download

World
-Wide-Web,
World-Wide-Web,
Firewalls, &
Transaction Security
Sistem e-Business
(MG-652)
Jurusan Manajemen
Marketing and Advertising
Customer Service and Support
The Web and
Electronic Commerce
Developing New Markets
and Distribution Channels
Developing New Online
Products / Services
Brief History of the Web
Managing the External
Web Interface
Web Architecture
Web and Electronic
Commerce
World Wide Web
Ease of Navigation and Use
Web and Intranets
World
Wide Web Applications
Client / Server Computing
Publishing ease
Cost
Web
Characteristic
Enabling New Intra-Business Applications
Internal Corporate Communications
Intranet Advantages
Scalability
Groupware, Collaborative Work, Coordination
Intranet
Architecture
Easy software
distribution
The collaborative application
are not as powerful as
traditional groupware
New Distribution Models
Enabling a Network-Centric Computing
Paradigm
Ease of use
Low maintenance
Ease of Publishing Content
Online Transaction Processing (OLTP)
The Web and
Intra-Business
Commerce
Intranet
Disadvantages
Technology-Driven Marketing
Other Intranet
Applications
Short term risk
Logistics and Supply Chain
Management
Finance and Accounting
Human Resources
Less back-end integration
Decision Support /
Workflow Management
Management of Intranets
12 September 2002
Web-based Decision Support Applications
Chandra Wibowo W.
2
Intranet-Extranet-Internet
12 September 2002
Chandra Wibowo W.
3
Intranet Architecture
Corporate Intranet
Clients
Legacy systems
Public / External
W orld W ide W eb
Users
Intranet
e-mail servers
Firewall Server
W eb servers
12 September 2002
Chandra Wibowo W.
4
Intranet-Extranet-Internet
12 September 2002
Chandra Wibowo W.
5
12 September 2002
Chandra Wibowo W.
6
• Pengertian
– Web merupakan kumpulan dokumen2 yang terdistribusi
sebagai “page” yang terletak pada komputer2 (server2)
di seluruh dunia.
– Dilihat dari isinya, web dapat dipandang sebagai
“perpustakaan” raksasa.
– Untuk mengakses web, user memerlukan software khusus
yang disebut web browser.
• Sejarah WWW
• Web dan Electronic Commerce
– Arsitektur e-Business
– Elemen-elemen kunci yang terdapat pada EC berbasis
web adalah client browser, web browser, dan jasa pihak
ketiga.
12 September 2002
Chandra Wibowo W.
7
Arsitektur Web
Databases
TCP /IP - based
network
Web Clients
12 September 2002
CGI
Web Servers
Chandra Wibowo W.
Content
Software
Applications
8
Didalam industri, web digunakan untuk 4
tugas utama:
1. Menarik pelanggan baru melalui
pemasaran.
2. Melayani pelanggan yang ada melalui
customer service dan support function.
3. Mengembangkan pasar baru dan alur
distribusi untuk produk yang ada.
4. Mengembangkan produk baru berbasiskan
informasi.
12 September 2002
Chandra Wibowo W.
9
E-Business Architecture
Client Browser
W W W Serv er Functions
Third-Party Serv ices
Local or companyspecific data
Information
retrieval
Digital library of
document / data
servers
Mosaic / W W W
browser
Data and
transaction
management
Third-party inf.
processing tools /
services
Browser
extensions
Secure
messaging
Electronic
payment servers
12 September 2002
Chandra Wibowo W.
10
Intranet-based Decision
Support
Data migration
from operational
databases
Data replicated
from transaction
databases
Corporate data server
Intranets-middleware for data access
web clients
W eb browser
12 September 2002
W eb browser
W eb browser
Chandra Wibowo W.
11
Web Clients
Key Concepts
Web Servers
Hypertext Transport
Protocol (HTTP)
Uniform Resource
Locator (URL)
Interactive Applications
The Web
Architecture
Interactivity and
Information Integration
Interactive
Web Applications
Hypertext Markup
Languange (HTML)
Common Gateway
Interface (CGI)
Web Database
Products
HTML Forms and
CGI Programs
Web and
Database
Integration
Multimedia
Web Extensions
Scripting and
mobile applets
Capturing look and feel
Virtual Reality Modeling
Language (VRML)
Real Audio
Flash
Internet and
Web-Based Telephony
Directories and Search Engines
12 September 2002
Web
Extentions
Multimedia
web extensions
World
Wide Web Concepts and
Technology
Web Software
Developmental
Tools
Database integration
Chandra Wibowo W.
12
The Web Architecture
External
Database
W eb
browser
TCP / IP
Network
Common
Gateway
Interface
script
W eb
browser
HyperText
Transfer Protocol
W eb
browser
12 September 2002
W eb Server
Chandra Wibowo W.
13
Common Gateway
Interface (CGI)
S erver prepares
H T M L header and
forw ards res ults to
brows er
W eb brow s er
Q uery res ults
returned to s erver
W eb s erver
D ata in H T M L form
are trans form ed into
a query
12 September 2002
C om m on gatew ay interfac e (C G I)
query is relayed on
by W eb s erver onto
C G I s c ript
Chandra Wibowo W.
14
Privacy
Authenticity
Simple Traffic
Logging Systems
Internet Security
Requirements
Integrity
Availability
Transaction
Security
Blocking
Public data
Copyright data
Confidential data
Types of
Online
Transactions
Firewalls and
Network Security
Types of
Firewalls
IP Packet
Screening Routers
Hardened Firewall Host
Proxy Application Gateways
Firewall Security Policies
Firewall Management Issues
Firewalls and
Transaction
Security
Secret data
Secret Key Encryption
Secure Socket Layer (SSL)
Security and Online
Web-Based Banking
World Wide Web
and Security
Encryption and
Transaction
Security
Public Key Encryption
Implementation and
Management Issues
Digital Signatures
Digital Certificates
Hardware vs Software
Implementations
Key Management
Legal Issues
Other Business Issues
12 September 2002
Chandra Wibowo W.
15
Internet Security Terms
•
Authentication
•
Integrity
•
Reliability
•
Firewall
•
Spoofing
•
Denial of service
–
A way to verify that message senders are who they say they are
–
Ensuring that information will not be accidentally or maliciously altered or destroyed
–
Ensuring that systems will perform consistenly and at an acceptable level of quality
–
A filter between a corporate network and the internet that keeps the corporate
network secure from intruders, but allows authenticated corporate users uninhibited
access to the internet
–
–
A way of creating counterfeits packets with private IP (intranet) addresses in order
to gain access to private networks and steal information
An attack on the information and communications services by a third party that
prevents legitimate users from using the infrastructure
12 September 2002
Chandra Wibowo W.
16
Firewall-Secured
Internet Connection
C o rp o rate N etw o rk
In tern et
Intranet
100,000 networks -unknown number of
hackers ?
Firewall
Firewall bypass
should not be allowed
12 September 2002
Chandra Wibowo W.
17
Secure Firewall with IP
Packet Screening Router
Internal Corporate Network or Subnet
Servers
e-mail
USENET
Clients
Clients
Clients
Clients
Public Internet
IP packet screening router
Server
Sam ple screening rules :
y Protocol (TCP,UDP,ICMP)
y Source IP address (domain
.edu)
y TargetTCP port80 (W eb onl
y)
FTP
WWW
Servers
12 September 2002
Chandra Wibowo W.
18
Proxy Servers on the
World Wide Web
N e tw o rk
P ro to c o ls
P u b lic
In te rn e t
W eb H T T P s erver
S ec u re s u b n et in s id e th e firew all
s ec u rity p erim eter
HTTP
F T P s erver
FTP
C lien ts in s id e th e firew all
P roxy s erver on th e
firew all m ac h in e th at
c on n ec ts to th e extern al
In tern et
G op h er
G op h er s erver
T E LN E T
T E L N E T s erver
NNTP
P roxy s erver is ru n n in g eith er on a f irew all h os t or oth er in tern al
h os t, w h ic h h as fu ll In tern et A c c es s , m akin g c on n ec tion s to th e
p u b lic In tern et th rou g h S O C K S or oth er firew all s oftw are
12 September 2002
Chandra Wibowo W.
U S E N E T n ew s
s erver
19
Secret Key Encryption
Internet
Anne
Encrypt
12 September 2002
Decrypt
Chandra Wibowo W.
Bob
20
Public Key Encryption
Scrambled
message
S c ra m b le d
m e ssa g e
Internet
Buyer
Decrypt
with
public
key
Encrypt
with
private
key
12 September 2002
Chandra Wibowo W.
Seller
21