Overview What technologies are required to support a sophisticated eBusiness website?
E-business technologies
Applications development BackBack-office applications Client/server technologies
What security technologies can you implement to protect your online investment? Please stop me if you want anything explained!
Grant Castner www.uoregon.edu/~gcastner
1
2
Discussion
Discussion summary Web content
What technologies (e.g. software, programming languages) have you already used to develop your web pages?
What were the advantages of the technologies? What were the limitations?
Scripting languages
Fireworks Photoshop Flash
Integrated development environments (IDE) Dreamweaver
Programming languages
3
Electronic Business Applications Development
Exercise
http://java.sun.com/
www.asp.net
www.php.net
4
Split up into groups of four Assign each group member a technology from the previous slide. Individually, find out the purpose and features of your technology. Report back to your group on what you find.
www.xml.org 5
6
ASP.NET
Java
Flexible language options Flexible formats and outputs
7
8
PHP
XML
ServerServer-side scripting
Across platforms Information about data
Standardization
Avoid duplication
9
10
ASP.NET
ASP.NET Develop ASP .Net files on text editor or .Net development tool
Developed by Microsoft A framework that allows you to build applications over the web. It is not a programming language.
Dreamweaver Visual Studio .Net
Uses .aspx extension Create applications using your preferred programming language:
11
Visual Basic.NET C# (similar to the C++ programming language) J# (equivalent to the Java programming language) 12
How ASP.NET Pages Work
Web Environment with ASP.NET
Your ASP.NET page is compiled into a language called the Microsoft Intermediate Language (MSIL) The Common Language Runtime environment compiles the MSIL into the computer’s native machine language
CLIENT (Web browser)
Server (Web server)
Request First request?
Client (Web Browser)
Yes
MSIL can therefore run on any type of computer.
Compile No Handle events
Source file in text format
Execute code
Compiled file in MSIL
Compiler
Client Web page (HTML only)
Translate (into HTML)
13
14
Back-office integration
Exercise Each group select a company from the previous page. Within each group, assign each person one of the following questions:
Customer relationship management systems (CRM)
Database management systems (DBMS)
Database management systems (DBMS)
Enterprise resource planning systems (ERP)
What is the main application the company sells (e.g. database management software, customer relationship management software)? What are some of the features of the application? What companies have used the software and what were the benefits (e.g. search for case studies)? How could the application be used to improve your own eBusiness website?
15
Database Management System Price Comparison
MySQL An openopen-source database management system. Example installations:
Oracle
Associated Press NASA U.S. Census Bureau Yahoo Finance
STANDARD EDITION
$15,000
ENTERPRISE EDITION
$40,000
IBM DB2 WORKGROUP
$7,500
ENTERPRISE EDITION
$25,000
Microsoft SQL Server
Simple example:
16
Pacific Garden Chinese Restaurant
STANDARD EDITION
$4,999
ENTERPRISE EDITION
$19,999
Source: Meta Group Inc., Stamford, Conn. 17
MySQL AB’s software costs $440 per server. The MySQL source code can be downloaded for free. Here’s a look at the costs of competing products, which are priced per processor. 18
CRM Functions
CRM
Sales force automation Marketing automation Lead processing Order tracking Call center automation Configuration management Customer selfself-service Field service management Interactive voice response Data mining Customer profiling Campaign management 19
20
Siebel: A CRM vendor
Siebel: A CRM vendor
21
22
Web servers and network operating systems
Security discussion What are the different ways that computer networks can be attacked?
Apache Web Server
Internet Information Services (IIS)
Remember: security is a management issue as much as it is a technology issue. Sun ONE Application Server
Linux operating system 23
Do you agree? 24
Discussion Summary
Discussion Summary Penetration attacks
Physical access attacks
Wiretapping Server hacking Vandalism
Viruses Worms
Dialog attacks
Scanning (probing) BreakBreak-in Denial of service Malware
Eavesdropping Impersonation Message alteration
Social Engineering
Opening attachments Password theft Information theft
25
26
General security objectives
Security technologies
Confidentiality
Freedom from the fear that messages are being read by eavesdroppers who should not be able to do so.
Integrity
Information has not been added to, altered, or deleted – except with authorization.
Availability
What security technologies do you know about that attempt to prevent the attacks we just discussed?
Authorized users can get access to IT resources.
Secure sockets layer Firewalls Intrusion detection systems AntiAnti-virus software Managing users, groups, and access permissions Encryption (of files, ee-mails)
27
28
Secure Sockets Layer (SSL)
Firewalls A computer or router that controls access in and out of the internal computer network of an organization. Work by reading control portion of messages and deciding whether to allow the messages in or out of the network. Examples:
SSL (Secure Sockets Layer) is a commonlycommonlyused protocol for managing the security of a message transmission on the Internet. It automates most of the encryption process. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP (HTTP)) and Transport Control Protocol (TCP (TCP)) layers. All websites starting with https:// are using SSL
29
ZoneAlarm from Zonelabs (personal firewall) CheckPoint FirewallFirewall-1 Netscreen firewalls
30
Example firewall configuration
Intrusion detection systems (IDS) A device that warns administrators if it detects a possible attack underway. Also collects data on suspicious packets for subsequent analysis. Sometimes takes action on its own to stop an attack Software and sometimes hardware that captures network and host activity data in event logs and provides automatic tools to generate alarms, and query and reporting tools to help administrators analyze the data interactively during and after an incident. Example:
31
Tripwire 32