World -Wide-Web, World-Wide-Web, Firewalls, & Transaction Security Sistem e-Business (MG-652) Jurusan Manajemen Marketing and Advertising Customer Service and Support The Web and Electronic Commerce Developing New Markets and Distribution Channels Developing New Online Products / Services Brief History of the Web Managing the External Web Interface Web Architecture Web and Electronic Commerce World Wide Web Ease of Navigation and Use Web and Intranets World Wide Web Applications Client / Server Computing Publishing ease Cost Web Characteristic Enabling New Intra-Business Applications Internal Corporate Communications Intranet Advantages Scalability Groupware, Collaborative Work, Coordination Intranet Architecture Easy software distribution The collaborative application are not as powerful as traditional groupware New Distribution Models Enabling a Network-Centric Computing Paradigm Ease of use Low maintenance Ease of Publishing Content Online Transaction Processing (OLTP) The Web and Intra-Business Commerce Intranet Disadvantages Technology-Driven Marketing Other Intranet Applications Short term risk Logistics and Supply Chain Management Finance and Accounting Human Resources Less back-end integration Decision Support / Workflow Management Management of Intranets 12 September 2002 Web-based Decision Support Applications Chandra Wibowo W. 2 Intranet-Extranet-Internet 12 September 2002 Chandra Wibowo W. 3 Intranet Architecture Corporate Intranet Clients Legacy systems Public / External W orld W ide W eb Users Intranet e-mail servers Firewall Server W eb servers 12 September 2002 Chandra Wibowo W. 4 Intranet-Extranet-Internet 12 September 2002 Chandra Wibowo W. 5 12 September 2002 Chandra Wibowo W. 6 • Pengertian – Web merupakan kumpulan dokumen2 yang terdistribusi sebagai “page” yang terletak pada komputer2 (server2) di seluruh dunia. – Dilihat dari isinya, web dapat dipandang sebagai “perpustakaan” raksasa. – Untuk mengakses web, user memerlukan software khusus yang disebut web browser. • Sejarah WWW • Web dan Electronic Commerce – Arsitektur e-Business – Elemen-elemen kunci yang terdapat pada EC berbasis web adalah client browser, web browser, dan jasa pihak ketiga. 12 September 2002 Chandra Wibowo W. 7 Arsitektur Web Databases TCP /IP - based network Web Clients 12 September 2002 CGI Web Servers Chandra Wibowo W. Content Software Applications 8 Didalam industri, web digunakan untuk 4 tugas utama: 1. Menarik pelanggan baru melalui pemasaran. 2. Melayani pelanggan yang ada melalui customer service dan support function. 3. Mengembangkan pasar baru dan alur distribusi untuk produk yang ada. 4. Mengembangkan produk baru berbasiskan informasi. 12 September 2002 Chandra Wibowo W. 9 E-Business Architecture Client Browser W W W Serv er Functions Third-Party Serv ices Local or companyspecific data Information retrieval Digital library of document / data servers Mosaic / W W W browser Data and transaction management Third-party inf. processing tools / services Browser extensions Secure messaging Electronic payment servers 12 September 2002 Chandra Wibowo W. 10 Intranet-based Decision Support Data migration from operational databases Data replicated from transaction databases Corporate data server Intranets-middleware for data access web clients W eb browser 12 September 2002 W eb browser W eb browser Chandra Wibowo W. 11 Web Clients Key Concepts Web Servers Hypertext Transport Protocol (HTTP) Uniform Resource Locator (URL) Interactive Applications The Web Architecture Interactivity and Information Integration Interactive Web Applications Hypertext Markup Languange (HTML) Common Gateway Interface (CGI) Web Database Products HTML Forms and CGI Programs Web and Database Integration Multimedia Web Extensions Scripting and mobile applets Capturing look and feel Virtual Reality Modeling Language (VRML) Real Audio Flash Internet and Web-Based Telephony Directories and Search Engines 12 September 2002 Web Extentions Multimedia web extensions World Wide Web Concepts and Technology Web Software Developmental Tools Database integration Chandra Wibowo W. 12 The Web Architecture External Database W eb browser TCP / IP Network Common Gateway Interface script W eb browser HyperText Transfer Protocol W eb browser 12 September 2002 W eb Server Chandra Wibowo W. 13 Common Gateway Interface (CGI) S erver prepares H T M L header and forw ards res ults to brows er W eb brow s er Q uery res ults returned to s erver W eb s erver D ata in H T M L form are trans form ed into a query 12 September 2002 C om m on gatew ay interfac e (C G I) query is relayed on by W eb s erver onto C G I s c ript Chandra Wibowo W. 14 Privacy Authenticity Simple Traffic Logging Systems Internet Security Requirements Integrity Availability Transaction Security Blocking Public data Copyright data Confidential data Types of Online Transactions Firewalls and Network Security Types of Firewalls IP Packet Screening Routers Hardened Firewall Host Proxy Application Gateways Firewall Security Policies Firewall Management Issues Firewalls and Transaction Security Secret data Secret Key Encryption Secure Socket Layer (SSL) Security and Online Web-Based Banking World Wide Web and Security Encryption and Transaction Security Public Key Encryption Implementation and Management Issues Digital Signatures Digital Certificates Hardware vs Software Implementations Key Management Legal Issues Other Business Issues 12 September 2002 Chandra Wibowo W. 15 Internet Security Terms • Authentication • Integrity • Reliability • Firewall • Spoofing • Denial of service – A way to verify that message senders are who they say they are – Ensuring that information will not be accidentally or maliciously altered or destroyed – Ensuring that systems will perform consistenly and at an acceptable level of quality – A filter between a corporate network and the internet that keeps the corporate network secure from intruders, but allows authenticated corporate users uninhibited access to the internet – – A way of creating counterfeits packets with private IP (intranet) addresses in order to gain access to private networks and steal information An attack on the information and communications services by a third party that prevents legitimate users from using the infrastructure 12 September 2002 Chandra Wibowo W. 16 Firewall-Secured Internet Connection C o rp o rate N etw o rk In tern et Intranet 100,000 networks -unknown number of hackers ? Firewall Firewall bypass should not be allowed 12 September 2002 Chandra Wibowo W. 17 Secure Firewall with IP Packet Screening Router Internal Corporate Network or Subnet Servers e-mail USENET Clients Clients Clients Clients Public Internet IP packet screening router Server Sam ple screening rules : y Protocol (TCP,UDP,ICMP) y Source IP address (domain .edu) y TargetTCP port80 (W eb onl y) FTP WWW Servers 12 September 2002 Chandra Wibowo W. 18 Proxy Servers on the World Wide Web N e tw o rk P ro to c o ls P u b lic In te rn e t W eb H T T P s erver S ec u re s u b n et in s id e th e firew all s ec u rity p erim eter HTTP F T P s erver FTP C lien ts in s id e th e firew all P roxy s erver on th e firew all m ac h in e th at c on n ec ts to th e extern al In tern et G op h er G op h er s erver T E LN E T T E L N E T s erver NNTP P roxy s erver is ru n n in g eith er on a f irew all h os t or oth er in tern al h os t, w h ic h h as fu ll In tern et A c c es s , m akin g c on n ec tion s to th e p u b lic In tern et th rou g h S O C K S or oth er firew all s oftw are 12 September 2002 Chandra Wibowo W. U S E N E T n ew s s erver 19 Secret Key Encryption Internet Anne Encrypt 12 September 2002 Decrypt Chandra Wibowo W. Bob 20 Public Key Encryption Scrambled message S c ra m b le d m e ssa g e Internet Buyer Decrypt with public key Encrypt with private key 12 September 2002 Chandra Wibowo W. Seller 21
© Copyright 2026 Paperzz