7 Cs of WEB design - Customer Interface



Similar documents
E-COMMERCE and SECURITY - 1DL018

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Network Security and the Small Business

CHAPTER 10: COMPUTER SECURITY AND RISKS

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

BE SAFE ONLINE: Lesson Plan

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Securing Information Systems

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Midterm Chapter 1,2,3,5

Legal & Ethical Considerations of Offensive Cyber-Operations?

E-Business, E-Commerce

Don t Fall Victim to Cybercrime:

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Current Threat Scenario and Recent Attack Trends

Using big data analytics to identify malicious content: a case study on spam s

Spyware: Securing gateway and endpoint against data theft

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Security A to Z the most important terms

Corporate Account Takeover & Information Security Awareness. Customer Training

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Information Security Awareness

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Introduction to Computer Security Table of Contents

Chapter 11 Computers and Society, Security, Privacy, and Ethics

How To Monitor The Internet In Idaho

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Cracking and Computer Security

Promoting Network Security (A Service Provider Perspective)

Network Security: Introduction

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

COB 302 Management Information System (Lesson 8)

Computer Security Threats

Different Types of Adware and Services

Module 5: Analytical Writing

E-BUSINESS THREATS AND SOLUTIONS

Ethical Hacking Course Layout

Computer infiltration

1 Introduction. Agenda Item: Work Item:

Countermeasures against Bots

TLP WHITE. Denial of service attacks: what you need to know

Threat Events: Software Attacks (cont.)

Chapter 4: E-commerce Security and payment systems

Tips to help you stay safe online

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

ACCEPTABLE USE AND TAKEDOWN POLICY

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

California State University, Chico. Information Security Incident Management Plan

The Underground Economy of the Pay-Per-Install (PPI) Business

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

Protecting your Identity, Computer and Property

Overview of computer and communications security

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

WHITE PAPER. Understanding How File Size Affects Malware Detection

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cybersecurity for the C-Level

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Computer Security Maintenance Information and Self-Check Activities

SECURING INFORMATION SYSTEMS

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Transcription:

7 Cs of WEB design - Customer Interface Exhibit 6-1: The 7Cs of the Customer Interface Context Site s layout and design Content Text, pictures, sound and video that web pages contain Commerce Site s capabilities to enable commercial transactions Community The ways sites enable user-touser communication Connection Degree site is linked to other sites Customization Site s ability to self-tailor to different users or to allow users to personalize the site Communication The ways sites enable site-touser communication or two-way communication 1

Section Breakdown Linking Structure Navigation Tools Site Performance Aesthetics Color Scheme Visual Themes Context - Design Look and Feel Context Archetypes form and function Aesthetically Dominant: Functionally Dominant: Integrated: Balance of form and function.

Context Aesthetic Dominate KMGI.COM A LEADER IN INTERESTING WEB DESIGNS Exhibit 6-5: Aesthetic Example KMGI.COM

Context FUNCTIONAL DOMINATEECTION BREAKDOWN ETC.

LINK

CONNECTION DEGREE LINKED TO OTHER SITESBREAKDOWN ETC.

CONTENT: MULTIMEDIA, TEXT, PICTURES, ETC.number of interest areas but does not provide means for users to interact with one another

Bazaar: users wander through a vast number of interest areas Does not provide for users to interact with one another Exhibit 6-15: Bazaar Example GAMES.YAHOO.COM 1

Club: Focuses on one area of interest, promotes considerable interaction among members gillettecancerconnect.ogr Exhibit 6-17: Club Example Gillette Women s Cancer Connection 1

Exhibit 6-19: CAFÉ EXAMPLE-- Bolt.com Café: common area of interest provides considerable interaction among members bolt.com 1

Shrine: Exhibits extreme enthusiasm a common object minimal interaction between members

CUSTOMIZATION AMAZON.COM MADE FOR YOU 2

The Internet is the new bank

The Tensions Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes Security vs. Desire of individuals to act anonymously New world disruptive technologies Fighting Status Quo 16

W3 ( Tim Burners-Lee)FOR FAQs ON INTERNET SECURITY http://www.w3.org/security/faq/www-securityfaq.html 17

world relies on physical security - Ecommerce world - reliance on electronic means to protect data, communications & transactions. THREE TYPES OF SECURITY DIMENSIONS 1. Infrastructure security (hard/software 2. Transactions security (web/moving) 3. Data/information security (message itself) 18

Malicious Code Viruses: Ability to replicate and spread to other files; most also deliver a payload of some sort (destructive or benign); include macro viruses, fileinfecting viruses, and script viruses Worms: Designed to spread from computer to computer Trojan horse: Appears to be benign, does something other than expected Bots: Covertly installed on computer; responds to external commands sent by attacker

TROJAN HORSE

21

22

BOTNETS - THE NEW SOLDIER ESTONIA 2007 GEORGIA 2008

EVERYONE IS IN THE ACT STUXNET VIRUS AUGUST, 2010 45,000 computers infected INDUSTRIAL SIEMANS CONTROL COMPUTER INFRASTRUCTURE POWER, PIPELINES 60% OF COMPUTERS IN IRAN

What are we faced with? 25

26

botnets IS THE THREAT TO NATION S SECURITY Denial of service (DoS) attack flood Web site with useless traffic overwhelm network Distributed denial service (DDoS) attack Numerous computers to attack target network WORLD WIDE launch points

Hacking and Cybervandalism Hacker: Individual intends to gain unauthorized access to computer systems Cracker: Hacker with criminal intent (two terms often used interchangeably) Cybervandalism: Intentionally disrupting, defacing or destroying a Web site White hats Black hats Grey hats

Unwanted Programs Installed without the user s informed consent Browser parasites: Can monitor and change settings of a user s browser Adware: Calls for unwanted pop-up ads Spyware: Can be used to obtain information, such as a user s keystrokes, e-mail, IMs, etc.

ZEUS INTERNATIONAL OPERATION A WEAPON OF CHOICE CYBER BANK ROBBERS $70 MILLION BUST OCT 2010 CAN BE BOUGHT ON WEB LOSSES $200m SMALL/ MEDIUM BUSINESSES LIMITED PROTECTIONS RUSSIAN AUTHOR A-Z BUSINESS LICENSING AGREEMENTS -TECH SUPPORT TARGETS SPECIFIC BANKS CAPTURES YOUR INFO/KEYSTROKES- SENDS TO SERVER - CAN DISPLAY THEIR PAGE TO ASK FOR MORE INFORMATION

Any deceptive, online attempt by a third party to obtain confidential information for financial gain Most popular type: e-mail scam letter Nigerian scam letters (known as 419 scams)

Insider jobs: Single largest financial threat Poorly designed server - client software: Sniffing: eavesdropping program that monitors information traveling over a network;

Spoofing (Pharming) Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else Spam (Junk) Web sites Use domain names similar to legitimate one, redirect traffic to spammer-redirection domains