E Business Technologies

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View E Business Technologies as PDF for free.

More details

  • Words: 952
  • Pages: 6
Overview What technologies are required to support a sophisticated eBusiness website?

E-business technologies

„ „ „

Applications development BackBack-office applications Client/server technologies

What security technologies can you implement to protect your online investment? Please stop me if you want anything explained!

Grant Castner www.uoregon.edu/~gcastner

1

2

Discussion

Discussion summary Web content

What technologies (e.g. software, programming languages) have you already used to develop your web pages? „

„

„ „ „

What were the advantages of the technologies? What were the limitations?

Scripting languages

Fireworks Photoshop Flash

Integrated development environments (IDE) „ Dreamweaver

Programming languages

3

Electronic Business Applications Development

Exercise

http://java.sun.com/

www.asp.net

www.php.net

4

Split up into groups of four Assign each group member a technology from the previous slide. Individually, find out the purpose and features of your technology. Report back to your group on what you find.

www.xml.org 5

6

ASP.NET

Java

Flexible language options Flexible formats and outputs

7

8

PHP

XML

ServerServer-side scripting

Across platforms Information about data „

Standardization

Avoid duplication

9

10

ASP.NET

ASP.NET Develop ASP .Net files on text editor or .Net development tool

Developed by Microsoft A framework that allows you to build applications over the web. It is not a programming language.

„ „

Dreamweaver Visual Studio .Net

Uses .aspx extension Create applications using your preferred programming language: „ „ „

11

Visual Basic.NET C# (similar to the C++ programming language) J# (equivalent to the Java programming language) 12

How ASP.NET Pages Work

Web Environment with ASP.NET

Your ASP.NET page is compiled into a language called the Microsoft Intermediate Language (MSIL) The Common Language Runtime environment compiles the MSIL into the computer’s native machine language „

CLIENT (Web browser)

Server (Web server)

Request First request?

Client (Web Browser)

Yes

MSIL can therefore run on any type of computer.

Compile No Handle events

Source file in text format

Execute code

Compiled file in MSIL

Compiler

Client Web page (HTML only)

Translate (into HTML)

13

14

Back-office integration

Exercise Each group select a company from the previous page. Within each group, assign each person one of the following questions:

Customer relationship management systems (CRM)

Database management systems (DBMS)

„

„ „

„

Database management systems (DBMS)

Enterprise resource planning systems (ERP)

What is the main application the company sells (e.g. database management software, customer relationship management software)? What are some of the features of the application? What companies have used the software and what were the benefits (e.g. search for case studies)? How could the application be used to improve your own eBusiness website?

15

Database Management System Price Comparison

MySQL An openopen-source database management system. Example installations: „ „ „ „

Oracle

Associated Press NASA U.S. Census Bureau Yahoo Finance

STANDARD EDITION

$15,000

ENTERPRISE EDITION

$40,000

IBM DB2 WORKGROUP

$7,500

ENTERPRISE EDITION

$25,000

Microsoft SQL Server

Simple example: „

16

Pacific Garden Chinese Restaurant

STANDARD EDITION

$4,999

ENTERPRISE EDITION

$19,999

Source: Meta Group Inc., Stamford, Conn. 17

MySQL AB’s software costs $440 per server. The MySQL source code can be downloaded for free. Here’s a look at the costs of competing products, which are priced per processor. 18

CRM Functions

CRM

Sales force automation Marketing automation Lead processing Order tracking Call center automation Configuration management Customer selfself-service Field service management Interactive voice response Data mining Customer profiling Campaign management 19

20

Siebel: A CRM vendor

Siebel: A CRM vendor

21

22

Web servers and network operating systems

Security discussion What are the different ways that computer networks can be attacked?

Apache Web Server

Internet Information Services (IIS)

Remember: security is a management issue as much as it is a technology issue. Sun ONE Application Server

„

Linux operating system 23

Do you agree? 24

Discussion Summary

Discussion Summary Penetration attacks

Physical access attacks „ „ „

„

Wiretapping Server hacking Vandalism

„ „ „

Viruses Worms

Dialog attacks „ „ „

Scanning (probing) BreakBreak-in Denial of service Malware

Eavesdropping Impersonation Message alteration

Social Engineering „ „ „

Opening attachments Password theft Information theft

25

26

General security objectives

Security technologies

Confidentiality „

Freedom from the fear that messages are being read by eavesdroppers who should not be able to do so.

Integrity „

„

Information has not been added to, altered, or deleted – except with authorization.

Availability „

What security technologies do you know about that attempt to prevent the attacks we just discussed? „ „ „

Authorized users can get access to IT resources.

„ „

Secure sockets layer Firewalls Intrusion detection systems AntiAnti-virus software Managing users, groups, and access permissions Encryption (of files, ee-mails)

27

28

Secure Sockets Layer (SSL)

Firewalls A computer or router that controls access in and out of the internal computer network of an organization. Work by reading control portion of messages and deciding whether to allow the messages in or out of the network. Examples:

SSL (Secure Sockets Layer) is a commonlycommonlyused protocol for managing the security of a message transmission on the Internet. It automates most of the encryption process. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP (HTTP)) and Transport Control Protocol (TCP (TCP)) layers. All websites starting with https:// are using SSL

„ „ „

29

ZoneAlarm from Zonelabs (personal firewall) CheckPoint FirewallFirewall-1 Netscreen firewalls

30

Example firewall configuration

Intrusion detection systems (IDS) A device that warns administrators if it detects a possible attack underway. Also collects data on suspicious packets for subsequent analysis. Sometimes takes action on its own to stop an attack Software and sometimes hardware that captures network and host activity data in event logs and provides automatic tools to generate alarms, and query and reporting tools to help administrators analyze the data interactively during and after an incident. Example: „

31

Tripwire 32

Related Documents

E Business Technologies
November 2019 4
E Business
April 2020 14
E- Business
May 2020 14
E Business
October 2019 9