11
1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

Embed Size (px)

Citation preview

Page 1: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

1C12 - March 19, 2008

Business 54 - Introduction to eCommerce

Spring 2008

C12 - March 19, 2008

Page 2: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

2C12 - March 19, 2008

Class Game Plan

C12 - March 19, 2008

Post-break Assignments Due.

Internet Security.

Lab Time – What is my IP?

Page 3: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

3C12 - March 19, 2008

Basic of Internet Security

It’s still the Wild, Wild West out there.Scams are real.IP theft is real.Spam is real.

Solution exists.

And they start with exercising some Common Sense!

Page 4: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

4C12 - March 19, 2008

Basic of Internet Security

Why is there a problem?

No different than the Offline World PLUS…... The web is international in scope. Difficult to get agreement. Desire not to cause ’purchase friction”. Unaware consumers. Arms Race. The Mystique and Appeal of Hacking & Hackers.

Page 5: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

5C12 - March 19, 2008

Basic of Internet Security

Hacking vs. Crimes.

Types of Hacking / Security Breaches: Pfishing. Spoofing. Shuffling. Snooping. Sniffing. Trojans. Worms. Viruses. Zombies.

Page 6: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

6C12 - March 19, 2008

Basics of Internet Security

Confidentiality A

vailability

Integrity

Page 7: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

7C12 - March 19, 2008

Basic of Internet Security

Confidentiality A

vailability

Integrity

Authentication Authorization

Non-Repudiation

Page 8: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

8C12 - March 19, 2008

Basic of Internet Security

Denial of Service / The Ping of Death. Spyware. Malware. Cookies. Open Source. Spam.

Page 9: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

9C12 - March 19, 2008

Defenses Firewalls. .Scanning Software. Spam Blockers. SLL. HTTPS. Ways to Encrypt:

Algorithmic / Caesarean Ciphers. Book Ciphers. Physical Security. Bio-Metric Security.

Honey Pots.

Page 10: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

10C12 - March 19, 2008C12 - March 19, 2008

Questions……

(and maybe some) Answers

Page 11: 1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008

11C12 - March 19, 2008C12 - March 19, 2008

Lab Time

Go to www.ip-adress.comBrowse the site.

What do you think?