Escolar Documentos
Profissional Documentos
Cultura Documentos
A management information system (MIS) is a system that provides information needed to manage organizations efficiently and effectively. Management information systems involve three primary resources: technology, information, and people. It's important to recognize that while all three resources are key components when studying management information systems, the most important resource is people. Management information systems are regarded as a subset of the overall internal controls procedures in a business, which cover the application of people, documents, technologies, and procedures used by management accountants to solve business problems such as costing a product, service or a business-wide strategy. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization. Academically, the term is commonly used to refer to the group of information management methods tied to the automation or support of human decision making, e.g. decision support systems, expert systems, and executive information systems
Some examples of TPS Payroll systems Order processing systems Reservation systems Stock control systems Systems for payments and funds transfers
The role of TPS Produce information for other systems Cross boundaries (internal and external) Used by operational personnel + supervisory levels Efficiency oriented
MIS are built on the data provided by the TPS Functions of a MIS in terms of data processing requirements Inputs Processing Outputs Internal Transactions Sorting Summary reports Internal Files Merging Action reports Structured data Summarizing Detailed reports Some examples of MIS Sales management systems Inventory control systems Budgeting systems Management Reporting Systems (MRS) Personnel (HRM) systems Based on internal information flows Support relatively structured decisions Inflexible and have little analytical capacity Used by lower and middle managerial levels Deals with the past and present rather than the future Efficiency oriented?
Some examples of DSS Group Decision Support Systems (GDSS) Computer Supported Co-operative work (CSCW) Logistics systems Financial Planning systems Spreadsheet Models? Support ill- structured or semi-structured decisions Have analytical and/or modeling capacity Used by more senior managerial levels Are concerned with predicting the future Is effectiveness oriented?
The role of EIS Are concerned with ease of use Are concerned with predicting the future Is effectiveness oriented? Are highly flexible Support unstructured decisions Use internal and external data sources Used only at the most senior management levels
Ans 01:
b)
The International Dimension:
International dimensions have become a vital part of managing a business enterprise in the internetworked global economies and markets of today. Properly designed and managed information systems using appropriate information technologies are a key ingredient in international business, providing vital information resources needed to support business activities in global markets.
Managing Global IT
Global IT Management The major dimensions of the job of managing global information technology include: E-Business/IT strategies E-Business application portfolios Internet-based technology platforms Data resource management Systems development
Stress to the students that all global IT activities must be adjusted to take into account the cultural, political, and geo-economics challenges that exists in the international business community. Developing appropriate e-business and IT strategies for the global marketplace should be the first step in global e-business technology management. Once that is done, end user and IS managers can move on to developing: The portfolio of applications needed to support e-business/IT strategies; The hardware, software, and Internet-based technology platforms to support those applications The data resource management methods to provide necessary databases The systems development projects that will produce the global information systems required.
Cultural, Political, and Geo-economics Challenges: Global IT management does not exist in a vacuum. Global IT management must focus on developing global business IT strategies and managing global e-business application portfolios, Internet technologies, and platforms, databases, and systems development projects. Managers must also take into account the cultural, political, and geographic differences that exist when doing business internationally. Political Challenge: - Political challenges facing global business and IT managers include: 1. Many countries have rules regulating or prohibiting transfer of data across their national boundaries (transformer data flows), especially information such as personnel records. 2. Restrict, tax, or prohibit imports of hardware and software. 3. Local content laws that specify the portion of the value of a product that must be added in that country if it is to be sold there. 4. Reciprocal trade agreements that require a business to spend part of the revenue they earn in the country in that nations economy. Geo-economics Challenges: Geo-economics challenges in global business and IT refer to the effects of geography on the economic realities of international business activities. These challenges include: 1. Physical distances involved are still a major problem 2. Worlds 24 time zones contribute to communications problems 3. Lack of telecommunications capabilities in some countries 4. Lack of specialized job skills in some countries, or enticing specialists from other countries to live and work there 5. Cost of living and labor costs in various countries. Cultural Challenges: - Cultural challenges facing global business and IT managers include: 1. Differences in languages, cultural interests, religions, customs, social attitudes, and political philosophies. 2. Differences in work styles and business relationships.
Global strategies, where a companys worldwide operations are closely managed by corporate headquarters.
In a transnational approach, a business depends heavily on its information systems and appropriate information technologies to help it integrate its global business activities. A transnational business tries to develop an integrated and cooperative worldwide hardware, software, and telecommunications architecture for its IT platform.
The applications of information technology developed by global companies depend on their ebusiness and IT strategies and their expertise and experience in IT. However, their IT applications also depend on a variety of global business drivers, that is, business requirements (business drivers) caused by the nature of the industry and its competitive or environmental forces. Examples include airlines and hotel chains with global customers, that is, customers who travel widely or have global operations. Such companies will need global e-business capabilities for online transaction processing so they can provide fast, convenient service to their customers or face losing them to their competitors. The economies of scale provided by global e-business operations are another business driver that requires the support of global IT applications.
Global IT Platforms:
The management of technology platforms (also called the technology infrastructure) is another major dimension of global IT management. Technology platforms required to support a global business operation must consider: Hardware Software Data resources Internet, intranet, extranet sites
The Internet as a Global IT Platform: By connecting their businesses to this online global infrastructure, companies can: Expand their markets Reduce communications and distribution costs Improve their profit margins without massive cost outlays for new telecommunication facilities.
The Internet, along with its related intranet and extranet technologies, provides a low-cost interactive channel for communications and data exchange with: Employees Customers Suppliers Distributors Manufacturers Product developers Financial backers Information providers and so on.
Global Systems Development: Reaching agreement on systems requirements is always difficult, but becomes many times more difficult when the users and developers are in different countries. Some of these issues involve: Conflicts over local versus global system requirements, and difficulties in agreeing on common features such as multilingual user interfaces and flexible design standards. Agreements on global systems must take place in an environment that promotes involvement and ownership of a system by local end users. Disturbances can arise from systems implementation and maintenance activities. Trade-offs must be made between developing one system that can run on multiple computer and operating platforms, by letting each local site customize the software for its own platform.
Briefly on different Phases: Feasibility The feasibility study is used to determine if the project should get the go-ahead. If the project is to proceed, the feasibility study will produce a project plan and budget estimates for the future stages of development. Requirement Analysis and Design Analysis gathers the requirements for the system. This stage includes a detailed study of the business needs of the organization. Options for changing the business process may be considered. Design focuses on high level design like, what programs are needed and how are
they going to interact, low-level design (how the individual programs are going to work), interface design (what are the interfaces going to look like) and data design (what data will be required). During these phases, the software's overall structure is defined. Analysis and Design are very crucial in the whole development cycle. Any glitch in the design phase could be very expensive to solve in the later stage of the software development. Much care is taken during this phase. The logical system of the product is developed in this phase.
Implementation
In this phase the designs are translated into code. Computer programs are written using a conventional programming language or an application generator. Programming tools like Compilers, Interpreters, and Debuggers are used to generate the code. Different high level programming languages like C, C++, Pascal, and Java are used for coding. With respect to the type of application, the right programming language is chosen.
Testing
In this phase the system is tested. Normally programs are written as a series of individual modules, this subject to separate and detailed test. The system is then tested as a whole. The separate modules are brought together and tested as a complete system. The system is tested to ensure that interfaces between modules work (integration testing), the system works on the intended platform and with the expected volume of data (volume testing) and that the system does what the user requires (acceptance/beta testing).
Maintenance
Inevitably the system will need maintenance. Software will definitely undergo change once it is delivered to the customer. There are many reasons for the change. Change could happen because of some unexpected input values into the system. In addition, the changes in the system could directly affect the software operations. The software should be developed to accommodate changes that could happen during the post implementation period.
Case Study
Release Iterations (End Game): During the Release Iterations, also known as the "end game", we transition the system into production. Production: The goal of the Production Phase is to keep systems useful and productive after they have been deployed. Retirement: The goal of the Retirement Phase is the removal of a system release from production, and occasionally even the complete system itself, an activity also known as system decommissioning or system sun setting.
Construction: Also known as the Development Stage, this stage completes the construction of the physical application system, builds the conversion system, and develops user aids and implementation work plans. Implementation: Also known as the Deployment Stage, this stage includes final user testing and training, data conversion, and the implementation of the application system. Post-Project Activities: Final deliverables are handed over to our clients and such activities are performed that will benefit future projects. Specifically it is our best practice to review and document project metrics, organize and store project assets such as reusable code components, Project Management Plan, User Design Specs and User Manual.
Strength and Weaknesses of SDLC Strengths Control. Monitor Large projects. Detailed steps. Evaluate costs and completion targets. Documentation. Well defined user input. Ease of maintenance. Development and design standards. Tolerates changes in MIS staffing.
Weaknesses Increased development time Increased development cost. Systems must be defined up front. Rigidity. Hard to estimate costs, project overruns User input is sometimes limited.
PRIMARY STORAGE:
The Primary storage is used to refer for local random access disk storage and is properly called secondary storage. If this type of storage is called primary storage, then the term secondary storage would refer to offline. This usually occurs in the slower, larger forms of storage which is used to develop the vendors to provide secure device management services, authentication services, as well as encryption for data. There is software and application based solutions; however software-based encryption solutions can impact performance during the storage process. Vendors provide hardware based solutions, which are appliances that provide authentication to protect the data. These devices are taken into account for the different requirements of securing data on primary or secondary storage. The primary storage performance and access specifications for the tape environment and requires the encrypting to tape would require integration with backup schemas for primary storage scenarios.
Processor Registers: Processor registers, located within the CPU are used to load instructions for execution by the CPU. Registers hold data word of size 32 or 64 bits. They are the fastest means of data storage. But they are capable of storing data of a very small size. Processor Cache: Processor cache is the part of RAM and is used for speeding up the executions. It copies the most frequently used data from the main memory and stores it. When the CPU needs the particular data item, it can simply access the cache memory which is closely located, instead of accessing the much slower main memory.
Though, primary storage allows faster access, it is highly volatile in nature that means, it clears up during the booting. To prevent this, a small bootstrap program (BIOS) is implemented. BIOS load the booting instructions from the non-volatile main memory and execute them to boot RAM. The problem of volatility can be avoided using Read Only Memory (ROM). Though ROM retains the program instructions it does not allow to add or change them.
SECONDARY STORAGE:
The secondary storage helps in securing the data on media types and storage categories, as data is vulnerable to network attacks, administrative access and media theft. There are many organizations who are working with third parties and disaster recovery efforts. Often data goes offsite and is in the hands of employees that are not authorized to see critical company data. And storage consolidation opens the door to greater administrative access. All of these trends drive the need to ensure the data at rest is secure.
organized into files, directories and drives. The drives are periodically formatted to provide the abstraction as required by the File System. The commonly used secondary storage devices include flash drives, USB sticks, punch cards, floppy disks, CDs, magnetic tapes etc. Though, secondary storage provides very slow access, it is much cheaper than the primary storage and is capable of storing much larger volumes of data. Modern computer operating systems implement virtual memory to efficiently use the available space on the primary memory. As for secondary memory, it is still an important medium of storing data and recovering it in times of crisis. However, the nature of the data located on primary storage certain specifications for encryption appliances. First, lets look at data located on primary storage arrays. Primary data is critical to the operation of the organization on a daily basis. Primary storage often contains current financial, customer, design, process or transactional information. The data must be highly available and access should be immediate, with minimal latency, particularly in transactional database environments. Many applications do not work effectively if there is excessive latency in the data path. An encryption appliance for primary storage would need to address all of these issues. Performance would be critical; the appliance cannot introduce any latency into the data path. The appliance itself would also need to be extremely secure and transparent to the network, providing levels of authentication for access to the device itself. Unauthorized users should not be able to access the encryption keys or change the configuration of the device, including policies and administration permissions. Thus, both the primary and secondary storage plays the vital part in maintaining the system storage.
SECONDARY STORAGE
1. Secondary storage, or auxiliary storage, is memory external to the main body of the computer (CPU) where programs and data can be stored for future use. When the computer is ready to use these programs, the data is read into primary storage. Secondary storage media extends the storage capabilities of the computer system. Secondary storage is required for two reasons. First, the working memory of the CPU is limited in size and cannot always hold the amount of data required. Second, data and programs in secondary programs do not disappear when the power is turned off. Secondary storage is nonvolatile memory. This information is lost only when you erase it. Magnetic disks are the most common type of secondary storage. They may be either floppy disks or hard disks (hard drives).
PERIPHERAL DEVICES
1. Peripheral devices include all the input and output devices used with a computer system. When these devices are under control of the CPU, they are said to be on line. When they perform their function independently, not under direct control of the CPU, they are said to be off line. The following peripheral devices are used commonly for input and output. Those that perform only input are marked (I), those that perform only output are marked (O), and those that perform both input and output are marked (I/O).
1. An optical character reader reads printed data (characters) and translates it to machine code. Keyboard (I) The keyboard is used by a computer operator to communicate with a computer system
Ans 03(b):
Office Automation
The term office automation refers to all tools and methods that are applied to office activities which make it possible to process written, visual, and sound data in a computeraided manner. Office automation is intended to provide elements which make it possible to simplify, improve, and automate the organization of the activities of a company or a group of people (management of administrative data, synchronization of meetings, etc.). Considering that company organizations require increased communication, today, office automation is no longer limited to simply capturing handwritten notes. In particular, it also includes the following activities: exchange of information management of administrative documents handling of numerical data
AppleWorks Corel WordPerfect IBM/Lotus SmartSuite Microsoft Office Sun Star Office Open Office (freeware)
1. Word Processing Software: Writer is fully functional word processing program and desktop publishing software that is suitable for business use. It has all the features that you would expect to see in a professional word processor. For example, formatting, application of styles, spell checking, auto completion, and many more. It is easy enough to use for a beginner to write a quick memo and powerful enough for an author to write a complete book. Replacement for: Microsoft Word 2. Spreadsheet Software: Calc is a spreadsheet program that is intuitive and easy to learn but yet has a full set of numerical data analysis tools. This spreadsheet package is powerful enough to allow you to complete your numerical tasks quickly and efficiently Replacement for: Microsoft Excel 3. Presentation Software: Impress is an outstanding presentation software package that allows you to create presentations that will deliver your message in a clear and exciting way to your audience. The tools that Impress provides will help you create simple presentations in a minimal amount of time. And yet it is sophisticated enough to create the most complex and stunning presentations that you can imagine. Replacement for: Microsoft Power Point 4. Database Software: Base provides you with all the power of a fully functional database program. You can define tables, forms, queries and reports to match the special data processing needs and your business. To help you create your database programs most efficiently, Base provides easy to use wizards to speed the development process.
Replacement for: Microsoft Access 5. Graphics and Design Software: Draw allows you to draw anything from a quick sketch to a complicated set of plans, to layouts and even organizational charts. You can then manipulate the objects on the screen to create realistic images and graphics to represent your ideas in a clear and concise way.
File Sharing
Computers connected to a network can share files and documents with each other. Personal computers connected to a business network can choose which files and folders are available to share on the network.
Printers
Computers can print pages to another computer with a printer on the network. Additionally, printers can be connected using a print server, which allows direct printing from all computers.
Sharing Media
Sharing media between computers is easy when connected to a network. Like file sharing, computers can stream musing, videos and movies from one computer to the next.
A media center server can store your entire entertainment library on a centralized hub to give quick access to your media from every computer on your network.
Internet
what is the Internet and why is it important to my business? "The" Internet is made up of more than 65 million computers in more than 100 countries covering commercial, academic and government endeavors. Originally developed for the U.S. military, the Internet became widely used for academic and commercial research. Users had access to unpublished data and journals on a huge variety of subjects. Today, the Internet has become commercialized into a worldwide information highway, providing information on every subject known to humankind. Start-up costs range from virtually free to millions of dollars. It costs virtually nothing to develop a web page promoting your products and place it online if you have the requisite skills and access to an inexpensive host. According to Internet.com, a major source of e-commerce news and information, medium to large size corporations spend an average of one million dollars to develop and implement their corporate e-commerce sites. Somewhere between these two numbers is where you will find yourself. That is why business planning for electronic commerce is so important.
computers (telnet), browse databases of information (gopher, World Wide Web, WAIS), and send and receive programs (ftp) contained on these computers.
Tim Berners-Lee
Tim Berners-Lee was the man leading the development of the World Wide Web (with help of course), the defining of HTML (hypertext markup language) used to create web pages, HTTP (HyperText Transfer Protocol) and URLs (Universal Resource Locators). All of those developments took place between 1989 and 1991. Tim Berners-Lee was born in London, England and graduated in Physics from Oxford University in 1976. He is currently the Director of the World Wide Web Consortium, the group that sets technical standards for the Web. Besides Tim Berners-Lee, Vinton Cerf is also named as an internet daddy. Ten years out of high school, Vinton Cerf begun co-designing and co-developing the protocols and structure of what became the Internet. HTML (hypertext markup language) Vannevar Bush first proposed the basics of hypertext in 1945. Tim Berners-Lee invented the World Wide Web, HTML (hypertext markup language), HTTP (Hypertext Transfer Protocol) and URLs (Universal Resource Locators) in 1990. Tim Berners-Lee was the primary author of html, assisted by his colleagues at CERN, an international scientific organization based in Geneva, Switzerland.
E-mail: E-mail is an online correspondence system. With e-mail you can send and receive an instant electronic message, which works like writing letters. Your messages are delivered instantly to people anywhere in the world, unlike traditional mail that takes a lot of time. Access Information: The Internet is a virtual treasure trove of information. Any kind of information on any topic under the sun is available on the Internet. The search engines on the Internet can help you to find data on any subject that you need. Shopping: Along with getting information on the Internet, you can also shop online. There are many online stores and sites that can be used to look for products as well as buy them using your credit card. You do not need to leave your house and can do all your shopping from the convenience of your home. Online Chat: There are many chat rooms on the web that can be accessed to meet new people, make new friends, as well as to stay in touch with old friends. Downloading Software: This is one of the most happening and fun things to do via the Internet. You can download innumerable, games, music, videos, movies, and a host of other entertainment software from the Internet, most of which are free.
Personal Information: If you use the Internet, your personal information such as your name, address, etc. can be accessed by other people. If you use a credit card to shop online, then your credit card information can also be stolen which could be akin to giving someone a blank check. Pornography: This is a very serious issue concerning the Internet, especially when it comes to young children. There are thousands of pornographic sites on the Internet that can be easily found and can be a detriment to letting children use the Internet. Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose and unnecessarily clog up the entire system.
Uses of Internet
The internet is computer based global information system. It is composed of many interconnected computer networks. Each network may link thousands of computers enabling them to share information. The internet has brought a transformation in many aspects of life. It is one of the biggest contributors in making the world into a global village. Use of internet has grown tremendously since it was introduced. It is mostly because of its flexibility. Nowadays one can access the internet easily. Most people have computers in their homes but even the ones who dont they can always go to cyber cafes where this service is provided. The internet developed from software called the ARPANET which the U.S military had developed. It was only restrict to military personnel and the people who developed it. Only after it was privatized was it allowed to be used commercially. The internet has developed to give many benefits to mankind. The access to information being one of the most important. Student can now have access to libraries around the world. Some charge a fee but most provide free services. Before students had to spend hours and hours in the libraries but now at the touch of a button students have a huge database in front of them
Internet Structure:
The internet is a world-wide network of computers linked together by telephone wires, satellite links and other means. For simplicity's sake we will say that all computers on the internet can be divided into two categories: servers and browsers.
Servers are where most of the information on the internet "lives". These are specialized computers
which store information, share information with other servers, and make this information available to the general public.
Browsers are what people use to access the World Wide Web from any standard computer. Chances
are, the browser you're using to view this page is either Netscape Navigator/Communicator or Microsoft Internet Explorer. These are by far the most popular browsers, but there are also a number of others in common use. When you connect your computer to the internet, you are connecting to a special type of server which is provided and operated by your Internet Service Provider (ISP). The job of this "ISP Server" is to provide the link between your browser and the rest of the internet. A single ISP server handles the internet
connections of many individual browsers - there may be thousands of other people connected to the same server that you are connected to right now. The following picture shows a small "slice" of the internet with several home computers connected to a server: ISP servers receive requests from browsers to view WebPages, check email, etc. Of course each server can't hold all the information from the entire internet, so in order to provide browsers with the pages and files they ask for, ISP servers must connect to other internet servers. This brings us to the next common type of server: the "Host Server". Host servers are where websites "live". Every website in the world is located on a host server somewhere (for example, MediaCollege.Com is hosted on a server in Parsippany, New Jersey USA). The host server's job is to store information and make it available to other servers. The picture below show a slightly larger slice of the internet: To view a web page from your browser, the following sequence happens: 1. You either type an address (URL) into your "Address Bar" or click on a hyperlink. 2. Your browser sends a request to your ISP server asking for the page. 3. Your ISP server looks in a huge database of internet addresses and finds the exact host server which houses the in question, then sends that host server a request for the 4. The host server sends the requested page to your ISP server. Your ISP sends the page to your browser and you see it displayed on your screen website page.
E-Business being at an early stage as evidenced by the research, not more than thirty percent of customer has or will be re-evaluating their database when developing web-enabled applications for the purpose to run their electronic business. The fact that most of the American has started to implement their electronic business strategy in practical life. This 30% figure represents the forward thinking people of America that have recognized the threat and the opportunity of the e-business program and are making certain that their infrastructures, including the customer database are up to the unavoidable task. Indeed, if we look at individual countries within the research that show signs of being more advanced in terms of e-business, we see not higher proportions who re-evaluate their user database within this context. Consequently we predict that as companies move up the e-business curved, and then they will be looking at the primary database technology to confirm that it meets the need to global user. Those who are actively evaluating their primary database programs, and have determined their next action, more than forty percent have made a decision to change their database programs due to incompatibilities with electronic commerce. On the other hand besides electronic commerce people in modern era are changing attitude to achieve lot many new feature included within the new version of database. These kinds many new trends compel are strongly suggesting that companies have found traditional database solutions to be less than satisfactory in the 'e' world. The main reasons for database programs revolutionize are that a advanced level of combination is demanded, applications need to be developed more rapidly, and those applications need to work faster in the field of e-business and to be able to work in the e-business environment. Many organization wishing to offer an E-DBMS, then these factors are the ones to emphasize. When asked if their current database supplier was using technology that was optimized for web applications, almost majority of people has no exact knowledge which is the significant useful database for e-business. So many organization or company keeps faith on their database vendor that is not the ultimate solution to get exact compatible of database with modern e-business world.
Security overview
In the software industry, security has two different perspectives. In the software development community, it describes the security features of a system. Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data. For software consumers, it is protection against attacks rather than specific features of the system. Your house may have the latest alarm system and
windows with bars, but if you leave your doors unlocked, despite the number of security features your system has, it is still insecure. Hence, security is not a number of features, but a system process. The weakest link in the chain determines the security of the system. In this article, we focus on possible attack scenarios in an e-Commerce system and provide preventive strategies, including security features, that you can implement. Security has three main concepts: confidentiality, integrity, and availability. Confidentiality allows only authorized parties to read protected information. For example, if the postman reads your mail, this is a breach of your privacy. Integrity ensures data remains as is from the sender to the receiver. If someone added an extra bill to the envelope, which contained your credit card bill, he has violated the integrity of the mail. Availability ensures you have access and are authorized to resources. If the post office destroys your mail or the postman takes one year to deliver your mail, he has impacted the availability of your mail
Security features
While security features do not guarantee a secure system, they are necessary to build a secure system. Security features have four categories:
Authentication: Verifies who you say you are. It enforces that you are the only one allowed to logon to
your Internet banking account.
Authorization: Allows only you to manipulate your resources in specific ways. This prevents you from
increasing the balance of your account or deleting a bill.
Encryption: Deals with information hiding. It ensures you cannot spy on others during Internet banking
transactions.
Auditing: Keeps a record of operations. Merchants use auditing to prove that you bought a specific
merchandise
The local bank robber obtains detailed building maps and city maps of his target. His online counterpart easily and freely finds information on hacking and cracking. He uses different sets of tools and techniques everyday to target an online bank.
Attacks
This section describes potential security attack methods from an attacker or hacker.
Some of the easiest and most profitable attacks are based on tricking the shopper, also known as social engineering techniques. These attacks involve surveillance of the shopper's behavior, gathering information to use against the shopper. For example, a mother's maiden name is a common challenge question used by numerous sites. If one of these sites is tricked into giving away a password once the challenge question is provided, then not only has this site been compromised, but it is also likely that the shopper used the same logon ID and password on other sites. A common scenario is that the attacker calls the shopper, pretending to be a representative from a site visited, and extracts information. The attacker then calls a customer service representative at the site, posing as the shopper and providing personal information. The attacker then asks for the password to be reset to a specific value. Another common form of social engineering attacks are phishing schemes. Typo pirates play on the names of famous sites to collect authentication and registration information. For example, http://www.ibm.com/shop is registered by the attacker as www.ibn.com/shop. A shopper mistypes and enters the illegitimate site and provides confidential information. Alternatively, the attacker sends emails spoofed to look like they came from legitimate sites. The link inside the email maps to a rogue site that collects the information.
Millions of computers are added to the Internet every month. Most users' knowledge of security vulnerabilities of their systems is vague at best. Additionally, software and hardware vendors, in their quest to ensure that their products are easy to install, will ship products with security features disabled. In most cases, enabling security features requires a non-technical user to read manuals written for the technologist. The confused user does not attempt to enable the security features. This creates a treasure trove for attackers. A popular technique for gaining entry into the shopper's system is to use a tool, such as SATAN, to perform port scans on a computer that detect entry points into the machine. Based on the opened ports found, the attacker can use various techniques to gain entry into the user's system. Upon entry, they scan your file system for personal information, such as passwords. While software and hardware security solutions available protect the public's systems, they are not silver bullets. A user that purchases firewall software to protect his computer may find there are conflicts with other software on his system. To resolve the conflict, the user disables enough capabilities to render the firewall software useless.
In this scheme, the attacker monitors the data between the shopper's computer and the server. He collects data about the shopper or steals personal information, such as credit card numbers. There are points in the network where this attack is more practical than others. If the attacker sits in the middle of the network, then within the scope of the Internet, this attack becomes impractical. A request from the client to the server computer is broken up into small pieces known as packets as it leaves the client's computer and is reconstructed at the server. The packets of a request is sent through different
routes. The attacker cannot access all the packets of a request and cannot decipher what message was sent. Take the example of a shopper in Toronto purchasing goods from a store in Los Angeles. Some packets for a request are routed through New York, where others are routed through Chicago. A more practical location for this attack is near the shopper's computer or the server. Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled. This allows an attacker to easily scan unencrypted traffic from the user's computer.
Guessing passwords
Another common attack is to guess a user's password. This style of attack is manual or automated. Manual attacks are laborious, and only successful if the attacker knows something about the shopper. For example, if the shopper uses their child's name as the password. Automated attacks have a higher likelihood of success, because the probability of guessing a user ID/password becomes more significant as the number of tries increases. Tools exist that use all the words in the dictionary to test user ID/password combinations, or that attack popular user ID/password combinations. The attacker can automate to go against multiple sites at one time.
The denial of service attack is one of the best examples of impacting site availability. It involves getting the server to perform a large number of mundane tasks, exceeding the capacity of the server to cope with any other task. For example, if everyone in a large meeting asks you your name all at once, and every time you answer, they ask you again. You have experienced a personal denial of service attack. To ask a computer its name, you use ping. You can use ping to build an effective DoS attack. The smart hacker gets the server to use more computational resources in processing the request than the adversary does in generating the request. Distributed Does is a type of attack used on popular sites, such as Yahoo!. In this type of attack, the hacker infects computers on the Internet via a virus or other means. The infected computer becomes slaves to the hacker. The hacker controls them at a predetermined time to bombard the target server with useless, but intensive resource consuming requests. This attack not only causes the target site to experience problems, but also the entire Internet as the number of packets is routed via many different paths to the target.
The attacker analyzes the site to find what types of software are used on the site. He then proceeds to find what patches were issued for the software. Additionally, he searches on how to exploit a system without the patch. He proceeds to try each of the exploits. The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system. This is a simple, but effective attack. With millions of servers online, what is the probability that a system administrator forgot to apply a patch?
Root exploits refer to techniques that gain super user access to the server. This is the most coveted type of exploit because the possibilities are limitless. When you attack a shopper or his computer, you can only affect one individual. With a root exploit, you gain control of the merchants and all the shoppers' information on the site. There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution. The technique involves tricking the server into execute code written by the attacker. The other technique uses knowledge of scripts that are executed by the server. This is easily and freely found in the programming guides for the server. The attacker tries to construct scripts in the URL of his browser to retrieve information from his server. This technique is frequently used when the attacker is trying to retrieve data from the server's database
Defenses
Despite the existence of hackers and crackers, e-Commerce remains a safe and secure activity. The resources available to large companies involved in e-Commerce are enormous. These companies will pursue every legal route to protect their customers. At the end of the day, your system is only as secure as the people who use it. Education is the best way to ensure that your customers take appropriate precautions Install personal firewalls for the client machines. Store confidential information in encrypted form. Encrypt the stream using the Secure Socket Layer (SSL) protocol to protect information flowing between the client and the e-Commerce Web site. Use appropriate password policies, firewalls, and routine external security audits. Use threat model analysis, strict development policies, and external security audits to protect ISV software running the Web site.
Education
Your system is only as secure as the people who use it. If a shopper chooses a weak password, or does not keep their password confidential, then an attacker can pose as that user. This is significant if the compromised password belongs to an administrator of the system. In this case, there is likely physical security involved because the administrator client may not be exposed outside the firewall. Users need to use good judgment when giving out information, and be educated about possible phishing schemes and other social engineering attacks.
Personal firewalls
When connecting your computer to a network, it becomes vulnerable to attack. A personal firewall helps protect your computer by limiting the types of traffic initiated by and directed to your computer. The intruder can also scan the hard drive to detect any stored passwords.
Server Firewalls
A firewall is like the moat surrounding a castle. It ensures that requests can only enter the system from specified ports, and in some cases, ensures that all accesses are only from certain physical machines. A common technique is to setup a demilitarized zone (DMZ) using two firewalls. The outer firewall has ports open that allow ingoing and outgoing HTTP requests. This allows the client browser to communicate with the server. A second firewall sits behind the e-Commerce servers. This firewall is heavily fortified, and only requests from trusted servers on specific ports are allowed through. Both firewalls use intrusion detection software to detect any unauthorized access attempts. Another common technique used in conjunction with a DMZ is a honey pot server. A honey pot is a resource (for example, a fake payment server) placed in the DMZ to fool the hacker into thinking he has penetrated the inner wall. These servers are closely monitored, and any access by an attacker is detected
Password Policies
Ensure that password policies are enforced for shoppers and internal users. A sample password policy, defined as part of the Federal Information Processing Standard (FIPS), is shown in the table below. Policy
Account lockout threshold Consecutive unsuccessful login delay Matching user ID and password Maximum occurrence of consecutive characters Maximum instances of any character Maximum lifetime of passwords Minimum number of alphabetic characters Minimum number of numeric characters Minimum length of password Reuse user's previous password
Value
6 attempts 10 seconds N (no, they cannot match) 3 characters 4 instances 180 days 1 alphabetic character 1 numeric character 6 characters N (no, cannot be reused)
You may choose to have different policies for shoppers versus your internal users. For example, you may choose to lockout an administrator after 3 failed login attempts instead of 6. These password policies protect against attacks that attempt to guess the user's password. They ensure that passwords are sufficiently strong enough so that they cannot be easily guessed. The account lockout capability ensures that an automated scheme cannot make more than a few guesses before the account is locked.
this indicates the account has been co-opted and should be locked out. Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action. In addition to security logs, use business auditing to monitor activities such as payment processing. You can monitor and review these logs to detect patterns of inappropriate interaction at the business process level. The infrastructure for business auditing and security logging is complex, and most likely will come as part of any middleware platform selected to host your site. Web Sphere Commerce, for example, has extensive capabilities in this area.
Recently, there has been an effort to consolidate these best practices as the Common Criteria for IT Security Evaluation (CC). CC seems to be gaining attraction. It is directly applicable to the development of specific e-Commerce sites and to the development of third party software used as an infrastructure in eCommerce sites. Security best practices remain largely an art rather than a science, but there are some good guidelines and standards that all developers of e-Commerce software should follow.
Using cookies
One of the issues faced by Web site designers is maintaining a secure session with a client over subsequent requests. Because HTTP is stateless, unless some kind of session token is passed back and forth on every request, the server has no way to link together requests made by the same person. Cookies are a popular mechanism for this. An identifier for the user or session is stored in a cookie and read on every request. You can use cookies to store user preference information, such as language and currency. This simplifies Web page development because you do not have to be concerned about passing this information back to the server. The primary use of cookies is to store authentication and session information, your information, and your preferences. A secondary and controversial usage of cookies is to track the activities of users.
Permanent cookies: These are for a time period, specified by the site, on the shopper's computer. They
recall your previous session information.
Server-only cookies: These cookies are usually harmless, and are only used by the server that issued
them.
Third-party cookies: These are usually used for tracking purposes by a site other than the one you are
visiting. Your browser or a P3P policy can filter these cookies. If you do not want to store cookies, here are other alternatives: Send user ID/password on every request: This was popular 5-10 years ago, but now recognized as an insecure technique. The user ID/password flowing under non-SSL is susceptible to attacks. This alternative is not practical for a high volume site. Pages that run under SSL would slow down site performance. SSL client side authentication: This is the most secure, but it is cumbersome for shoppers to install on their browsers. You have to pay for a company to verify who you are and to issue a certificate. The popularity of this technique for client-side authentication has decreased in recent years. It remains very popular on server sites. URL rewriting: This is a popular alternative to cookies. Each HTTP link on the page is specially encoded, but it is expensive for the site to implement. It interferes with the performance of the site because the pages cannot be cached and reused for different users. This alternative is susceptible to attack if it is not used under SSL. Cookies marked as secure (storing encrypted data and passing to the user only under SSL) remain the most popular method of providing a secure online experience.