Chapter 9 E-Security. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security Designing for Security.
Chapter 2 The Internet and the World Wide Web. Awad –Electronic Commerce 1/e © 2002 Prentice Hall2 OVERVIEW Introduction Usage of Internet Limitations.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Chapter 4 Internet Architecture. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OVERVIEW What is a Network? IP Addresses Networks Information Transfer.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
Chapter 3 Launching a Business on the Internet. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction of E-Business Life Cycle.
Chapter 12 Implementation and Maintenance. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Implementation Strategies –Proper Testing &
ELC 200 Day 5, 6 & 7. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #1 partially corrected –Still waiting for late assignments.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
ELC 200 Day 10. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #3 Corrected –2 A’s, 10 B’s, 3 C’s, 1 D, 2 F’s and 1 non-submit.
ELC 200 Day 11. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #3 Corrected –6 A’s, 1 B, 1 F and 2 non-submit Assignment.
ELC 200 Day 14. Chapter 9 Website Evaluation & Usability Testing.