IT430 Short Notes
IT430 Short Notes
E-Commerce Definition:
Electronic commerce (e-commerce) describes the process of buying, selling, or exchanging products,
services, and information via computer networks, including the internet.
E-Commerce Classification:
6. Non-Business EC: Academic institutions, not-for-profit organizations, and government agencies using
EC.
Definition of a Network:
A network ranges from a simple collection of computers at one location connected through a
connectivity media to the internet, which is a global network of networks.
Types of Networks:
- Local Area Network (LAN): Confined to a specific area, typically with many clients and a few servers.
1. File Sharing
3. Program Sharing
Standard rules that computers on a network use to communicate and exchange data.
OSI Model:
The Open System Interconnection (OSI) model proposes a 7-layer architecture for network
communications:
1. Application Layer: Handles requests related to file transfer and database queries.
2. Presentation Layer: Translates data and defines file formats and data types.
4. Transport Layer: Converts data into data packets and controls data flow.
---
Network Classes:
Subnet Mask:
An IP address is meaningful only when accompanied by a subnet mask, indicating the network and host
portions.
IP Version:
IPv4 is likely to be replaced by IPv6, providing 128-bit addresses in hexadecimal format, offering a vast
number of addresses.
DNS translates user-friendly domain names into corresponding IP addresses. A fully qualified domain
name is processed from right to left for translation.
---
Topology of a LAN:
- Ring Topology: Each device is connected to two other devices, forming a ring.
Networking Devices:
- Hubs: Central connection point for a LAN, relays data signals to all computers.
- Repeaters: Regenerate signals and amplify the entire electric signal received.
- Bridges: Combine hardware and software to conserve network bandwidth by segmenting the network.
- Switches: Similar to bridges but create virtual LANs (VLANs) for better bandwidth management.
---
HTML is a language of tags used to define web documents. Tags are enclosed in angular brackets, and
most have corresponding closing tags.
Basic HTML Document Structure:
```html
<HTML>
<HEAD>
</HEAD>
<BODY>
</BODY>
</HTML>
```
---
Hypertext Links:
Used to connect HTML documents. Text or images can be links, and the `href` attribute specifies the
URL.
Changing Colors:
Attributes `bgcolor`, `text`, and `link` in the body tag change background color, text color, and link color,
respectively.
Example:
```html
```
---
Client-Side Processing:
Client-side processing involves operations that occur on the user's machine, typically executed through a
web browser using HTML, CSS, and JavaScript.
JavaScript:
A scripting language that enables interactive web pages. JavaScript code is executed on the client-side
and can manipulate HTML content, validate forms, and create dynamic effects.
Advantages:
Disadvantages:
---
### Lecture 08: Server-Side Processing
Server-Side Processing:
Server-side processing involves operations that occur on the server, handling requests from clients,
processing data, and sending responses back to clients. Common server-side languages include PHP,
ASP.NET, and Java.
PHP:
A popular server-side scripting language designed for web development. It can be embedded into HTML
and used to create dynamic web pages, interact with databases, and manage sessions.
Advantages:
Disadvantages:
---
Cookies:
Small text files stored on the client's machine by the web browser. Cookies are used to maintain state
and track user information across sessions.
Types of Cookies:
- Session Cookies: Temporary cookies that are deleted when the browser is closed.
- Persistent Cookies: Stored on the client's machine until they expire or are deleted.
Uses:
Security Concerns:
---
The internet faces numerous security threats, including unauthorized access, data breaches, and cyber-
attacks. Protecting sensitive information and maintaining user privacy is critical.
- Denial of Service (DoS) Attacks: Attempts to make a network or service unavailable by overwhelming it
with traffic.
Security Measures:
- Firewalls: Systems that monitor and control incoming and outgoing network traffic.
- Authentication: Verifying the identity of users accessing the system.
---
Firewalls:
Security systems that monitor and control network traffic based on predetermined security rules.
Firewalls act as a barrier between a trusted internal network and an untrusted external network.
Types of Firewalls:
- Packet-Filtering Firewalls: Examine packets and block those that do not meet security criteria.
- Stateful Inspection Firewalls: Track the state of active connections and make decisions based on the
state and context of the traffic.
Benefits:
---
Proxy Server:
An intermediary server that separates end users from the websites they browse. Proxy servers provide
various functions, including security, anonymity, and content filtering.
Functions:
- Content Filtering: Blocking access to certain websites or content based on predefined rules.
- Caching: Storing copies of frequently accessed web content to reduce bandwidth usage and improve
load times.
- Forward Proxy: Handles requests from clients seeking resources on the internet.
- Reverse Proxy: Handles requests from the internet to servers within a private network.
Advantages:
---
A technology that creates a secure and encrypted connection over a less secure network, such as the
internet. VPNs are commonly used to provide remote access to corporate networks.
Types of VPNs:
- Remote Access VPN: Allows individual users to connect to a private network remotely.
- Site-to-Site VPN: Connects entire networks to each other over the internet.
Benefits:
Components:
- VPN Client: Software installed on the user's device to establish the VPN connection.
- VPN Server: Hardware or software that manages VPN connections and enforces security policies.
- Tunneling Protocols: Methods used to encapsulate and encrypt data, such as PPTP, L2TP, and
OpenVPN.
---
Cryptography:
The practice of securing information by transforming it into an unreadable format, only decipherable by
those with the correct decryption key. Cryptography ensures data confidentiality, integrity, and
authenticity.
Types of Cryptography:
- Symmetric Encryption: Uses the same key for both encryption and decryption. Example: AES.
- Asymmetric Encryption: Uses a pair of keys, one for encryption and one for decryption. Example: RSA.
Key Concepts:
- Encryption: Converting plaintext into ciphertext using a cryptographic algorithm and key.
- Decryption: Converting ciphertext back into plaintext using the appropriate key.
- Hashing: Generating a fixed-size hash value from input data, used for data integrity verification.
Example: SHA-256.
Applications:
---
Technologies and protocols that facilitate online financial transactions. These systems enable secure and
efficient payment processing over the internet.
- Credit/Debit Card Payments: Using cards for online purchases, secured by SSL/TLS encryption.
- E-Wallets: Digital wallets that store payment information, such as PayPal and Apple Pay.
- Cryptocurrencies: Digital currencies like Bitcoin, using blockchain technology for secure transactions.
Security Measures:
- Secure Socket Layer (SSL): Encrypts data transmitted between the user's browser and the web server.
- Secure Electronic Transaction (SET): Protocol designed to ensure secure payment card transactions.
- Tokenization: Replacing sensitive payment information with a unique identifier (token) to enhance
security.
Challenges:
- Regulatory compliance.
- Ensuring user trust and adoption.
---
E-Business:
The use of electronic means and platforms to conduct a company's business. E-business encompasses a
wide range of activities, including buying and selling products, providing customer service, and
collaborating with business partners.
Advantages:
Disadvantages:
Key Components:
- Supply Chain Management (SCM): Managing the flow of goods, information, and finances across the
entire supply chain.
Key Components:
- EDI Standards: Define the structure and format of electronic documents, such as ANSI X12 and
EDIFACT.
- EDI Translation Software: Converts documents into the EDI format and vice versa.
- Communication Network: The medium used to transmit EDI messages, such as VAN (Value Added
Network) or the internet.
Benefits:
- Purchase orders
- Invoices
- Shipping notices
- Inventory reports
---
### Lecture 18: E-Business Models
E-Business Models:
Frameworks for conducting business over the internet. E-business models define how a company
creates, delivers, and captures value through online activities.
5. Subscription-Based: Users pay a recurring fee for access to products or services. Example: Netflix.
6. Freemium: Basic services are provided for free, with premium features available for a fee. Example:
Spotify.
Revenue Models:
- Affiliate Marketing: Earning commissions by promoting other companies' products. Example: Amazon
Associates.
Challenges:
---
### Lecture 19: Internet Marketing
Internet Marketing:
The practice of promoting products or services using the internet. Internet marketing encompasses a
wide range of strategies and tactics to reach and engage customers online.
Key Components:
- Search Engine Optimization (SEO): Improving website visibility in search engine results.
- Content Marketing: Creating and distributing valuable content to attract and engage target audiences.
- Social Media Marketing: Using social media platforms to promote products and engage with
customers.
- Email Marketing: Sending targeted emails to nurture leads and retain customers.
- Pay-Per-Click (PPC) Advertising: Paying for ad placements in search engine results or on websites.
Benefits:
Challenges:
---
The process of analyzing large datasets to discover patterns, trends, and relationships that can inform
business decisions. Data mining involves various techniques to extract meaningful insights from data.
Key Techniques:
Applications:
Challenges:
---
E-Business Strategy:
A plan for leveraging digital technologies to achieve business goals. An effective e-business strategy
aligns with the overall business objectives and considers market trends, customer needs, and
competitive dynamics.
Key Elements:
- Vision and Objectives: Clear goals for what the e-business aims to achieve.
- Market Analysis: Understanding the target market, customer preferences, and competitive landscape.
- Value Proposition: Defining the unique benefits and value the e-business offers to customers.
- Technology Infrastructure: Selecting and implementing the right technologies to support e-business
activities.
- Performance Metrics: Measuring and analyzing key performance indicators (KPIs) to track progress and
make data-driven decisions.
- Supply Chain: Managing the flow of goods, information, and finances from suppliers to customers.
- Value Chain: Analyzing activities that create value for customers and identifying opportunities for
optimization.
Conducting business online involves various legal considerations, including compliance with laws and
regulations, protecting intellectual property, and addressing privacy and security concerns.
- Intellectual Property: Protecting trademarks, copyrights, and patents in the digital space.
- Privacy and Data Protection: Complying with regulations like GDPR to safeguard user data.
- Cyber Crimes: Addressing issues such as hacking, identity theft, and online fraud.
Challenges:
ISPs Liability:
Internet Service Providers (ISPs) may face liability issues related to user content, copyright infringement,
and data protection. Legal frameworks typically define the extent of ISPs' responsibilities and
protections.
Disputes may arise over the use of domain names that infringe on registered trademarks. Resolving
these conflicts often involves legal action or arbitration through bodies like the World Intellectual
Property Organization (WIPO).
These notes cover the essential topics and key points from Lectures 01 to 22. Ensure you understand
each concept thoroughly and review any additional materials provided in the course for a
comprehensive understanding in preparation for your mid-term exams.