To Previous Chapter To Table of Contents To Bottom of Page To Next Chapter

Chapter 30 - Electronic Commerce and Business

  1. Introduction
  2. E-Commerce is Big Business
  3. Security Made E-commerce Possible
  4. Secure Sockets
  5. Data May Be Changed
  6. Public Key Encryption Provides Authenticity
    Public key encryption is surprisingly general -- in addition to guaranteeing that messages remain confidential, it can be used to verify authenticity.
  7. Digital Signatures
    A digital signature consists of a special form of encrypted message; the encryption technology gaurantees that a digital signature cannor be forged.
  8. Certificates Contain Public Keys
  9. What is Digital Money?
  10. Encryption Software Needs a Key
  11. Digital Cash Is Not Widely Available
  12. Business and E-commerce
  13. A Business Must Protect Its Networks
  14. Firewalls Protect Networks
  15. A Firewall Filters Packets
  16. Firewalls Guard Against Trojan Horses
    A firewall is placed between a company and the Internet to restrict access to the company from the outside. To prevent a Trojan horse attack, the firewall also restricts access to the Internet from within the company.
  17. DEFINITIONS OF VIRUSES AND OTHER COMPUTER "VERMIN"

Terms

To Previous Chapter To Table of Contents To top of page To Next Chapter