7 Cs of WEB design - Customer Interface

Similar documents
7 Cs of WEB design - Customer Interface

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-COMMERCE and SECURITY - 1DL018

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

11/20/2015. ACS 3907 E-Commerce. Security Problems. What could go wrong? Instructor: Kerry Augustine December 1 st Consumers

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

BE SAFE ONLINE: Lesson Plan

Network Security and the Small Business

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

E-BUSINESS THREATS AND SOLUTIONS

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

Don t Fall Victim to Cybercrime:

CHAPTER 10: COMPUTER SECURITY AND RISKS

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Securing Information Systems

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Spyware: Securing gateway and endpoint against data theft

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Corporate Account Takeover & Information Security Awareness. Customer Training

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

E-Business, E-Commerce

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Current Threat Scenario and Recent Attack Trends

Information Security Awareness

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

How To Monitor The Internet In Idaho

Legal & Ethical Considerations of Offensive Cyber-Operations?

Cracking and Computer Security

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Security A to Z the most important terms

Promoting Network Security (A Service Provider Perspective)

Module 5: Analytical Writing

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Midterm Chapter 1,2,3,5

Corporate Account Takeover & Information Security Awareness

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS

Emerging Trends in Malware - Antivirus and Beyond

Top Ten Cyber Threats

Information Security Summit 2005

Different Types of Adware and Services

Understanding Spyware

Computer infiltration

COB 302 Management Information System (Lesson 8)

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

white paper Malware Security and the Bottom Line

Introduction to Computer Security Table of Contents

WHITE PAPER. Understanding How File Size Affects Malware Detection

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Protection for Mac and Linux computers: genuine need or nice to have?

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Tips to help you stay safe online

Cyber Security Best Practices. 1. Introduction What is cyber security and why is it important?

IT SECURITY. 37th NSAA ANNUAL CONFERENCE. David Coles, CPA, CISA, CFF Arkansas Legislative Audit. Today s Objectives

Computer Security Maintenance Information and Self-Check Activities

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Using big data analytics to identify malicious content: a case study on spam s

Types of Cyber Crimes and Security Threats

Protecting your Identity, Computer and Property

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

Before. The House Committee on Small Business Subcommittee on Regulatory Reform and Oversight. March 16, 2006

ACCEPTABLE USE AND TAKEDOWN POLICY

Information Security. Louis Morgan, CISSP Information Security Officer

Computer Security Threats

The Underground Economy of the Pay-Per-Install (PPI) Business

Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance

How to stay safe online

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Cybersecurity for the C-Level

Network Security: Introduction

Chapter 9: Network and Internet Security

Protecting Your Computer and Your Identity. Security Awareness

Chapter 11 Computers and Society, Security, Privacy, and Ethics

A Systems Engineering Approach to Developing Cyber Security Professionals

Boston University Security Awareness. What you need to know to keep information safe and secure

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

PATRIOT BANK CUSTOMERS. Corporate Account Takeover & Information Security Awareness

Cyber Security Glossary

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Online Cash Manager Security Guide

Electronic Security is defined d as:

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

CYBER SECURITY PRIMER 21 January 2011

Ethical Hacking Course Layout

Computer Viruses: How to Avoid Infection

Transcription:

7 Cs of WEB design - Customer Interface Exhibit 6-1: The 7Cs of the Customer Interface Context Site s layout and design Content Text, pictures, sound and video that web pages contain Commerce Site s capabilities to enable commercial transactions Community The ways sites enable user-touser communication Connection Degree site is linked to other sites Customization Site s ability to self-tailor to different users or to allow users to personalize the site Communication The ways sites enable site-touser communication or two-way communication 1

Section Breakdown Linking Structure Navigation Tools Site Performance Aesthetics Color Scheme Visual Themes Context - Design Look and Feel Context Archetypes form and function Aesthetically Dominant: Functionally Dominant: Integrated: Balance of form and function.

Context Aesthetic Dominate KMGI.COM A LEADER IN INTERESTING WEB DESIGNS Exhibit 6-5: Aesthetic Example KMGI.COM

Context FUNCTIONAL DOMINATEECTION BREAKDOWN ETC.

LINK

CONNECTION DEGREE LINKED TO OTHER SITESBREAKDOWN ETC.

CONTENT: MULTIMEDIA, TEXT, PICTURES, ETC.number of interest areas but does not provide means for users to interact with one another

Bazaar: users wander through a vast number of interest areas Does not provide for users to interact with one another Exhibit 6-15: Bazaar Example GAMES.YAHOO.COM 1

Club: Focuses on one area of interest, promotes considerable interaction among members gillettecancerconnect.ogr Exhibit 6-17: Club Example Gillette Women s Cancer Connection 1

Exhibit 6-19: CAFÉ EXAMPLE-- Bolt.com Café: common area of interest provides considerable interaction among members bolt.com 1

Shrine: Exhibits extreme enthusiasm a common object minimal interaction between members

CUSTOMIZATION AMAZON.COM MADE FOR YOU 2

s10 That is Great but now Internet is the new bank 15

world relies on physical security - Ecommerce world - reliance on electronic means to protect data, communications & transactions. THREE TYPES OF SECURITY DIMENSIONS 1. Infrastructure security (hard/software 2. Transactions security (web/moving) 3. Data/information security (message itself) 16

17

The Tensions Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes Security vs. Desire of individuals to act anonymously New world disruptive technologies Fighting Status Quo 18

Malicious Code Viruses: Ability to replicate and spread to other files; most also deliver a payload of some sort (destructive or benign); include macro viruses, fileinfecting viruses, and script viruses Worms: Designed to spread from computer to computer Trojan horse: Appears to be benign, does something other than expected Bots: Covertly installed on computer; responds to external commands sent by attacker

TROJAN HORSE

EVERYONE IS IN THE ACT STUXNET VIRUS AUGUST, 2010 45,000 computers infected INDUSTRIAL SIEMANS CONTROL COMPUTER INFRASTRUCTURE POWER, PIPELINES

botnets IS THE THREAT TO NATION S SECURITY Denial of service (DoS) attack flood Web site with useless traffic overwhelm network Distributed denial service (DDoS) attack Numerous computers to attack target network WORLD WIDE launch points

23

BOTNETS - THE NEW SOLDIER ESTONIA 2007 GEORGIA 2008

Hacking and Cybervandalism Hacker: Individual intends to gain unauthorized access to computer systems Cracker: Hacker with criminal intent (two terms often used interchangeably) Cybervandalism: Intentionally disrupting, defacing or destroying a Web site White hats Black hats Grey hats

Unwanted Programs Installed without the user s informed consent Browser parasites: Can monitor and change settings of a user s browser Adware: Calls for unwanted pop-up ads Spyware: Can be used to obtain information, such as a user s keystrokes, e-mail, IMs, etc.

ZEUS INTERNATIONAL OPERATION A WEAPON OF CHOICE CYBER BANK ROBBERS $70 MILLION BUST OCT 2010 CAN BE BOUGHT ON WEB LOSSES $200m SMALL/ MEDIUM BUSINESSES LIMITED PROTECTIONS RUSSIAN AUTHOR A-Z BUSINESS LICENSING AGREEMENTS -TECH SUPPORT TARGETS SPECIFIC BANKS CAPTURES YOUR INFO/KEYSTROKES- SENDS TO SERVER - CAN DISPLAY THEIR PAGE TO ASK FOR MORE INFORMATION

Any deceptive, online attempt by a third party to obtain confidential information for financial gain Most popular type: e-mail scam letter Nigerian scam letters (known as 419 scams)

Insider jobs: Single largest financial threat Poorly designed server - client software: Sniffing: eavesdropping program that monitors information traveling over a network;

Spoofing (Pharming) Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else Spam (Junk) Web sites Use domain names similar to legitimate one, redirect traffic to spammer-redirection domains

The Internet is the new bank THE END

s10 The Internet is the new bank THE END 32