Bsa201 CH12
Bsa201 CH12
Bsa201 CH12
01 the Internet
Protocols and understand the specific purposes served by
02 several Internet protocols
URL IP
ADDRESS ADDRESS
E-MAIL ADDRESS
The format for an e-mail address is USER NAME@DOMAIN NAME.
There are no spaces between any of the words. A domain name is an
organization’s unique name combined with a top-level domain (TLD) 01
name.
.com commercial
.net network provider .firm a business
.store goods for sale
.org nonprofit organization
.web WWW activities
.edu education and research
.arts culture/entertainment
.gov government .rec recreation/entertainment
.mil military agency .info information service
.int international/intergovern- .nom individual/personal
mental
URL ADDRESS
The URL is the address that defines the path to a facility or file on the
Web. URLs are typed into the browser to access Web site home pages
and individual Web pages and can be embedded in Web pages to provide
hypertext links to other pages. The general format for a URL is protocol
prefix, domain name, subdirectory name, and document name.
02
EXAMPLE: http://www.cengage.com/accounting/hall
From this homepage, the user can activate hyperlinks to other pages as desired. The
user can go directly to a linked page by providing the complete address and separating
the address components with slashes.
URL ADDRESS
Subdirectories - These can be several levels deep. To reference them, each
must be separated with a slash. For example, the elements of the following URL
for a hypothetical sporting goods company are described next:
http://www.flyfish.com/equipment/rods/brand_name.html
The data communications industry borrowed the term protocol from the diplomatic community.
Diplomatic protocols define the rules by which the representatives of nations communicate
and collaborate during social and official functions.
02 Reductions in inventory
investment and carrying costs
Rapid creation of business partnerships to
03 fill emerging market niches
Reductions in retail prices through lower
04 marketing costs
TRANSACTION LEVEL
DISTRIBUTION LEVEL
1st
Organizations involved at the transaction level use the Internet to accept orders from
customers and/or to place them with their suppliers. This involves engaging in business
activities with total strangers from remote parts of the world. These may be customers,
suppliers, or potential trading partners. Many of the risks that are discussed later in the
chapter relate to this (and to the next) level of electronic commerce.
Success in this domain involves creating an environment of trust by resolving the key
concerns listed here:
• Ensure that data used in the transaction are protected from misuse.
• Verify the accuracy and integrity of business processes used by the potential customer,
partner, or supplier.
• Verify the identity and physical existence of the potential customer, partner, or supplier.
• Establish the reputation of the potential customer, partner, or supplier.
3rd
THEFT OF PASSWORDS
One form of Internet fraud involves establishing a Web site to
steal a visitor’s password. To access the Web page, the visitor is
asked to register and provide an e-mail address and password,
the cyber criminal uses the captured password to break into the
victim’s accounts.
CONSUMER PRIVACY
Concerns about the lack of privacy discourage consumers from
engaging in Internet commerce. One poll revealed that:
Almost two-thirds of non-Internet users would start using the
Internet if they could be assured that their
personal information was protected.
Privacy is the number one reason that individuals are
avoiding Internet commerce.
Modification of IP Address
a perpetrator modifies the IP address of the
originating computer to disguise his or her
identity
Disguise
may be used to make a message appear
to be coming from a trusted or authorized
source and thus slip through control
systems designed to accept transmissions
from certain (trusted) host computers and
block out others
IP Spoofing
A hacker may spoof a manufacturing firm
with a false sales order that appears to
come from a legitimate customer. If the
spoof goes undetected, the manufacturer
will incur the costs of producing and
delivering a product that was never ordered.
Not Sending the Final Ackowledgement
The connecting server sends an initiation
code called a SYN (SYNchronize) packet to
the receiving server.
Logic Bombs
a sinister piece of code that is secretly
inserted into a computer network, operating
system, or a software application
Trojan Horses
type of malicious code or software that
looks legitimate but can take control of
your computer
Malicious Programs
These disrupts IT and computer
processes and in extreme cases
can delete, steal or hold to ransom
valuable business data such as
accounting records and secret
product formula and processes.
Encryption Digital
Authentication
Firewalls Seals of
Assurance
The sender uses an encryption algorithm
the conversion of data into a to convert the original message (called
secret code for storage in cleartext) into a coded equivalent (called
databases and transmission ciphertext). At the receiving end, the
ciphertext is decoded (decrypted) back
over networks into cleartext.
ONE IS ENOUGH.
It can be inferred in this study that sticking
with a single seal of assurance is enough
or sometimes actually better than availing
all types of seal of assurance.
Better Business Bureau
a nonprofit organization that has been
promoting ethical business practices
through self-regulation since 1912
has extended its mission to the
Internet through a wholly owned
subsidiary called BBBOnline, Inc
BBBOnline relates primarily to concern
Qualifications about business policies, ethical advertising,
and consumer privacy
1. Become a member of the BBB.
2. Provide information about the company’s
ownership, management, address, and phone
number. This is verified by a physical visit to the
company’s premises. BBOnline does not verify controls over
3. Be in business for at least 1 year. transaction processing integrity and
4. Promptly respond to customer complaints. data security issues.
5. Agree to binding arbitration for unresolved disputes
with customers
TRUSTe
Founded in 1996
1 2 3 4
9 8 7 6 5
Local Area Networks Wide Area Networks
LANs are often confined to a single room in
When networks exceed the geographic
a building, or they may link several
limitations of the LAN, they are called WANs.
buildings within a close geographic area.
The WAN may be used to link geographically
However, a LAN can cover distances of
dispersed segments of a single organization
several miles and connect hundreds of
or connect multiple organizations in a trading
users. The computers connected to a LAN
partner arrangement.
are called nodes.
CARRIER SENSING
TOKEN PASSING A random access technique that
It involves transmitting a special detects collisions when they
signal—the token—around the occur
network from node to node
in a specific sequence.
• Polling is the most popular
DATA COLLITION
technique for establishing
a communication session
in WANs.
• If a slave responds in the
affirmative, the master site
locks the network while
the data are transmitted.
• Allows priorities to be set
for data communications
across the network.
• polling is noncontentious.
• Important nodes can be
polled more often than
less important nodes.
POLLING
• Each node on the
DATA COLLITION
network receives the
token, regenerates it,
and passes it to the next
node.
• Only the node
possessing the token is
allowed to transmit data.
• can be used with either
ring or bus topologies
• major advantage is its
deterministic access
method, which avoids
data collisions
TOKEN PASSING
• This technique, which is formally labeled carrier-sensed multiple
DATA COLLITION
access with collision detection (CSMA/CD), is used with the bus
topology.
• Collisions can occur when two or more nodes, unaware of each
other’s intent to transmit, do so simultaneously when they
independently perceive the line to be clear.
• This technique is widely used--found on Ethernets.
ADVANTAGES OF ETHERNETS
(1) the technology, being relatively
simple, is well suited to the less costly twisted-pair cabling, whereas
token ring works best with more
expensive coaxial cable;
(2) the network interface cards Ethernet uses are much less
expensive than those
used in the token ring topology; and
(3) Ethernet uses a bus topology, which is easier to expand.
CARRIER SENSING
Union Pacific (2016)
Electronic Data Interchange (EDI) is the
electronic interchange of business information
using a standardized format. It is a process
which allows one company to send information
to another company electronically rather than
with paper.
SECOND
transaction
engage in EDI on its own.
information
transmitted in a standardized
is
EDI
format. Therefore, firms with
different internal systems can
exchange information and do
business.
THIRD
the information systems of the trading partners The intercompany
automatically process the transaction. In a
pure EDI environment, there are no human
exchange of computer-
intermediaries to approve or authorize processible business
transactions. Authorizations, mutual information in standard
obligations, and business practices that apply format.
to transactions are all specified in advance
under the trading partner agreement.
Data keying.
01 EDI reduces or even eliminates the need for data entry.
Error reduction
02 Firms using EDI see reductions in data keying errors, human
interpretation and classification errors, and filing errors.
Automated procedures
04 EDI automates manual activities associated with purchasing,
sales order processing, cash disbursements, and cash receipts.
Inventory reduction
01
05
01 By ordering directly as needed from vendors, EDI reduces the
lag time that promotes inventory accumulation.
Transport Layer
to ensure delivery of the entire
file or message across
individual networks and
multiple networks, regardless
of the number and type of Session Layer
dissimilar devices involved. specific connection between
Physical Layer two users or entities on the
defines standards for the network. The purpose of this
physical interconnection of layer is to guarantee a correct
devices to the electronic and synchronized connection.
circuit. Concerned with pin
connections to devices, the Data Link Layer
wiring of workstations, and concerned with the
cabling standards. transmission of packets Network Layer
of data from node to deal with the routing and
node based on the relaying of data to different
workstation address. LANs and WANs based
on the network address.
They specify how to identify
nodes on a network and
regulate the sequencing of
messages to the nodes.
Presentation Layer Application Layer
data in transit are often in a provides the overall environment for
the user or the user’s application to
format that is very different
access the network. These services—
from what the user’s common to all communicating
application requires. It provide applications—include protocols for
the rules for editing, formatting, network management, file transfer, and
converting, and displaying data e-mail.
to the user’s system.
WE HOPE THAT YOU’VE LEARNED A LOT!