Overview

E-business technologies
Grant Castner www.uoregon.edu/~gcastner

What technologies are required to support a sophisticated eBusiness website?
Applications development Back-office applications BackClient/server technologies

What security technologies can you implement to protect your online investment? Please stop me if you want anything explained!

1

2

Discussion
What technologies (e.g. software, programming languages) have you already used to develop your web pages?
What were the advantages of the technologies? What were the limitations?

Discussion summary
Web content
Fireworks Photoshop Flash

Scripting languages

Integrated development environments (IDE) Dreamweaver

Programming languages

3

4

Electronic Business Applications Development
http://java.sun.com/

Exercise
Split up into groups of four Assign each group member a technology from the previous slide. Individually, find out the purpose and features of your technology. Report back to your group on what you find.

www.asp.net

www.php.net

www.xml.org
5 6

ASP.NET
Flexible language options Flexible formats and outputs

Java

7

8

PHP
Server-side scripting Server-

XML
Across platforms Information about data
Standardization

Avoid duplication

9

10

ASP.NET
Developed by Microsoft A framework that allows you to build applications over the web. It is not a programming language.
11

ASP.NET
Develop ASP .Net files on text editor or .Net development tool
Dreamweaver Visual Studio .Net

Uses .aspx extension Create applications using your preferred programming language:
Visual Basic.NET C# (similar to the C++ programming language) J# (equivalent to the Java programming language)
12

How ASP.NET Pages Work
Your ASP.NET page is compiled into a language called the Microsoft Intermediate Language (MSIL) The Common Language Runtime environment compiles the MSIL into the computer’s native machine language
MSIL can therefore run on any type of computer.

Web Environment with ASP.NET
CLIENT (Web browser)
Request Client (Web Browser) First request? Yes Compile No Handle events

Server (Web server)

Source file in text format

Compiler

Compiled file in MSIL

Execute code Client Web page (HTML only)
13

Translate (into HTML)
14

Back-office integration

Exercise
Each group select a company from the previous page. Within each group, assign each person one of the following questions:
What is the main application the company sells (e.g. database management software, customer relationship management software)? What are some of the features of the application? What companies have used the software and what were the benefits (e.g. search for case studies)? How could the application be used to improve your own eBusiness website?
15 16

Database management systems (DBMS)

Customer relationship management systems (CRM)

Database management systems (DBMS)

Enterprise resource planning systems (ERP)

MySQL
An open-source database management opensystem. Example installations:
Associated Press NASA U.S. Census Bureau Yahoo Finance

Database Management System Price Comparison
Oracle STANDARD EDITION ENTERPRISE EDITION IBM DB2 WORKGROUP ENTERPRISE EDITION Microsoft SQL Server STANDARD EDITION ENTERPRISE EDITION
Source: Meta Group Inc., Stamford, Conn.
17

$15,000 $40,000

$7,500 $25,000

Simple example:
Pacific Garden Chinese Restaurant

$4,999 $19,999

MySQL AB’s software costs $440 per server. The MySQL source code can be downloaded for free. Here’s a look at the costs of competing products, which are priced per processor.
18

CRM

CRM Functions
Sales force automation Marketing automation Lead processing Order tracking Call center automation Configuration management Customer self-service selfField service management Interactive voice response Data mining Customer profiling Campaign management
19 20

Siebel: A CRM vendor

Siebel: A CRM vendor

21

22

Web servers and network operating systems

Security discussion
What are the different ways that computer networks can be attacked?

Apache Web Server

Internet Information Services (IIS)

Remember: security is a management issue as much as it is a technology issue.
Sun ONE Application Server Linux operating system
23

Do you agree?
24

Discussion Summary
Physical access attacks
Wiretapping Server hacking Vandalism

Discussion Summary
Penetration attacks
Scanning (probing) Break-in BreakDenial of service Malware
Viruses Worms

Dialog attacks
Eavesdropping Impersonation Message alteration
25

Social Engineering
Opening attachments Password theft Information theft
26

General security objectives
Confidentiality
Freedom from the fear that messages are being read by eavesdroppers who should not be able to do so.

Security technologies
What security technologies do you know about that attempt to prevent the attacks we just discussed?
Secure sockets layer Firewalls Intrusion detection systems Anti-virus software AntiManaging users, groups, and access permissions Encryption (of files, e-mails) e-

Integrity
Information has not been added to, altered, or deleted – except with authorization.

Availability
Authorized users can get access to IT resources.

27

28

Secure Sockets Layer (SSL)
SSL (Secure Sockets Layer) is a commonlycommonlyused protocol for managing the security of a message transmission on the Internet. It automates most of the encryption process. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) (HTTP) and Transport Control Protocol (TCP) layers. (TCP) All websites starting with https:// are using SSL

Firewalls
A computer or router that controls access in and out of the internal computer network of an organization. Work by reading control portion of messages and deciding whether to allow the messages in or out of the network. Examples:
ZoneAlarm from Zonelabs (personal firewall) CheckPoint Firewall-1 FirewallNetscreen firewalls

29

30

Example firewall configuration

Intrusion detection systems (IDS)
A device that warns administrators if it detects a possible attack underway. Also collects data on suspicious packets for subsequent analysis. Sometimes takes action on its own to stop an attack Software and sometimes hardware that captures network and host activity data in event logs and provides automatic tools to generate alarms, and query and reporting tools to help administrators analyze the data interactively during and after an incident. Example:
Tripwire
31 32

Sign up to vote on this title
UsefulNot useful