Question? Leave a message!




advantages and risks of e-commerce

advantages and risks of e-commerce
COM1004 Web and Internet Technology  What business tasks are involved in running an e-commerce site?  What are the advantages and risks of e- commerce?  How can sites be attacked? Can attackers be identified?  What about more general scams? Can you trace the scammer?  Is e-commerce viable in the face of web- piracy?  Identify your goals  Identify your products  Identify your customers  Be aware there are different types of site  Understand the risks and threats  Choose a sensible web strategy  Do you have wider strategic aims?  Increased sales?  Reduced processing costs?  Faster turnaround of orders?  How will you judge your own success?  Is e-commerce a sensible solution?  Selling books (yes)  Detailed legal advice (probably need a local office or phone link)  Fresh bread (probably need a local shop) http://www.sheffield.ac.uk/dcs http://www.tesco.com/ http://www.royalmail.com/postcode-finder http://www.britishpathe.com/search/query/HIPPIE+FASHIONS https://www.usps.com/ http://secondlife.com/ http://www.amazon.com/forum/kindle  What sort of site is this? http://tvguide.co.uk/?systemid=3  All businesses face threats  They can be systemic (bad planning, bad structure)  They can be internal (unhappy staff, lack of training)  They can be external (illegal attacks, competitors) http://commons.wikimedia.org/wiki/File:Bmp-3_scanned_side_view.gif  Hackers  Not getting enough business  Getting too much business  Hardware failure  Network and utility failure  Reliance on other companies  Competition  Software errors  Government policies and taxes  Capacity limitations  Exposing confidential data  Loss or destruction of data  Modification of data  Denial of Service (DoS, DDoS) attacks  Errors in software  Repudiation http://www.marketingmagazine.co.uk/News/MostEmailed/1120547/O2-plans-radical-revamp- confusing-brand-website/ 30 August 2011 Hi - You haven't actually answered my question AT ALL. I already knew that the existing card couldn't be de- registered (I even said so in my original message). The question is whether the NEW card has to be registered…. http://www.google.co.uk/search?q=upcoming+fellowship+deadlines Dear Amazon, You have invoiced my credit card for a CD I never ordered, and which I have never received. Please return my money immediately. How can Amazon prove you ordered and received the CD? Is it worth the cost of doing so? http://www.bizhelp24.com/money/cash-flow-control/avoiding-cash-flow-problems.html  How well are you doing?  Are you going to have cash-flow problems?  Where is future growth going to come from?  Who are you main customers?  Which customers are you missing out on?  How can you improve?  Test to destruction?  Kanban / Just-in-Time distribution? http://www.talktalk.co.uk/service-status/ http://www.google.co.uk/search?q="Private+and+Confidential"  Site may become inaccessible  Access may slow down  May affect wider network  May affect wider region How will you cope with  An earthquake  DDoS attacks  IT boss goes on holiday  Fire  Disk crash  Broadband cable is cut  Power cut  Unhappy employees Pretending to be something you're not Beloved in God I am Rebecca, widow of the late MR WILLIAM SMITH Minister for Oil. I have urgently need transfer 12,345,674,201 to overseas for avoid death taxes. I urge your help, confident in God, and will pay fee 10%. BEWARE: You cannot deduce anything from the writing style. It may contain deliberate mistakes to make you think the sender is too naïve to bother about. http://www.419eater.com/index.php http://www.theregister.co.uk/2005/02/03/email_dec_fake_site/ http://en.wikipedia.org/wiki/Code_injectionSQL_injection http://www.securingjava.com/chapter-four/chapter-four-6.html  Forged emails can fool people into providing personal information We are introducing a new online security system. Click here to update your password.  Suppose you receive an attachment called "hello.jpg"  What type of file is it?  Is it safe to open it? Windows lets you hide filename extensions for common file types, e.g. ".txt". The attached file could actually be called "hello.jpg.exe".  Includes  Any crime that uses a computer in its commission  Hacking into computers  Downloading of illegal images  Accessing digital data without permission  How do we prove who did what?  Examine the suspect's computer and disks  Check existing files  Check emails and download logs  Examine .torrent files  Reconstruct and check deleted files  Examine swap space  Look for file headers and familiar patterns  Magnetic properties of media can be exploited  Internet traffic uses headers  Some headers can't be forged easily Received: from fake.gov (mike.com 207.977.21.22) Note the confusion. Is this email from mike.com or fake.gov?  A student advertised on the web saying he was a stand-in lecturer, and needed urgent help finding the solution to an assignment, as the original lecturer hadn't left any notes  The student placed several ads, using different names and email addresses, and offered to pay  How did we identify the student?  How long did it take? http://wikimediafoundation.org/wiki/English_Wikipedia_anti-SOPA_blackout • Who owns digital media? • What laws protect digital media? • What is the intention behind the laws? • Do they do what's intended? • Are they enforceable?
Website URL
Comment