Chapters 1-8 notes - SRU Computer Science

Download Report

Transcript Chapters 1-8 notes - SRU Computer Science

Chapter 1: E-commerce Growth
Internet Growth Study of 2000 companies
By 2002, over a trillion dollars in revenue
Billions of
dollars 600
500
400
Internet Co.
E-commerce
300
200
100
0
1998
1999
E-business & E-commerce
 Revolutionize conventional business
models
Transition from brick and mortar
Personalize user’s experience
Privacy Invasion
Multimedia and e-commerce packaged
Intro to Computers 
 Hardware
– Input, output, memory
– ALU, CPU, storage
 Languages
– Machine
– Assembly
– High level
 Structured
Programming
 Internet History
–
–
–
–
–
–
60’s ARPAnet
TCP/IP
DARPA
Csnet
80’s Internet
90’s WWW
Internet Software you
should know
will learn
 Browsers
– IE, Netscape
 E-mail
 Chat
 ftp
HTML
Javascript
DHTML
VBscript
XML
ASP
Chapter 3: e-Business
A company that has a online presence
 Storefront model
– Shopping cart technology
-- amazon.com
– Shopping mall – mall.com
 Auction model – liquidprice.com, ebay.com
 Dynamic pricing model
– Name your price – priceline.com
– Comparison Pricing – Bottomdollar.com
– Demand Sensitive Pricing – www.mercata.com
– Bartering, rebates, free products and services
 Portal model – hotbot.com
E-businesses
 Business to
business (B2B)
– Buying, selling,
partnering,
bartering, trading
 Online trading and
lending
 Getting loans
 Recruiting
 News
 Travel
 Entertainment
 Automotive
 Energy
 Selling Brain
Power
 Art
 E-learning
Chapter 4 – Internet Marketing
5 – Online Monetary Transacts
 Advertising on the
web
 Choosing a domain
name
 ….
 Take Dr. Orvis’
course, not mine 
Chapter 6 – Legal, Ethical and
Social Issues; Internet Taxation
Right to Privacy
–
–
–
–
Cookies
Tracking devices
Employer/Employee
User protection:
PrivacyX.com
– Business protection:
PrivacyBot.com
Legal Issues
– Defamation of char
– Sexually explicit
speech
– Children (netnanny)
– Intellectual Property
– Copyright Issues
mp3, napster…
Social Issues; Internet Taxation
Trademarks
Domain Registration
Unsolicited
Social Issues
Online communities
Activism
disabilities
commercial e-mail
Global Issues
(SPAM
Online Auctions
Taxation
Online Contracts
Chapter 7: Computer and
Network Security
Secure Transactions
–
–
–
–
Privacy: captured or passed on
Integrity: altered
Authentication: prove identities
Non-repudiation: prove message sent or
received
Cryptography
 Transform data using a key
 Plaintext: Unencrypted
 Ciphertext: encrypted data
 Cipher or cryptosystem – encryption algo.
 Substitution cipher
 Transposition cipher
 The longer the key (128 bits), the stronger the
encryption
Secret key cryptography
symmetric cryptography
 Both sender and receiver need to know key
 How do you send the key securely?
– Courier
 Key distribution center (KDC)
– Session key generated
– Sent to merchant and customer
– Using key already held
 Data Encryption Standard (DES)
– 64 bit key example of symmetric crypto
 Triple DES
Public key cryptography
Asymmetric cryptography
 Two inversely related keys
– Private key: kept secret by owner
– Public key: freely distributed
 Cannot deduce private key from public
 Sender encrypts using receiver’s public key
 Receiver decrypts using receiver’s private key
 Keys are mathematically related
 Computational intensive
Symmetric vs. Asymmetric
cryptography
 Asymmetric not efficient for large amounts of
data
 Use public key to determine key for symmetric
encryption on insecure medium
 Key agreement protocol
– Process by which two parties can exchange keys over
insecure medium
– Protocol sets the rules for communication
 Digital Envelope
– Message encrypted using symmetric secret key
– Sym secret key encrypted using public-key encrypt
– Sends both as one message
Security Protocols
 Secure Sockets Layer (SSL)
– Netscape; secure communication on web
– Public key technology and digital certificates
– Does not protect private info like credit cards
 Secure Electronic Transaction (SET)
–
–
–
–
Protocol developed by Visa and MasterCard
Digital certificates to authenticate
Public key
Merchant never sees credit card info
Security Attacks
 Denial of service
– Disrupt service, attack routing tables
– Network resources taken up by unauthorized users
 Viruses
– Attached to other programs
– Replicates, corrupts files
– Melissa and ILOVEYOU
 Worms
– Like viruses but do not need to be attached
Viruses
 Hackers
 Transient virus
– Attaches to specific program. Live during execution
 Logic bomb and time bomb
– Triggers when given condition met
 Trojan horse
– Hides in friendly program
 Web defacing
– Enter Web site and change contents
Network Security
 Firewalls
– Protect LAN from outside
 Packet filtering firewall
– Filters packets from outside with local addresses
– Does not examine data  viruses
 Application-level gateway
– Screen actual data
– Firewalls
 Kerberos
– MIT, symmetric secret key, internal attacks
– Ticket Granting Service maintains DB of valid users
Chapter 8: Hardware, Software
and Communications
 Internet Structure
–
–
Host computers with IP address
Packets with source address, destination address,
sequencing information, error-control information
– Routers: move packets efficiently. Failures.
 Hardware
– Server: Web, e-mail, database, file
– Client
– Communication Media:Wire, fiber, satellite,
microwave, repeater
– Storage Area Networks (SANs): high-capacity
data delivery and storage on a network
Connecting to the Internet
 Internet Service Provider (ISP)
– Analog to digital (modem)
 Digital Subscriber Lines (DSL)
– High bandwidth of existing copper (upto 55Mbps)
– Special HW at phone co; speed decrease over distance
 Broadband
– High bandwidth provided by cable TV and tele co.
– Cable modem (downstream 384Kbps –1.5Mbps)
 Integrated Services Digital Network(ISDN)
– High-speed connections (128Kbps)
– Need Terminal Adaptor (TA) and ISP  $$
 Wireless: Cell phones, palms
 WebTV: Connect TV to ISP
Software
 Application Service Providers (ASPs)
– Maintain application and update as needed
– Provide Virtual Private Networks (VPNs)
– Point-to-point tunneling protocol (PPTP)
 Operating Systems (OS)
– Linux
 Databases (DB)
– Relational
– DBMS
– SQL