus thailand social e commerce toolShoplus thailand social e commerce tool
Shoplus thailand social e commerce toolKimmy Chen
 
2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 Kimmy Chen
 
發現你的天才與舞台
發現你的天才與舞台發現你的天才與舞台
發現你的天才與舞台Kimmy Chen
 
Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Kimmy Chen
 
直播效益與趨勢
直播效益與趨勢直播效益與趨勢
直播效益與趨勢Kimmy Chen
 
LIVEhouse.in OTT solution
LIVEhouse.in OTT solutionLIVEhouse.in OTT solution
LIVEhouse.in OTT solutionKimmy Chen
 
分析工具面面觀 Wow
分析工具面面觀   Wow分析工具面面觀   Wow
分析工具面面觀 WowKimmy Chen
 
About www.100co.com.tw
About www.100co.com.twAbout www.100co.com.tw
About www.100co.com.twKimmy Chen
 
UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案Kimmy Chen
 
SocialBuy Inc.
SocialBuy Inc. SocialBuy Inc.
SocialBuy Inc. Kimmy Chen
 
B2 B Sc And Emarkets
B2 B Sc And EmarketsB2 B Sc And Emarkets
B2 B Sc And EmarketsKimmy Chen
 
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Kimmy Chen
 
Changes Management - ACE case study
Changes Management - ACE case studyChanges Management - ACE case study
Changes Management - ACE case studyKimmy Chen
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificKimmy Chen
 
HOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeHOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeKimmy Chen
 
Diversity Management in Financial Insitution
Diversity Management in Financial InsitutionDiversity Management in Financial Insitution
Diversity Management in Financial InsitutionKimmy Chen
 
What Diversity Means to Me
What Diversity Means to MeWhat Diversity Means to Me
What Diversity Means to MeKimmy Chen
 
Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Kimmy Chen
 

Plus de Kimmy Chen (19)

Shoplus thailand social e commerce tool
Shoplus thailand social e commerce toolShoplus thailand social e commerce tool
Shoplus thailand social e commerce tool
 
Shoplus
ShoplusShoplus
Shoplus
 
2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班
 
發現你的天才與舞台
發現你的天才與舞台發現你的天才與舞台
發現你的天才與舞台
 
Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢
 
直播效益與趨勢
直播效益與趨勢直播效益與趨勢
直播效益與趨勢
 
LIVEhouse.in OTT solution
LIVEhouse.in OTT solutionLIVEhouse.in OTT solution
LIVEhouse.in OTT solution
 
分析工具面面觀 Wow
分析工具面面觀   Wow分析工具面面觀   Wow
分析工具面面觀 Wow
 
About www.100co.com.tw
About www.100co.com.twAbout www.100co.com.tw
About www.100co.com.tw
 
UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案
 
SocialBuy Inc.
SocialBuy Inc. SocialBuy Inc.
SocialBuy Inc.
 
B2 B Sc And Emarkets
B2 B Sc And EmarketsB2 B Sc And Emarkets
B2 B Sc And Emarkets
 
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
 
Changes Management - ACE case study
Changes Management - ACE case studyChanges Management - ACE case study
Changes Management - ACE case study
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay Pacific
 
HOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeHOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbe
 
Diversity Management in Financial Insitution
Diversity Management in Financial InsitutionDiversity Management in Financial Insitution
Diversity Management in Financial Insitution
 
What Diversity Means to Me
What Diversity Means to MeWhat Diversity Means to Me
What Diversity Means to Me
 
Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)
 

Dernier

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

E-business Infrastructure and Security

  • 1. E-business Infrastructure and Security Ron Cenfetelli Web Server Browser TCP/IP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
  • 7. Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
  • 9. January 16, 2008 “ Internet penetration continues to show signs of hitting a plateau. The percentage of former users who say they have no intention of going back online continues to increase, and less than half of those who have never used the Internet plan to log on in the coming year. “
  • 10. Digital Divide? Age , Education , Income and Location appear to be highly predictive of broadband access
  • 11. Internet Infrastructure Intranet T1 line Phone line T3 line Backbone Internet ISP Company A Person 2 POP NAP
  • 12.
  • 13.
  • 14.
  • 18. Jan 2000 Cooperative Association for Internet Data Analysis http://www.caida.org/analysis/topology/as_core_network/historical.xml
  • 21.
  • 22.
  • 23. Uniform Resource Locator (URL) http://www.sauder.ubc.ca/bcom/ PROTOCOL FOR THE WEB DIRECTORY Domain Name Uniform Resource Locater (URL) Host Computer Top Level Domain (TLD)
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 37.
  • 38. TCP/IP – Organized Chaos Brad sends “HELLO” to Al Al H E L Internet L O Packet Router
  • 39. Internet in Action Internet 101.org © 1997-2004 Scott Cottingham
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 49. Why Security Matters to e-Business Peter Steiner -p. 61, The New Yorker, (July 5, 1993)
  • 51.  
  • 52.  
  • 53. Malware marries Web 2.0 “ Where human beings solve the puzzles the viruses cannot."
  • 54. See link On WebCT
  • 55. Security in the Physical World Lock Security forces Safe Signature Physical barriers Fingerprint Seal Contract
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. Hashing Hashing algorithm A value say X Hashing algorithm Y Sender Receiver If X = Y, message sent and received are the same. X message message X=Hash Value message X message
  • 65. PKI Components: Digital Signature (cont.) Note how the private/public key process is reversed! Compute digest from hashing algorithm Encrypt Digest Transmission Decrypt Digest Compute expecteddigest from hashing algorithm Confirm or deny integrity of message Cleartext message Sender encrypts with his private key Cleartext message Receiver decrypts w/ Sender’s public key Digital Signature Digest Digest Expected Digest
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71. Putting it all together… Customer Internet merchant Certificate authority Customer’s info requests and Merchant’s info are exchanged. Customer verifies Merchant (received msg’s are signed with a hash that can be decrypted with the merchant’s public keys held by CA) Provides encrypted information for purchases ( encrypted with merchant’s public key). Credit card and message digest is signed with customer’s private key. Merchant verifies Customer (received msg’s are signed with a hash that can be decrypted with the customer’s public keys held by CA) Customer’s Public Key Merchant’s Public Key
  • 72. More Security and Identification We’ve discussed how to ID ourselves across the Internet, but how do we ID ourselves at our “point of presence”?
  • 73.
  • 74.
  • 75.  
  • 76.
  • 77.
  • 78. Biometrics: Face Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 79. Biometrics: Voice Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 80. Biometrics: Fingerprint Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. “ Symantec says the Trojan.Silentbanker has so far targeted over 400 banks around the world, but according to a blog posted by Symantec's Liam O’Murchu on January 14 [2008], the most worrying aspect is that the Trojan can perform man-in-the-middle attacks (where an attacker can read, insert and modify messages between two parties without either party knowing).” http://m-net.net.nz/2157/latest-news/latest-news/trojan.silentbanker-defeats-2-factor-authentication-attacks-400-b.php
  • 88. A local Trojan Horse Vancouver Sun - October 6, p. A3