42
1 Chapter 12 Electronic Commerce Systems

1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Embed Size (px)

Citation preview

Page 1: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

1

Chapter 12

Electronic Commerce Systems

Page 2: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

2

Objectives for Chapter 12

Basic network topologies used to achieve connectivity within an Intranet

Functions of network software, including managing communications sessions and avoiding data collision

Characteristics of EDI technology and its application in a trading partner relationship

Basic technologies and layered approach to protocols used in Internet communications

The business opportunities and risks associated with electronic commerce

The key security and assurance issues pertaining to electronic commerce

Page 3: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

3

What is E-Commerce?

The electronic processing and transmission of business data

electronic buying and selling of goods and services

online delivery of digital productselectronic funds transfer (EFT)electronic trading of stocksdirect consumer marketing electronic data interchange (EDI) the Internet revolution

Page 4: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

4

Benefits of E-Commerce

Access to a worldwide customer and/or supplier base

Reductions in inventory investment and carrying costs

Rapid creation of business partnerships to fill emerging market niches

Reductions in retail prices through lower marketing costs

Reductions in procurement costsBetter customer service

Page 5: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

5

Local Area Network (LAN)

A federation of computers located close together (on the same floor or in the same building) linked together to share data and hardware

The physical connection of workstations to the LAN is achieved through a network interface card (NIC) which fits into a PC’s expansion slot and contains the circuitry necessary for inter-node communications.

A server is used to store the network operating system, application programs, and data to be shared.

Page 6: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

File Server

LAN

LAN

Node

Node

Node

Node

Print Server

Files

Printer

Page 7: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

7

Wide Area Network (WAN)

A WAN is a network that is dispersed over a wider geographic area than a LAN. It typically requires the use of: gateways to connect different types of

LANs bridges to connect same-type LANs

WANs may use common carrier facilities, such as telephone lines, or they may use a Value Added Network (VAN).

Page 8: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

LANLAN

Bridge

GatewayGateway

LAN

WAN

WAN

Page 9: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

9

Star Topology

A network of IPUs with a large central computer (the host)

The host computer has direct connections to smaller computers, typically desktop or laptop PCs.

This topology is popular for mainframe computing.

All communications must go through the host computer, except for local computing.

Page 10: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Local Data Local Data

Local Data

Local Data

Central Data

POS

POS

POS

POSPOS

Topeka St. Louis

KansasCity

DallasTulsa

Star Network

Page 11: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

11

Hierarchical TopologyA host computer is connected to several

levels of subordinate smaller computers in a master-slave relationship.

ProductionPlanning System

ProductionSchedulingSystem

RegionalSales System

WarehouseSystem

WarehouseSystem

Production System

ProductionSystem

Sales Processing System

SalesProcessingSystem

Sales Processing System

CorporateLevel

RegionalLevel

LocalLevel

Page 12: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

12

Ring Topology

This configuration eliminates the central site. All nodes in this configuration are of equal status (peers).

Responsibility for managing communications is distributed among the nodes.

Common resources that are shared by all nodes can be centralized and managed by a file server that is also a node.

Page 13: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Server

Ring Topology

Local Files

Local Files

Local Files

Local Files

Local Files

CentralFiles

Page 14: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

14

Bus Topology

The nodes are all connected to a common cable - the bus.

Communications and file transfers between workstations are controlled by a server.

It is generally less costly to install than a ring topology.

Page 15: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Server

Bus Topology

Node

Node

Node

Node

Local Files

Local FilesLocal Files

Local Files

Local FilesNode

Central Files

Print Server

Page 16: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

16

Client-Server Topology

This configuration distributes the processing between the user’s (client’s) computer and the central file server.

Both types of computers are part of the network, but each is assigned functions that it best performs.

This approach reduces data communications traffic, thus reducing queues and increasing response time.

Page 17: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Server

Client-Server Topology

Client

Client

Client

Client

RecordSearchingCapabilities

Data ManipulationCapabilities

ClientData Manipulation

CapabilitiesData ManipulationCapabilities

Data ManipulationCapabilities

Data ManipulationCapabilities

Common Files

Page 18: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

18

Network Control Objectives

establish a communications session between the sender and the receiver

manage the flow of data across the network

detect errors in data caused by line failure or signal degeneration

detect and resolve data collisions between competing nodes

Page 19: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

POLLING METHOD OF CONTROLLING DATA COLLISIONS

MASTERLocked Locked

Locked

Polling Signal

Data Transmission

One Site, the “master,” polls the other “slave” sites to determine if they have data to transmit.If a slave responds in the affirmative, the master site locks the network while the data are transmitted.

Allows priorities to be set for data communications across the network

SLAVE

SLAVE

SLAVE

SLAVE

WAN

Page 20: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Server

Token Ring

Node

Node

Node

Central Files

Local Files

Local Files

Local Files

Contains data

Empty token

Page 21: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

21

Carrier Sensing A random access technique that detects

collisions when they occur This technique is widely used--found on Ethernets. The node wishing to transmit “listens” to the line to

determine if it is in use. If it is, it waits a pre-specified amount of time to transmit.

Collisions occur when two nodes listen, hear no messages transmitting, and then simultaneously begin transmitting. The data collides and the two nodes are instructed to hang up and try again.

Disadvantage: The line may not be used optimally when multiple nodes are trying to transmit simultaneously.

Page 22: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

22

What is Electronic Data Interchange?

The exchange of business transaction information: between companies in a standard format (ANSI X.12 or

EDIFACT) via a computerized information system

In “pure” EDI systems, human involvements is not necessary to approve transactions.

Page 23: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

23

Communications Links

Companies may have internal EDI translation/communication software and hardware.

ORThey may subscribe to VANs to

perform this function without having to invest in personnel, software, and hardware.

Page 24: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

EDI System

PurchasesSystem

EDI TranslationSoftware

EDI TranslationSoftware

CommunicationsSoftware

CommunicationsSoftware

OtherMailbox

OtherMailbox

CompanyA’s mailbox

CompanyB’s mailbox

Sales OrderSystem

ApplicationSoftware

ApplicationSoftware

Direct Connection

VAN

Company A Company B

Page 25: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

25

Advantages of EDI

Reduction or elimination of data entryReduction of errorsReduction of paperReduction of paper processing and

postageReduction of inventories (via JIT

systems)

Page 26: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

26

The Internet: An Overview

A large network comprised of over 100,000 interconnected smaller networks located around the world Includes WWW, Extranets, Intranets,

VPNs, LANs, WANs, and VANsEmploys communications technologies

based on packet switching, whereby messages are divided into small packets for transmission

Page 27: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

27

The Internet Business Model

Information level--using the Internet to display and make accessible information about the company, its products, services, and business policies

Transaction level--using the Internet to accept orders from customers and/or to place them with their suppliers

Distribution level--using the Internet to sell and deliver digital products to customers

Page 28: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

28

Protocol FunctionsThey facilitate the physical connection

between the network devices.They synchronize the transfer of data

between physical devices.They provide a basis for error checking

and measuring network performance.They promote compatibility among

network devices.They promote network designs that are

flexible, expandable, and cost-effective.

Page 29: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

29

Internet ProtocolsTransfer Control Protocol/Internet Protocol

(TCP/IP) - controls how individual packets of data are formatted, transmitted, and received

Hypertext Transfer Protocol (HTTP) - controls web browsers

File Transfer Protocol (FTP) - used to transfer files across the Internet

Simple Network Mail Protocol (SNMP) - e-mail

Secure Sockets Layer (SSL) and Secure Electronic Transmission (SET) - encryption schemes

Page 30: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

30

Open System Interface (OSI)

The International Standards Organization developed a layered set of protocols called OSI.

The purpose of OSI is to provide standards by which the products of different manufacturers can interface with one another in a seamless interconnection at the user level.

Page 31: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

The OSI Protocol

Layer 1 Physical

Layer 2 Data Link

Layer 3 Network

Layer 4 Transport

Layer 5 Session

Layer 6 Presentation

Layer 7 Application

SOFTWARE

HARDWARE

Layer 1 Physical

Layer 2 Data Link

Layer 3 Network

Layer 4 Transport

Layer 5 Session

Layer 6 Presentation

Layer 7 Application

SOFTWARE

HARDWARE

DataManipulationTasks

Data Communications Tasks

Communications Channel

NODE 1 NODE 2

Page 32: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

32

Areas of General Concern

Data Security: Are stored and transmitted data adequately protected?

Business Policies: Are policies publicly stated and consistently followed?

Privacy: How confidential are customer and trading partner data?

Business Process Integrity: How accurately, completely, and consistently does the company process its transactions?

Page 33: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

33

Intranet RisksIntercepting Network Messages

sniffing: interception of user IDs, passwords, confidential e-mails, and financial data files

Accessing Corporate Databases connections to central corporate databases

increase the risk that data will be viewed, corrupted, changed, or copied by employees

Uncontrolled Expansion ill-conceived network decisions create a serious

threat

Page 34: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

34

Internet Risks to ConsumersHow serious is the risk?

National Consumer League: Internet fraud rose by 600% between 1997 and 1998

SEC: e-mail complaints alleging fraud rose from 12 per day in 1997 to 200-300 per day in 1999

Major areas of concern: Theft of Credit Card Numbers Theft of Passwords Consumer Privacy--cookies

Page 35: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

35

Internet Risks to Businesses

IP Spoofing: masquerading to gain access to a Web server and/or to perpetrate an unlawful act without revealing one’s identity

Technology Failures: disruption caused by hardware failure causes an e-business to lose both customer credibility and sales revenues

Malicious Programs: viruses, worms, logic bombs, and Trojan horses pose a threat to both Internet and Intranet users

Page 36: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Denial of Service Attack

Sender Receiver

Step 1: SYN messages

Step 2: SYN/ACK

Step 3: ACK packet code

In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not respond with an ACK packet. This leaves thereceiver with clogged transmission ports, and legitimate messages cannot be received.

Page 37: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

37

E-Commerce Security: Data Encryption

Encryption - A computer program transforms a clear message into a coded (ciphertext) form using an algorithm

EncryptionProgram

EncryptionProgram

Ciphertext

Ciphertext

CommunicationSystem

CommunicationSystem

Key

Key

CleartextMessage

CleartextMessage

Page 38: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

Public and Private Key Encryption

Public Key is used for encoding messages.

Message A Message B Message C Message D

Ciphertext Ciphertext Ciphertext Ciphertext

Multiple peoplemay have the public key (e.g., subordinates).

Private Key is used fordecoding messages.

Typically one person ora small number of peoplehave the private key (e.g., a supervisor).

Message A Message DMessage CMessage B

Page 39: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

39

E-Commerce Security: Digital Authentication

Digital signature: electronic authentication technique that ensures that the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied

Digital certificate: like an electronic identification card that is used in conjunction with a public key encryption system to verify the authenticity of the message sender

Page 40: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

40

E-Commerce Security: FirewallsFirewalls - software and hardware that provide

a focal point for security by channeling all network connections through a control gateway

Network level firewalls - low cost/low security access control. Uses a screening router to its destination. This method does not explicitly authenticate outside users. Hackers may penetrate the system using an IP spoofing technique.

Application level firewalls - high level/high cost customizable network security. Allows routine services and e-mail to pass through, but can perform sophisticated functions such as logging or user authentication for specific tasks.

Page 41: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

41

Assurance“Trusted” third-party organizations offer

seals of assurance that businesses can display on their Web site home pages: BBB TRUSTe Veri-Sign, Inc ICSA AICPA/CICA WebTrust AICPA/CICA SysTrust

Page 42: 1 Chapter 12 Electronic Commerce Systems. 2 Objectives for Chapter 12 zBasic network topologies used to achieve connectivity within an Intranet zFunctions

42

The New Auditing ParadigmContinuous Process Auditing

auditors review transactions at frequent intervals or as they occur

intelligent control agents: heuristics that search electronic transactions for anomalies

Electronic Audit Trails electronic transactions generated without

human intervention no paper audit trail