bba ii cam u iv-information systems application & computer security

53
Information Systems Application & Computer Security Course:-B.B.A.-II Subject: Computer Applications in Management Unit:-4

Upload: rai-university

Post on 17-Aug-2015

49 views

Category:

Education


2 download

TRANSCRIPT

Page 1: Bba ii cam  u iv-information systems application & computer security

Information Systems Application & Computer Security

Course:-B.B.A.-II

Subject: Computer Applications in Management

Unit:-4

Page 2: Bba ii cam  u iv-information systems application & computer security

Cloud ComputingWith traditional desktop computing, we run copies of

software programs on our own computer. The

documents we create are stored on our own pc.

Although documents can be accessed from other

computers on the network, they can’t be accessed by

computers outside the network. This is PC-centric.

Page 3: Bba ii cam  u iv-information systems application & computer security

Cloud Computing

With cloud computing, the software programs one use aren’t run from one’s personal computer, but are rather stored on servers accessed via the Internet.

Page 4: Bba ii cam  u iv-information systems application & computer security

Cloud Computing If a computer crashes, the software is still available

for others to use. Same goes for the documents one

create; they’re stored on a collection of servers

accessed via the Internet.

Anyone with permission can not only access the

documents, but can also edit and collaborate on those

documents in real time.

Unlike traditional computing, this cloud computing

model isn’t PC-centric, it’s document-centric.

Page 5: Bba ii cam  u iv-information systems application & computer security

What Is Cloud Computing? Key to the definition of cloud computing is the “cloud”

itself. Here , the cloud is a large group of interconnected

computers.

These computers can be personal computers or network

servers; they can be public or private.

Access is via the Internet. Any authorized user can access

these docs and apps from any computer over any Internet

connection.

Page 6: Bba ii cam  u iv-information systems application & computer security

What Is Cloud Computing?

This cloud of computers extends beyond a single company or enterprise. The applications and data served by the cloud are available to broad group of users, cross-enterprise and cross-platform.

Page 7: Bba ii cam  u iv-information systems application & computer security
Page 8: Bba ii cam  u iv-information systems application & computer security

key properties of cloud computing:

Cloud Computing Is User Centric :

Once as a user are connected to the cloud, whatever is stored there—documents, messages, images, applications, whatever—becomes authorized to the user access them. In addition, not only is the data, but one can also share it with others.

Page 9: Bba ii cam  u iv-information systems application & computer security

Cloud Computing Is Powerful:

Connecting hundreds or thousands of computers

together in a cloud creates a wealth of computing

power impossible with a single desktop PC.

key properties of cloud computing

Page 10: Bba ii cam  u iv-information systems application & computer security

Cloud Computing Is Accessible:

Because data is stored in the cloud, users can instantly

retrieve more information from multiple repositories. We

are not limited to a single source of data, as we do with a

desktop PC.

Cloud Computing Is Intelligent:

With all the various data stored on the computers in a

cloud,data mining and analysis are necessary to access that

information in an intelligent manner.

Page 11: Bba ii cam  u iv-information systems application & computer security

Cloud Computing Is Programmable:

Many of the tasks necessary with cloud computing must

be automated. For example, to protect the integrity of the

data, information stored on a single computer in the cloud

must be replicated on other computers in the cloud. If that

one computer goes offline, the cloud’s programming

automatically redistributes that computer’s data to a new

computer in the cloud.

Page 12: Bba ii cam  u iv-information systems application & computer security

Understanding Cloud Architecture:

Individual users connect to the cloud from their own

personal computers or portable devices, over the Internet.

To these individual users, the cloud is seen as a single

application, device, or document. The hardware in the

cloud (and the operating system that manages the hardware

connections) is invisible.

Page 13: Bba ii cam  u iv-information systems application & computer security

Conclusion

Thus cloud computing provide a super-computing

power .This cloud of computers extends beyond a

single company or enterprise.

The applications and data served by the cloud are

available to broad group of users, cross-enterprise

and cross-platform.

Page 14: Bba ii cam  u iv-information systems application & computer security

What is Commerce

According to Dictionary.com Commerce is a division of trade or production

which deals with the exchange of goods and services from producer to final consumer

It comprises the trading of something of economic value such as goods, services, information, or money between two or more entities

Page 15: Bba ii cam  u iv-information systems application & computer security

What is E-Commerce

Commonly known as Electronic Marketing. “It consist of buying and selling goods and services

over an electronic systems Such as the internet and other computer networks.”

“E-commerce is the purchasing, selling and exchanging goods and services over computer networks (internet) through which transaction or terms of sale are performed

Page 16: Bba ii cam  u iv-information systems application & computer security

Why use e-commerce?

LOW ENTRY COST REDUCES TRANSACTION COSTS ACCESS TO THE GLOBAL MARKET SECURE MARKET SHARE

Page 17: Bba ii cam  u iv-information systems application & computer security

Brief History of E-Commerce 1970s: Electronic Funds Transfer (EFT) Used by the banking industry to exchange account

information over secured networks Late 1970s and early 1980s: Electronic Data

Interchange (EDI) for e-commerce within companies Used by businesses to transmit data from one business

to another 1990s: the World Wide Web on the Internet provides

easy-to-use technology for information publishing and dissemination

Cheaper to do business (economies of scale) Enable diverse business activities (economies of scope

Page 18: Bba ii cam  u iv-information systems application & computer security

The Process Of E-Commerce A consumer uses Web browser to connect to the

home page of a merchant's Web site on the Internet. The consumer browses the catalog of products

featured on the site and selects items to purchase. The selected items are placed in the electronic equivalent of a shopping cart.

When the consumer is ready to complete the purchase of selected items, she provides a bill-to and ship-to address for purchase and delivery

Page 19: Bba ii cam  u iv-information systems application & computer security

The Process Of E-Commerce

When the merchant's Web server receives this information, it computes the total cost of the order--including tax, shipping, and handling charges--and then displays the total to the customer.

The customer can now provide payment information, such as a credit card number, and then submit the order.

Page 20: Bba ii cam  u iv-information systems application & computer security

The Process Of E-Commerce

When the credit card number is validated and the order is completed at the Commerce Server site, the merchant's site displays a receipt confirming the customer's purchase.

The Commerce Server site then forwards the order to a Processing Network for payment processing and fulfillment.

Page 21: Bba ii cam  u iv-information systems application & computer security

Types Of E-commerece

Business-to-business (B2B) B2B stands for Business to Business. It consists of

largest form of Ecommerce. This model defines that Buyer and seller are two different entities. It is similar to manufacturer issuing goods to the retailer or wholesaler. 

E.g.:-Dell deals computers and other associated accessories online but it is does not make up all those products. So, in govern to deal those products, first step is to purchases them from unlike businesses i.e. the producers of those

Page 22: Bba ii cam  u iv-information systems application & computer security

Business-to-consumer (B2C):

It is the model taking businesses and consumers interaction. The basic concept of this model is to sell the product online to the consumers.

B2c is the direct trade between the company and consumers. It provides direct selling through online. For example: if you want to sell goods and services to customer so that anybody can purchase any products directly from supplier’s

Page 23: Bba ii cam  u iv-information systems application & computer security

Business-to-Employee (B2E)

Business-to-employee (B2E)  electronic commerce uses an intrabusiness network

which allows companies to provide products and/or services to their employees. Typically, companies use B2E networks to automate employee-related corporate processes.

Page 24: Bba ii cam  u iv-information systems application & computer security

Consumer-to-consumer (C2C)

There are many sites offering free classifieds, auctions, and forums where individuals can buy and sell thanks to online payment systems like PayPal where people can send and receive money online with ease. eBay's auction service is a great example of where person-to-person transactions take place everyday since 1995.

Page 25: Bba ii cam  u iv-information systems application & computer security

PROS AND CONS OF E-COMMERCE PROS (Advantages) No checkout queues

Reduce prices

You can shop anywhere in the world

Easy access 24 hours a day

Wide selection to cater for all consumers

Page 26: Bba ii cam  u iv-information systems application & computer security

CONS (Disadvantages)

Unable to examine products personally

Not everyone is connected to the Internet

There is the possibility of credit card number theft

On average only 1/9th of stock is available on the net

Page 27: Bba ii cam  u iv-information systems application & computer security

Future of E-commerce in India

According to business world estimate near about Sixty thousand new jobs will be created for the internet world alone in the next two years

e-Commerce transactions are expected to cross the Rs. 3500 crore milestone in 2010-11, a jump of around 350 percent from the 2008-09 figure of Rs. 1000 crore

eBay said that consumers were trading goods worth almost three crore rupees everyday, across the globe.

Page 28: Bba ii cam  u iv-information systems application & computer security

M-Commerce

M-Commerce Definition "Mobile Commerce is the use of information

technologies and communication technologies for the purpose of mobile integration of different value chains an business processes, and for the purpose of management of business relationships.”

Page 29: Bba ii cam  u iv-information systems application & computer security

Life Cycle Content provider can build its service using applications

from multiple application developers and also can aggregate content from other content providers and can supply the aggregated content to a network operator or service provider.

Service providers can also act as content aggregators, but are unlikely to act as either an application or content provider due to their focus on the network and service aspects of m-commerce.

Wireless carriers can play a very active and important role in the mobile commerce applications and services due to the fact that mobile user is going through their network to perform all mobile commerce transactions.

Mobile user is likely to prefer a common bill for voice, data and mobile commerce services.

Page 30: Bba ii cam  u iv-information systems application & computer security

M-Commerce Emerging Applications

Mobile Financial Applications (MFA) Mobile Advertising (MA) Mobile Inventory Management (MIM) Product Location and Search (PLS)

Page 31: Bba ii cam  u iv-information systems application & computer security

MFA (Mobile Financial Applications)

Mobile financial applications are likely to be one of the most important components of m-commerce.

They could involve a variety of applications such as mobile banking and brokerage service, mobile money transfer, and mobile payments.

Page 32: Bba ii cam  u iv-information systems application & computer security

MA (Mobile Advertising) Mobile advertising is also a very important class of

mobile commerce applications. Using demographic information collected by wireless

service providers and information on the current location of mobile users, much targeted advertising can be done.

Page 33: Bba ii cam  u iv-information systems application & computer security

MIM (Mobile Inventory Management)

This class of application involves location tracking of goods, services and even people.

The tracking of goods may help service providers in determining the time of delivery to customer, thus improving customer service and obtaining a competitive edge over other business.

Page 34: Bba ii cam  u iv-information systems application & computer security

PLS (Product Location & Search)

This class of application includes locating an item in a particular area or location.

This is concerned with finding an item with certain specifications and whether it is available in a specified area or not.

Page 35: Bba ii cam  u iv-information systems application & computer security

M-Commerce Applications

Mobile Ticketing. Content Purchase and Delivery. Location based services. Information services. Mobile Banking.

Page 36: Bba ii cam  u iv-information systems application & computer security

Advantages and Disadvantages

Providing wider reach. Reducing time and order.

• Small screens of most devices still limit types of file and data transfer (i.e. streaming videos, etc.)

• Standards guiding applications and technology development and connection's)

• WAP and SMS limited to small number of characters and text.

• Use of graphics limited

Page 37: Bba ii cam  u iv-information systems application & computer security

What is a Firewall?

“A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer”

Page 38: Bba ii cam  u iv-information systems application & computer security

What is a Firewall?

The primary job of a firewall is to secure the inside network from the outside 

All traffic between the network and the internet in either direction must pass through the firewall.

The firewall decides if the traffic can be allowed to flow , or whether it must be stopped from proceeding further

Page 39: Bba ii cam  u iv-information systems application & computer security

Firewall Rules:

Allow – traffic that flows automatically because it has been deemed as “safe” (Ex. Meeting Maker, Eudora, etc.)

Block – traffic that is blocked because it has been deemed dangerous to your computer

Ask – asks the user whether or not the traffic is allowed to pass

Page 40: Bba ii cam  u iv-information systems application & computer security

CHARACTERISTICS OF FIREWALL

All traffic from inside to outside , and vice versa must pass through the firewall

Only the traffic authorized as per the local security policy should be allowed to pass through

User control

Behavior control

Page 41: Bba ii cam  u iv-information systems application & computer security

Types of Firewall

NETWORK LAYER FIREWALLS: Network layer firewalls generally make their

decisions based on the source address, destination address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from.

Page 42: Bba ii cam  u iv-information systems application & computer security

Types of Firewall

APPLICATION LAYER FIREWALLS : Application layer firewalls defined, are hosts running

proxy servers, which permit no traffic directly between networks, and they perform elaborate logging and examination of traffic passing through them

Page 43: Bba ii cam  u iv-information systems application & computer security

Types of Firewall

PROXY FIREWALLS:Proxy firewalls offer more security than other

types of firewalls, but this is at the expense of speed and functionality, as they can limit which applications your network can support.

Page 44: Bba ii cam  u iv-information systems application & computer security

What is e-government?

Information or transactions provided on-line by local governments to citizens using the Internet and Web sites.

The complexity of Web sites ranges from those that merely provide information to others that allow electronic financial transactions

Examples: India (Andhraperdesh, Bangalore), Hong Kong, Singapore, Malaysia, Newzeland, Australia, UK, Germany and many states of USA

Page 45: Bba ii cam  u iv-information systems application & computer security

Definition

Anonymous

In an Electronic Government

• There is no official seal / signature

• There is no paper

• There is no holiday

• There is no division / section

• There is no boundary of cities

• There is no public office

Page 46: Bba ii cam  u iv-information systems application & computer security

Another definition

E-government consist of four areas of services

G2C- Government to Citizen

G2G- Government to Government

G2B- Government to Business

G2E- Government to Employee

Page 47: Bba ii cam  u iv-information systems application & computer security

G2C- Government to Citizen All gov to citizen information should available online

News

All public-department interaction forms

On-line form submission

Transactions (payments)

Revenue collection, payment of utility bills

On-line complaints

Track & Trace System: e-citizen can trace all his own complaints and submitted cases and can get online updated info (case situation, any objection, rejection or approval)

Citizen Registration: Birth and marriage reg. ID Card, Domicile, Driving License, Job matching, Land use application

Page 48: Bba ii cam  u iv-information systems application & computer security

G2G- Government to Government Inter-Departmental Interaction Reporting, budgeting and planning to administrative,

P&D and financial departments. Interaction among multilevel governments Local Governments, Provincial Governments and

Federal Government Notices, summaries and policies for different

departments Inspections, observations and inquires Interaction between control offices and field offices

Page 49: Bba ii cam  u iv-information systems application & computer security

G2B- Government to Business e-Procurements

Tendering Expression Of Interest Request For Proposal Technical Evaluation Financial Evaluation Contract Awarding or Purchase Order

NOC & Licenses Cinema, petrol pump, etc.

Trade, Business and Industrial Policies Guidelines for different businesses Tax e Filing Loaning: Application submission, inspection verification

sanctioning using case management system and track and trace system

Page 50: Bba ii cam  u iv-information systems application & computer security

Primary Goals Successful e-government should aim to meet three : Improve the quality, cost, accessibility, and speed of

delivering government information and services.

Make government more accountable by increasing the opportunity for citizen participation in the governance process and bringing citizens closer to elected officials and public servants.

Organize the production and distribution of public information and services in new ways, that is, to transform government services to meet citizens’ needs in an automated world.

Page 51: Bba ii cam  u iv-information systems application & computer security

Key Benefits of e-gov

Less expensive e-Government transactions cost 65% less

compared to ordinary transactions More convenient hours 24 X 7 Reduced travel and waiting Benefits all customers

No Geographical Boundaries Reduction in bad check processing Reduction of time to recognize money

Page 52: Bba ii cam  u iv-information systems application & computer security

E-Government

20% Technology 35% BPR (Business Process Reengineering) 40% Change Management 05% Luck!

Page 53: Bba ii cam  u iv-information systems application & computer security

References

1. http://en.wikipedia.org/wiki/Cloud_computing

2. http://dictionary.reference.com/browse/cloud+computing

3. http://www.inthergroup.com/references/e-commerce

4. https://sites.google.com/a/riologica.net/cloud-computing-references/

5. http://www.reference.com/browse/e-commerce

6. http://cyber.law.harvard.edu/olds/ecommerce/library.html

7. http://www.vicomsoft.com/learning-center/firewalls/

8. http://en.wikipedia.org/wiki/Firewall_(computing)

9. http://dictionary.reference.com/browse/firewall?s=t