Question? Leave a message!




advantages and risks of e-commerce

advantages and risks of e-commerce
COM1004 Web and Internet Technology  What business tasks are involved in running an ecommerce site  What are the advantages and risks of e commerce  How can sites be attacked Can attackers be identified  What about more general scams Can you trace the scammer  Is ecommerce viable in the face of web piracy  Identify your goals  Identify your products  Identify your customers  Be aware there are different types of site  Understand the risks and threats  Choose a sensible web strategy  Do you have wider strategic aims  Increased sales  Reduced processing costs  Faster turnaround of orders  How will you judge your own success  Is ecommerce a sensible solution  Selling books (yes)  Detailed legal advice (probably need a local office or phone link)  Fresh bread (probably need a local shop) http://www.sheffield.ac.uk/dcs http://www.tesco.com/ http://www.royalmail.com/postcodefinder http://www.britishpathe.com/search/query/HIPPIE+FASHIONS https://www.usps.com/ http://secondlife.com/ http://www.amazon.com/forum/kindle  What sort of site is this http://tvguide.co.uk/systemid=3  All businesses face threats  They can be systemic (bad planning, bad structure)  They can be internal (unhappy staff, lack of training)  They can be external (illegal attacks, competitors) http://commons.wikimedia.org/wiki/File:Bmp3scannedsideview.gif  Hackers  Not getting enough business  Getting too much business  Hardware failure  Network and utility failure  Reliance on other companies  Competition  Software errors  Government policies and taxes  Capacity limitations  Exposing confidential data  Loss or destruction of data  Modification of data  Denial of Service (DoS, DDoS) attacks  Errors in software  Repudiation http://www.marketingmagazine.co.uk/News/MostEmailed/1120547/O2plansradicalrevamp confusingbrandwebsite/ 30 August 2011 Hi You haven't actually answered my question AT ALL. I already knew that the existing card couldn't be de registered (I even said so in my original message). The question is whether the NEW card has to be registered…. http://www.google.co.uk/searchq=upcoming+fellowship+deadlines Dear Amazon, You have invoiced my credit card for a CD I never ordered, and which I have never received. Please return my money immediately. How can Amazon prove you ordered and received the CD Is it worth the cost of doing so http://www.bizhelp24.com/money/cashflowcontrol/avoidingcashflowproblems.html  How well are you doing  Are you going to have cashflow problems  Where is future growth going to come from  Who are you main customers  Which customers are you missing out on  How can you improve  Test to destruction  Kanban / JustinTime distribution http://www.talktalk.co.uk/servicestatus/ http://www.google.co.uk/searchq="Private+and+Confidential"  Site may become inaccessible  Access may slow down  May affect wider network  May affect wider region How will you cope with  An earthquake  DDoS attacks  IT boss goes on holiday  Fire  Disk crash  Broadband cable is cut  Power cut  Unhappy employees Pretending to be something you're not Beloved in God I am Rebecca, widow of the late MR WILLIAM SMITH Minister for Oil. I have urgently need transfer 12,345,674,201 to overseas for avoid death taxes. I urge your help, confident in God, and will pay fee 10. BEWARE: You cannot deduce anything from the writing style. It may contain deliberate mistakes to make you think the sender is too naïve to bother about. http://www.419eater.com/index.php http://www.theregister.co.uk/2005/02/03/emaildecfakesite/ http://en.wikipedia.org/wiki/CodeinjectionSQLinjection http://www.securingjava.com/chapterfour/chapterfour6.html  Forged emails can fool people into providing personal information We are introducing a new online security system. Click here to update your password.  Suppose you receive an attachment called "hello.jpg"  What type of file is it  Is it safe to open it Windows lets you hide filename extensions for common file types, e.g. ".txt". The attached file could actually be called "hello.jpg.exe".  Includes  Any crime that uses a computer in its commission  Hacking into computers  Downloading of illegal images  Accessing digital data without permission  How do we prove who did what  Examine the suspect's computer and disks  Check existing files  Check emails and download logs  Examine .torrent files  Reconstruct and check deleted files  Examine swap space  Look for file headers and familiar patterns  Magnetic properties of media can be exploited  Internet traffic uses headers  Some headers can't be forged easily Received: from fake.gov (mike.com 207.977.21.22) Note the confusion. Is this email from mike.com or fake.gov  A student advertised on the web saying he was a standin lecturer, and needed urgent help finding the solution to an assignment, as the original lecturer hadn't left any notes  The student placed several ads, using different names and email addresses, and offered to pay  How did we identify the student  How long did it take http://wikimediafoundation.org/wiki/EnglishWikipediaantiSOPAblackout • Who owns digital media • What laws protect digital media • What is the intention behind the laws • Do they do what's intended • Are they enforceable