Anda di halaman 1dari 4

1) Describe the technologies that are necessary for electronic commerce.

Most information technologies and Internet technologies are, in some form, involved in ecommerce systems.

2) Describe a secure electronic payment process. When you make an online purchase on the Internet, your credit card information is vulnerable to interception by network sniffers, software that easily recognizes credit card number formats. Several basic security measures are being used to solve this security problem: (1) encrypt (code and scramble) the data passing between the customer and merchant, (2) encrypt the data passing between the customer and the company authorizing the credit card transaction, or (3) take sensitive information offline. However, sensitive information is still vulnerable to misuse once its decrypted (decoded and unscrambled) and stored on a merchants server, so a digital wallet payment system was developed. In this method, you add security software add-on modules to your Web browser. That enables your browser to encrypt your credit card data in such a way that only the bank that authorizes credit card transactions for the merchant gets to see it. All the merchant is told is whether your credit card transaction is approved or not. The Secure Electronic Transaction (SET) standard for electronic payment security extends this digital wallet approach. In this method, software encrypts a digital envelope of digital certificates specifying the payment details for each transaction. VISA, MasterCard, IBM, Microsoft, Netscape, and most other industry players have agreed to SET. Therefore, a system like SET may become the standard for secure electronic payments on the Internet. 3) What is e-commerce? What are its applications? What is B2C e-commerce?

For most companies today, electronic commerce is more than just buying and selling products online. Instead, it encompasses the entire online process of developing marketing, selling, delivering, servicing, and paying for products and services transacted on internetworked, global marketplaces of customers, with the support of a worldwide network of business partners. E-commerce systems rely on the resources of the internet and many other technologies to support every step of the process. Also, most companies, large or small, are enraged in some form of e-commerce activities. Therefore, developing an ecommerce capability has become a competitive necessity. The applications of e-commerce by many companies have gone through several major stages as e-commerce matures in the world of business. For example, e-commerce between business and consumers (B2C) moved from merely offering multimedia company information at web sites to offering products and services at web storefront sites. B2C ecommerce is also moving towards a self-service model in which customers configure and customize the products and services they wish to buy. B2B e-commerce participants moved quickly from self-service on the web to configuration and customization capabilities and extranets connecting trading partners. Business-to-Consumer e-commerce: In B2C, businesses must develop electronic marketplaces to sell products and services to consumers. For example, may companies offer web sites that provide virtual storefronts and multimedia catalogues, interactive order processing, secure electronic payment systems, and online consumer support. 4) Explain any 5 essential e-commerce processes with neat diagrams. i) Access Control and Security: E-commerce processes must establish mutual trust and secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features, companies engaged in B2B e-commerce may rely on secure industry exchanges for procuring goods and services or Web trading portals that allow only registered customers to access trading information and applications. ii) Profiling and Personalizing: Once you have gained access to an e-commerce site, profiling processes can occur that gather data on you and your Web site behaviour and choices, as well as build electronic profiles of your characteristics and preferences. User profiles are developed using profiling tools such as user registration, cookie files, web site behaviour tracking software, and user feedback. These profiles are then used to recognize you as an individual user and provide you with a personalized view of the contents of the site. Profiling processes are also used to authenticate your identity for account management and payment purposes. iii) Search Management: Efficient and effective search processes provide a top e-commerce web site capability that helps customers find the specific products or service they want to evaluate or buy. E-commerce software packages can include a web site search engine component, or a company may acquire a customized e-commerce search engine from search technology companies like Google and Requisite Technology.

iv)

v)

Content and Catalogue Management: Content management software helps e-commerce companies develop, generate, deliver, update, and archive text data and multimedia information at e-commerce Web sites. E-commerce content frequently takes the form of multimedia catalogues of product information. As such, generating and managing catalogue content is a major subset of content management, or catalogue management. Content and catalogue management may be expanded to include product configuration processes that support web-based customer self-service and the mass customization of a companys products. Workflow management: Many of the business processes in e-commerce applications can be managed and partially automated with the help of workflow management software. E-business workflow systems for enterprise collaboration help employees electronically collaborate to accomplish structured work tasks within knowledge based business processes. Workflow management in both e-business and e-commerce depends on a workflow software engine containing software models of the business processes to be accomplished. The workflow systems ensure that the proper transactions, decisions, and work activities are performed, and the correct data and the documents are routed to the right employees, customers, suppliers, and other business stakeholders.

5) What is the goal of security management? Explain any 3 security measures that are a part of security management of IS. The goal of security management is the accuracy, integrity, and safety of all information system processes and resources. Thus, effective security management can minimize errors, fraud, and losses in the information systems that interconnect todays companies and their customers, suppliers, and other stakeholders. Security management is a complex task. It must acquire and integrate a variety of security tools and methods to protect a companys information system resources. Encryption: Encryption of data has become an important way to protect data and other computer network resources, especially on the Internet, intranets, and extranets. Passwords, messages, files, and other data can be transmitted in scrambled form and unscrambled by computer systems for authorized users only. Encryption involves using special mathematical algorithms or keys, to transform digital data into a scrambled code before they are transmitted, and then to decode the data when they are received. Firewalls: Another important method for control and security on the Internet and other networks is the use of firewall computers and software. A network firewall can be communications processor, typically a router, or a dedicated server, along with firewall software. A firewall serves as a gatekeeper system that protects a companys intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks. It screens all network traffic for proper passwords or other security codes and only allows authorized transmission in and out of the network. Firewalls can deter, but not prevent unauthorized access into computer networks. In some cases, a firewall may allow access only from trusted locations on the Internet to particular computers inside the firewall, or it may allow only safe information to pass.

Virus Defenses: Many companies are building defences against the spread of viruses by centralizing the distribution and updating of antivirus softwares as a responsibility of there is departments. Other companies are outsourcing the virus protection responsibility to their Internet service providers or telecommunications or security managements= companies. 6) Discuss the security management steps to protect computer system resources from hacking and other forms of cyber-crime.

Anda mungkin juga menyukai