Chapter 30 - Electronic Commerce and Business
- Introduction
- E-Commerce is Big Business
- Security Made E-commerce Possible
- Secure Sockets
- Data May Be Changed
- Public Key Encryption Provides Authenticity
Public key encryption is surprisingly general -- in addition to guaranteeing that messages remain confidential, it can be used to verify authenticity.
- Digital Signatures
A digital signature consists of a special form of encrypted message; the encryption technology gaurantees that a digital signature cannor be forged.
- Certificates Contain Public Keys
- What is Digital Money?
- Encryption Software Needs a Key
- Digital Cash Is Not Widely Available
- Business and E-commerce
- A Business Must Protect Its Networks
- Firewalls Protect Networks
- A Firewall Filters Packets
- Firewalls Guard Against Trojan Horses
A firewall is placed between a company and the Internet to restrict access to the company from the outside. To prevent a Trojan horse attack, the firewall also restricts access to the Internet from within the company.
- DEFINITIONS OF VIRUSES AND OTHER COMPUTER "VERMIN"
Terms
- e-commerce
- e-business
- shopping cart
- sockets
- public key encryption
- digital signature
- digital money
- firewall
- Trojan horse
- virus
- worm
- timebomb / logic bomb
- hacker / cracker