Chapter 1: E-commerce Growth
Internet Growth Study of 2000 companiesBy 2002, over a trillion dollars in revenue
0
100
200
300
400
500
600
1998 1999
Internet Co.
E-commerce
Billions of dollars
E-business & E-commerce
Revolutionize conventional business models
Transition from brick and mortarPersonalize user’s experiencePrivacy InvasionMultimedia and e-commerce packaged
Intro to Computers
Hardware– Input, output, memory – ALU, CPU, storage
Languages– Machine– Assembly– High level
Structured Programming
Internet History– 60’s ARPAnet
– TCP/IP
– DARPA
– Csnet
– 80’s Internet
– 90’s WWW
Internet Software youshould know will learn
Browsers– IE, Netscape
E-mailChat ftp
HTMLJavascriptDHTMLVBscriptXMLASP
Chapter 3: e-Business A company that has a online presence
Storefront model– Shopping cart technology -- amazon.com– Shopping mall – mall.com
Auction model – liquidprice.com, ebay.comDynamic pricing model
– Name your price – priceline.com– Comparison Pricing – Bottomdollar.com– Demand Sensitive Pricing – www.mercata.com– Bartering, rebates, free products and services
Portal model – hotbot.com
E-businesses
Business to business (B2B) – Buying, selling,
partnering, bartering, trading
Online trading and lending
Getting loansRecruitingNews
TravelEntertainmentAutomotiveEnergySelling Brain
PowerArtE-learning
Chapter 4 – Internet Marketing5 – Online Monetary Transacts
Advertising on the web
Choosing a domain name
….Take Dr. Orvis’
course, not mine
Chapter 6 – Legal, Ethical and Social Issues; Internet Taxation
Right to Privacy– Cookies– Tracking devices– Employer/Employee– User protection:
PrivacyX.com– Business protection:
PrivacyBot.com
Legal Issues– Defamation of char– Sexually explicit
speech– Children (netnanny)– Intellectual Property– Copyright Issues
mp3, napster…
Social Issues; Internet Taxation
TrademarksDomain RegistrationUnsolicited
commercial e-mail (SPAM
Online AuctionsOnline Contracts
Social IssuesOnline communitiesActivismdisabilities
Global IssuesTaxation
Chapter 7: Computer and Network Security
Secure Transactions– Privacy: captured or passed on– Integrity: altered– Authentication: prove identities– Non-repudiation: prove message sent or
received
Cryptography
Transform data using a keyPlaintext: UnencryptedCiphertext: encrypted dataCipher or cryptosystem – encryption algo.Substitution cipherTransposition cipherThe longer the key (128 bits), the stronger the
encryption
Secret key cryptography symmetric cryptography
Both sender and receiver need to know keyHow do you send the key securely?
– CourierKey distribution center (KDC)
– Session key generated– Sent to merchant and customer– Using key already held
Data Encryption Standard (DES)– 64 bit key example of symmetric crypto
Triple DES
Public key cryptography Asymmetric cryptography
Two inversely related keys– Private key: kept secret by owner
– Public key: freely distributed
Cannot deduce private key from publicSender encrypts using receiver’s public keyReceiver decrypts using receiver’s private keyKeys are mathematically relatedComputational intensive
Symmetric vs. Asymmetric cryptography
Asymmetric not efficient for large amounts of dataUse public key to determine key for symmetric
encryption on insecure mediumKey agreement protocol
– Process by which two parties can exchange keys over insecure medium
– Protocol sets the rules for communicationDigital Envelope
– Message encrypted using symmetric secret key– Sym secret key encrypted using public-key encrypt– Sends both as one message
Security Protocols
Secure Sockets Layer (SSL)– Netscape; secure communication on web
– Public key technology and digital certificates
– Does not protect private info like credit cards
Secure Electronic Transaction (SET) – Protocol developed by Visa and MasterCard
– Digital certificates to authenticate
– Public key
– Merchant never sees credit card info
Security Attacks
Denial of service– Disrupt service, attack routing tables– Network resources taken up by unauthorized users
Viruses– Attached to other programs– Replicates, corrupts files– Melissa and ILOVEYOU
Worms– Like viruses but do not need to be attached
Viruses
HackersTransient virus
– Attaches to specific program. Live during executionLogic bomb and time bomb
– Triggers when given condition metTrojan horse
– Hides in friendly programWeb defacing
– Enter Web site and change contents
Network Security
Firewalls– Protect LAN from outside
Packet filtering firewall– Filters packets from outside with local addresses– Does not examine data viruses
Application-level gateway– Screen actual data– Firewalls
Kerberos– MIT, symmetric secret key, internal attacks– Ticket Granting Service maintains DB of valid users
Chapter 8: Hardware, Software and Communications
Internet Structure– Host computers with IP address– Packets with source address, destination address,
sequencing information, error-control information– Routers: move packets efficiently. Failures.
Hardware– Server: Web, e-mail, database, file– Client– Communication Media:Wire, fiber, satellite,
microwave, repeater– Storage Area Networks (SANs): high-capacity
data delivery and storage on a network
Connecting to the Internet
Internet Service Provider (ISP)– Analog to digital (modem)
Digital Subscriber Lines (DSL)– High bandwidth of existing copper (upto 55Mbps)– Special HW at phone co; speed decrease over distance
Broadband– High bandwidth provided by cable TV and tele co.– Cable modem (downstream 384Kbps –1.5Mbps)
Integrated Services Digital Network(ISDN)– High-speed connections (128Kbps)– Need Terminal Adaptor (TA) and ISP $$
Wireless: Cell phones, palmsWebTV: Connect TV to ISP
Software
Application Service Providers (ASPs)– Maintain application and update as needed– Provide Virtual Private Networks (VPNs)– Point-to-point tunneling protocol (PPTP)
Operating Systems (OS)– Linux
Databases (DB)– Relational – DBMS– SQL