SlideShare una empresa de Scribd logo
1 de 89
E-business  Infrastructure  and  Security Ron Cenfetelli Web Server Browser TCP/IP
History of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History of the Internet ,[object Object],[object Object],[object Object],Dr. J.C.R. Licklider  A message can be thought of as a short sequence of “bits” flowing through the network from one multiaccess computer to another. It consists of two types of information: control and data. Control information guides the transmission of data from source to destination. ... In short, the message processors function in the system as traffic directors, controllers, and correctors.  -Licklider & Taylor 1968
History of the Internet ,[object Object],[object Object]
History of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Feb 1996
Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
Internet usage, Canada & US
January 16, 2008 “ Internet penetration continues to show signs of hitting a plateau. The percentage of former users who say they have no intention of going back online continues to increase, and less than half of those who have never used the Internet plan to log on in the coming year. “
Digital Divide? Age ,  Education ,  Income  and  Location  appear to be highly predictive of broadband access
Internet Infrastructure Intranet T1 line Phone line T3 line Backbone Internet ISP Company A Person 2 POP NAP
Inside the Public Internet: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet: A Network of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Internet: A Network of Networks
Source: Fitzgerald & Dennis
http://www.caida.org/tools/visualization/walrus/gallery1/ries-t2.png
BusinessWeek: 15 Jan 2007
Jan 2000 Cooperative Association for Internet Data Analysis http://www.caida.org/analysis/topology/as_core_network/historical.xml
May 2003 http://www.caida.org/analysis/topology/as_core_network/historical.xml
April 2005 http://www.caida.org/analysis/topology/as_core_network/historical.xml
IP Addresses and the Domain Name System (DNS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Addresses and DNS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uniform Resource Locator (URL) http://www.sauder.ubc.ca/bcom/ PROTOCOL FOR THE WEB DIRECTORY Domain Name Uniform Resource Locater (URL) Host Computer Top Level Domain (TLD)
More on IP Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet: Client/Server Paradigm ,[object Object],[object Object],[object Object],[object Object]
The Client-Server Paradigm ,[object Object],[object Object],[object Object]
Protocols ,[object Object],[object Object]
Protocol Examples ,[object Object],[object Object],[object Object],[object Object],[object Object]
Putting Client/Server and Protocols Together ,[object Object],[object Object],[object Object],[object Object]
Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Protocol – TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP: Reliable Communication ,[object Object]
TCP Helps IP Guarantee Delivery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More on TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “Packet”
Routers Internet Routers POP NAP
Routers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP – Organized Chaos Brad sends “HELLO” to Al Al H E L Internet L O Packet Router
Internet in Action Internet 101.org © 1997-2004 Scott Cottingham
Internet    World Wide Web ,[object Object],[object Object],Internet  WWW
HTML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Protocol - HTTP ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with a lack of Connection & State ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cookies ,[object Object],www.msblabs.org FALSE /tools/scratch-pad/ FALSE 1227994064 data Ron%20is%20leaving%20a%20cookie Try it out at  http://www.msblabs.org/tools/scratch-pad/index.php Search for “cookies.txt” file under Documents and Settings
Web 2.0 – Moving beyond HTML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A “Mashup” of Google Maps and Craigslist  ,[object Object],[object Object],[object Object],[object Object]
A summary of Internet Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security
Why Security Matters to e-Business Peter Steiner  -p. 61, The New Yorker, (July 5, 1993)
Wednesday, 2 January 2008,
 
 
Malware marries Web 2.0 “ Where human beings solve the puzzles the viruses cannot."
See link On WebCT
Security in the Physical World Lock Security forces Safe Signature Physical barriers Fingerprint Seal Contract
E-business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Simulation… ,[object Object],[object Object],[object Object],[object Object]
A Simulation… ,[object Object]
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Message Integrity – Threats & Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components:  Digital Signature ,[object Object]
Hashing ,[object Object],[object Object],[object Object],[object Object]
Hash Example ,[object Object],[object Object],[object Object],[object Object]
Hashing Hashing algorithm A value say X Hashing algorithm Y Sender Receiver If X = Y, message sent and received are the same. X message message X=Hash Value message X message
PKI Components: Digital Signature (cont.)  Note how the private/public key process is reversed! Compute digest from hashing algorithm Encrypt Digest Transmission Decrypt Digest Compute expecteddigest from hashing algorithm Confirm or deny integrity of message Cleartext  message Sender encrypts with his  private  key Cleartext message Receiver  decrypts w/ Sender’s public  key Digital Signature Digest Digest Expected Digest
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Hierarchies of Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components:  Digital certificate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI Components: Certification Authority ,[object Object],[object Object],[object Object],[object Object]
e-Business Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI Asymmetric Keys and PKI
Putting it all together… Customer Internet merchant Certificate authority Customer’s info requests and Merchant’s info are exchanged. Customer verifies Merchant (received msg’s are signed with a hash that can be  decrypted  with the merchant’s public keys held by CA)  Provides  encrypted information for purchases ( encrypted  with merchant’s public key). Credit card and message digest is signed with    customer’s  private  key. Merchant verifies Customer (received msg’s are signed with a hash that can be  decrypted  with the customer’s public keys held by CA) Customer’s Public Key Merchant’s Public Key
More Security and Identification We’ve discussed how to ID ourselves across the Internet, but how do we ID ourselves at our “point of presence”?
Physical Security Means ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
You've got security  (Wired News Sep. 21, 2004)   ,[object Object]
 
How the SmartCard (SecurID) Works  ,[object Object],[object Object],[object Object],[object Object],[object Object]
How the SmartCard (SecurID) Works  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics: Face Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Biometrics: Voice Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Biometrics: Fingerprint Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
Security Limitations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations ,[object Object],[object Object]
Combination is Best Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viruses ,Worms, and Trojan horses… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Viruses,  Worms  and Trojan horses…
[object Object],[object Object],Viruses, Worms and  Trojan horses …
“ Symantec says the Trojan.Silentbanker has so far targeted over 400 banks around the world, but according to a blog posted by Symantec's Liam O’Murchu on January 14 [2008], the most worrying aspect is that the Trojan can perform  man-in-the-middle  attacks (where an attacker can read, insert and modify messages between two parties without either party knowing).”  http://m-net.net.nz/2157/latest-news/latest-news/trojan.silentbanker-defeats-2-factor-authentication-attacks-400-b.php
A local Trojan Horse Vancouver Sun - October 6, p. A3
Questions?  Comments?

Más contenido relacionado

La actualidad más candente

E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
knowledge management tools
knowledge management toolsknowledge management tools
knowledge management toolsAbin Biju
 
eCommerce Business Strategies
eCommerce Business StrategieseCommerce Business Strategies
eCommerce Business StrategiesUpekha Vandebona
 
The Digital Revolution
The Digital RevolutionThe Digital Revolution
The Digital RevolutionEnzo Iacono
 
An analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectorsAn analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectorsRohit Bhabal
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtNUS-ISS
 
Knowledge Management Information Technology Systems
Knowledge Management Information Technology SystemsKnowledge Management Information Technology Systems
Knowledge Management Information Technology SystemsFaruk Ortakaya
 
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckPitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckHajeJanKamps
 
WEB BASED INFORMATION RETRIEVAL SYSTEM
WEB BASED INFORMATION RETRIEVAL SYSTEMWEB BASED INFORMATION RETRIEVAL SYSTEM
WEB BASED INFORMATION RETRIEVAL SYSTEMSai Kumar Ale
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommercepreetikapri1
 
Knowledge management architecture
Knowledge management architectureKnowledge management architecture
Knowledge management architectureAdi S
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 

La actualidad más candente (20)

History of E commerce- Brief History
History of E commerce- Brief HistoryHistory of E commerce- Brief History
History of E commerce- Brief History
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
E auctions
E auctionsE auctions
E auctions
 
knowledge management tools
knowledge management toolsknowledge management tools
knowledge management tools
 
eCommerce Business Strategies
eCommerce Business StrategieseCommerce Business Strategies
eCommerce Business Strategies
 
The Digital Revolution
The Digital RevolutionThe Digital Revolution
The Digital Revolution
 
An analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectorsAn analysis study on Impact of e-business on different industry sectors
An analysis study on Impact of e-business on different industry sectors
 
Chapter 7 e crm
Chapter 7 e crmChapter 7 e crm
Chapter 7 e crm
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Knowledge Management Information Technology Systems
Knowledge Management Information Technology SystemsKnowledge Management Information Technology Systems
Knowledge Management Information Technology Systems
 
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckPitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
 
WEB BASED INFORMATION RETRIEVAL SYSTEM
WEB BASED INFORMATION RETRIEVAL SYSTEMWEB BASED INFORMATION RETRIEVAL SYSTEM
WEB BASED INFORMATION RETRIEVAL SYSTEM
 
AI in security
AI in securityAI in security
AI in security
 
architecture framework for ecommerce
architecture framework for ecommercearchitecture framework for ecommerce
architecture framework for ecommerce
 
Knowledge management architecture
Knowledge management architectureKnowledge management architecture
Knowledge management architecture
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
CS8080 IRT UNIT I NOTES.pdf
CS8080 IRT UNIT I  NOTES.pdfCS8080 IRT UNIT I  NOTES.pdf
CS8080 IRT UNIT I NOTES.pdf
 
UTILITY OF AI
UTILITY OF AIUTILITY OF AI
UTILITY OF AI
 

Similar a E-business Infrastructure and Security

How does the internet work
How does the internet workHow does the internet work
How does the internet workmraheel205
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Workssumit kumar
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxwalterl4
 
How does internet works
How does internet worksHow does internet works
How does internet worksRamonNavarro46
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet ProtocolMiles Priar
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraAmit Chandra
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technologyAnware Kade
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]Cr Faezah
 

Similar a E-business Infrastructure and Security (20)

How does the internet work
How does the internet workHow does the internet work
How does the internet work
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docxChapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
Chapter 3 Computer and Network ArchitecturesRobert Hoyt MDW.docx
 
CS1308 - 02/08/10
CS1308 - 02/08/10CS1308 - 02/08/10
CS1308 - 02/08/10
 
How does internet works
How does internet worksHow does internet works
How does internet works
 
Session 2
Session 2Session 2
Session 2
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
CIS 1203 Introduction to the Web
CIS 1203 Introduction to the WebCIS 1203 Introduction to the Web
CIS 1203 Introduction to the Web
 
internetEven though the internet is still a young technology
internetEven though the internet is still a young technologyinternetEven though the internet is still a young technology
internetEven though the internet is still a young technology
 
Internet
InternetInternet
Internet
 
Microsoft power point internet history and growth [compatibility mode]
Microsoft power point   internet history and growth [compatibility mode]Microsoft power point   internet history and growth [compatibility mode]
Microsoft power point internet history and growth [compatibility mode]
 
The Internet
The InternetThe Internet
The Internet
 
Internet
InternetInternet
Internet
 

Más de Kimmy Chen

Shoplus thailand social e commerce tool
Shoplus thailand social e commerce toolShoplus thailand social e commerce tool
Shoplus thailand social e commerce toolKimmy Chen
 
2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 Kimmy Chen
 
發現你的天才與舞台
發現你的天才與舞台發現你的天才與舞台
發現你的天才與舞台Kimmy Chen
 
Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Kimmy Chen
 
直播效益與趨勢
直播效益與趨勢直播效益與趨勢
直播效益與趨勢Kimmy Chen
 
LIVEhouse.in OTT solution
LIVEhouse.in OTT solutionLIVEhouse.in OTT solution
LIVEhouse.in OTT solutionKimmy Chen
 
分析工具面面觀 Wow
分析工具面面觀   Wow分析工具面面觀   Wow
分析工具面面觀 WowKimmy Chen
 
About www.100co.com.tw
About www.100co.com.twAbout www.100co.com.tw
About www.100co.com.twKimmy Chen
 
UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案Kimmy Chen
 
SocialBuy Inc.
SocialBuy Inc. SocialBuy Inc.
SocialBuy Inc. Kimmy Chen
 
B2 B Sc And Emarkets
B2 B Sc And EmarketsB2 B Sc And Emarkets
B2 B Sc And EmarketsKimmy Chen
 
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Kimmy Chen
 
Changes Management - ACE case study
Changes Management - ACE case studyChanges Management - ACE case study
Changes Management - ACE case studyKimmy Chen
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificKimmy Chen
 
HOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeHOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeKimmy Chen
 
Diversity Management in Financial Insitution
Diversity Management in Financial InsitutionDiversity Management in Financial Insitution
Diversity Management in Financial InsitutionKimmy Chen
 
What Diversity Means to Me
What Diversity Means to MeWhat Diversity Means to Me
What Diversity Means to MeKimmy Chen
 
Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Kimmy Chen
 

Más de Kimmy Chen (19)

Shoplus thailand social e commerce tool
Shoplus thailand social e commerce toolShoplus thailand social e commerce tool
Shoplus thailand social e commerce tool
 
Shoplus
ShoplusShoplus
Shoplus
 
2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班 2小時 直播節目製作總監養成班
2小時 直播節目製作總監養成班
 
發現你的天才與舞台
發現你的天才與舞台發現你的天才與舞台
發現你的天才與舞台
 
Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢Livehouse.in 直播影音趨勢
Livehouse.in 直播影音趨勢
 
直播效益與趨勢
直播效益與趨勢直播效益與趨勢
直播效益與趨勢
 
LIVEhouse.in OTT solution
LIVEhouse.in OTT solutionLIVEhouse.in OTT solution
LIVEhouse.in OTT solution
 
分析工具面面觀 Wow
分析工具面面觀   Wow分析工具面面觀   Wow
分析工具面面觀 Wow
 
About www.100co.com.tw
About www.100co.com.twAbout www.100co.com.tw
About www.100co.com.tw
 
UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案UDN新聞網 + Tagtoo標籤功聚合作案
UDN新聞網 + Tagtoo標籤功聚合作案
 
SocialBuy Inc.
SocialBuy Inc. SocialBuy Inc.
SocialBuy Inc.
 
B2 B Sc And Emarkets
B2 B Sc And EmarketsB2 B Sc And Emarkets
B2 B Sc And Emarkets
 
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
Cathay Pacific Evaluation - 3 Steps To Defining A Strategic Approach To Outso...
 
Changes Management - ACE case study
Changes Management - ACE case studyChanges Management - ACE case study
Changes Management - ACE case study
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay Pacific
 
HOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbeHOW’S THE ADVERTISING OPPORTUNTIESbe
HOW’S THE ADVERTISING OPPORTUNTIESbe
 
Diversity Management in Financial Insitution
Diversity Management in Financial InsitutionDiversity Management in Financial Insitution
Diversity Management in Financial Insitution
 
What Diversity Means to Me
What Diversity Means to MeWhat Diversity Means to Me
What Diversity Means to Me
 
Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)Introduction to Project Portfolio Management (PPM)
Introduction to Project Portfolio Management (PPM)
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

E-business Infrastructure and Security

  • 1. E-business Infrastructure and Security Ron Cenfetelli Web Server Browser TCP/IP
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
  • 7. Growth in the Internet Population (% of Americans who go online) – source Pew Internet and American Life Foundation
  • 9. January 16, 2008 “ Internet penetration continues to show signs of hitting a plateau. The percentage of former users who say they have no intention of going back online continues to increase, and less than half of those who have never used the Internet plan to log on in the coming year. “
  • 10. Digital Divide? Age , Education , Income and Location appear to be highly predictive of broadband access
  • 11. Internet Infrastructure Intranet T1 line Phone line T3 line Backbone Internet ISP Company A Person 2 POP NAP
  • 12.
  • 13.
  • 14.
  • 18. Jan 2000 Cooperative Association for Internet Data Analysis http://www.caida.org/analysis/topology/as_core_network/historical.xml
  • 21.
  • 22.
  • 23. Uniform Resource Locator (URL) http://www.sauder.ubc.ca/bcom/ PROTOCOL FOR THE WEB DIRECTORY Domain Name Uniform Resource Locater (URL) Host Computer Top Level Domain (TLD)
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 37.
  • 38. TCP/IP – Organized Chaos Brad sends “HELLO” to Al Al H E L Internet L O Packet Router
  • 39. Internet in Action Internet 101.org © 1997-2004 Scott Cottingham
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 49. Why Security Matters to e-Business Peter Steiner -p. 61, The New Yorker, (July 5, 1993)
  • 51.  
  • 52.  
  • 53. Malware marries Web 2.0 “ Where human beings solve the puzzles the viruses cannot."
  • 54. See link On WebCT
  • 55. Security in the Physical World Lock Security forces Safe Signature Physical barriers Fingerprint Seal Contract
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64. Hashing Hashing algorithm A value say X Hashing algorithm Y Sender Receiver If X = Y, message sent and received are the same. X message message X=Hash Value message X message
  • 65. PKI Components: Digital Signature (cont.) Note how the private/public key process is reversed! Compute digest from hashing algorithm Encrypt Digest Transmission Decrypt Digest Compute expecteddigest from hashing algorithm Confirm or deny integrity of message Cleartext message Sender encrypts with his private key Cleartext message Receiver decrypts w/ Sender’s public key Digital Signature Digest Digest Expected Digest
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71. Putting it all together… Customer Internet merchant Certificate authority Customer’s info requests and Merchant’s info are exchanged. Customer verifies Merchant (received msg’s are signed with a hash that can be decrypted with the merchant’s public keys held by CA) Provides encrypted information for purchases ( encrypted with merchant’s public key). Credit card and message digest is signed with customer’s private key. Merchant verifies Customer (received msg’s are signed with a hash that can be decrypted with the customer’s public keys held by CA) Customer’s Public Key Merchant’s Public Key
  • 72. More Security and Identification We’ve discussed how to ID ourselves across the Internet, but how do we ID ourselves at our “point of presence”?
  • 73.
  • 74.
  • 75.  
  • 76.
  • 77.
  • 78. Biometrics: Face Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 79. Biometrics: Voice Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 80. Biometrics: Fingerprint Source: http://www.zdnet.com/products/stories/reviews/0,4161,2204062,00.html
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. “ Symantec says the Trojan.Silentbanker has so far targeted over 400 banks around the world, but according to a blog posted by Symantec's Liam O’Murchu on January 14 [2008], the most worrying aspect is that the Trojan can perform man-in-the-middle attacks (where an attacker can read, insert and modify messages between two parties without either party knowing).” http://m-net.net.nz/2157/latest-news/latest-news/trojan.silentbanker-defeats-2-factor-authentication-attacks-400-b.php
  • 88. A local Trojan Horse Vancouver Sun - October 6, p. A3