0% found this document useful (0 votes)
83 views3 pages

E Commerce

The document discusses various topics related to websites and internet security including: 1) Five main types of websites and their purposes including informational, ecommerce, blogs, social media, and custom applications. 2) The differences between TCP and IP in how they control message assembly/disassembly and packet addressing. 3) The differences between static and dynamic web pages in how content is stored and delivered. 4) Definitions of static and dynamic websites based on how pages are stored and generated. 5) The differences between viruses and worms in how they replicate and spread.

Uploaded by

melissa ng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views3 pages

E Commerce

The document discusses various topics related to websites and internet security including: 1) Five main types of websites and their purposes including informational, ecommerce, blogs, social media, and custom applications. 2) The differences between TCP and IP in how they control message assembly/disassembly and packet addressing. 3) The differences between static and dynamic web pages in how content is stored and delivered. 4) Definitions of static and dynamic websites based on how pages are stored and generated. 5) The differences between viruses and worms in how they replicate and spread.

Uploaded by

melissa ng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Final Revision

1. 5 type of website
 Informational website have a simple goal of informing the user about the specific topic such as Wikipedia.
 Ecommerce website have a goal of making profit such as Amazon.com.
 Blog is short for web log. Blog are made up of ‘postings’ that contain text, video or some other content.
 Social media website have dominated internet use for several years now such as Facebook
 Custom web applications such as a website that art like a software program that loads though web browser.

2. Different between TCP and IP


 TCP control the disassembly of messages or a file into packet before it is transmitted over the internet, and it is
control the reassembly of the packet in the original format when they reach their destination.
 IP specific the addressing detail with each packets, labelling each with the packet’s origination and destination
address.

3. Different between dynamic web page and static web page


 Static web page is an unchanged page retrieved from the file on the web serve.
 Dynamic web page whose content is shaped by a program in response to user request.

4. Define of static website and dynamic website


 Static website
It has web page store on the serve in the format that sent to a client web browser.
Primarily coded in Hyper Text Mark-up Language(HTML)
Example of website such as classic website.
This may include information about a company and its product and service via text, video.
 Dynamic Catalog
Changes or customize itself frequently and automatically, based on certain criteria
Two type of dynamic activity:
 Dynamic Code is invisible or behind the scenes
 Dynamic Content is visible or fully displayed.

5. Different between virus and worm


 The virus is a software that attaches itself to another program and can cause damage when the host program is
activated.
 The worm is a type of virus that replicate itself to the computer that it infect and can spead quickly though the
internet.

6. Cybersquatting
 It mean that buy domain name that lead to trend and make the profit from a goodwill of trademark belongs to
someone else.

7. Different between white hacker and black hacker (Case study)


 White hacker
Doing good ; ethical hacker
Work with government or company as security specialist
With permission to enter the computer
 Black hacker
Motivation is personal gain, but they can involve in cybercrime
Aim Steal other people data specially for financial information
 Define of Hacker
 A person that using their knowledge of computer software and hardware to entre people computer to
receive information.
8. SSL; TLS ; SET ; HTTPS ; VPN
 SSL(Secure Sockets Layer)
A commonly used encryption technique for scrambling data it is passed across the internet from customer’s
web browser to merchant’s web serve.
 TLS(Transport Layer Security)
A protocol that provide privacy and data integrity between two communicating application.
TLS is composed two layer: TLS Record Protocol and TLS Handshake Protocol
 SET (Secure Electronic Transaction)
A standard of public key encryption intended to enable secure ecommerce transaction, lead development by
Mister Card and VISA.
 HTTPS (Hype Text Transaction Protocol Secure)
HTTPS appear in URL when a website is secured by SSL certificate.
 VPN (Virtual Private Network) is one of the private key
Use private wide-area network that run over the public network, rather than a more experience private
network. It keep your financial information safe online by encrypt.
VPN use encrypt to hide all your data, history etc.

9. How to secure you website?


 Keep yourself updated by reading tech blog
 Use strong password to enhance website security
 Delete installation folder
 Change your database table prefix
 Protect your database with password
 Update your web script constantly
 secure your administrative email address

10. Briefly describe the requirements for secure electronic commerce//How to secure for internet transaction(Case
Study)
 Integrity : checking the message is sent it complete (i.e. it is not corrupted)
 Availability : Provide delivery assurance message of segment
 Key management : Provide a distribution and management of key needed to provide secure communication
 Non-repudiation : answer sender cannot deny message
 Authentication : Authentication are parties to the transaction who they claim to be

11. How does a payment gateway work? (Case Study)


 Must provide by bank to its customer
 Facilitate portal and front and processor
 Merchant service provided by ecommerce application provided by use credit card and direct payment of e-
business and online retailer.

12. Phishing attacks & Pharming


 Phishing involve getting user to entre personal information via fake email.
 Pharming involve modifying domain name system entries, which cause the user to be direct entry wrong
website when they visit a certain web address.

13. Different between static catalog and a dynamic catalog?


 Static Catalog
It is a simple list written in HTML that appear on web page.
To add or delete an item or change the item listing, the company must edit in HTML in one page or more
page.
 Dynamic Catalog
It store information about item in database.
Feature multiple picture of each item, detail description and a search tool that allow customer search an item
and determine its availability.
14. Symmetric encryption (Case Study)
 Define:
Encode the message by using two mathematically related numeric key
Utilize the same key for decryption and encryption.
 Private key
Kept secret by the private key owner
The owner use the private key to decrypt the message received
 Public key
Freely distribution to public
Used to encrypt message using encryption algorithms.
 Ad of Public key
No problem of key distribution
Small combination of key required
Implement of digital signature possible
 Disa of Public key
Do not replace private key
Significantly lower than private key system

15. Difference between shared hosting and dedicated hosting and self-hosting?
 Shared hosting
The client’s Web site is on a server that hosts other Web sites simultaneously and is operated by
the service provider at its location.
 Dedicated hosting,
The service provider makes a Web server available to the client, but the client does not share the
server with other clients of the service provider.
 Self-hosting
The online business owns and maintains the server and all its software.

16. What are the advantages of using a value-added network?


 Users need to support only the VAN’s communications protocol instead of many possible protocols used by
trading partners.
 The VAN records message activity in an audit log.
 The VAN audit log becomes an independent record of transactions, and this record can be helpful in resolving
disputes between trading partners.
 The VAN can provide translation between different transaction sets used by trading partners.
 The VAN can perform automatic compliance checking to ensure that the transaction set is in the specified EDI
format.

17. Describe the major components of a typical request message from a client to a server.
 Three major parts:
 Request line contains a command, the name of the target resource and the protocol name and version
number.
Optional request headers can contain information about the types of files that the client will accept in
response to this request.
Optional entity body is sometimes used to pass bulk information to the server.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy