Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 57 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
57
Dung lượng
0,9 MB
Nội dung
Chapter 14: Accounting on the Internet Introduction The Internet and the World Wide Web XBRL - Financial Reporting on the Internet Electronic Business Privacy and Security on the Internet Chapter 14-1 The Internet and World Wide Web Internet Addresses and Software Intranets and Extranets The World Wide Web, HTML, and IDEA Groupware, Electronic Conferencing, and Blogs Chapter 14-2 Internet Addresses and Software Domain Address Also called a Uniform Resource Locator (URL) www.Name.com.uk Internet Protocol (IP) Numeric address of domain address 207.142.131.248 Transmission Control Protocol (TCP) Chapter 14-3 Intranets and Extranets Intranets Based on same software as the Internet Internal to the organization Outsiders are unable to access information Extranets Enable external users to access intranets Utilize passwords or private data communications channels Chapter 14-4 The World Wide Web, HTML, and IDEA World Wide Web Multimedia portion of the Internet Hypertext Markup Language (HTML) Editing language Used in design of web pages Hypertext Transfer Protocol (HTTP) Communications protocol used to transfer web pages Chapter 14-5 HTML Code Chapter 14-6 Display of HTML Code Chapter 14-7 Groupware, Electronic Conferencing, and Blogs Groupware Allow users to complete numerous tasks electronically Send and receive e-mail, collaborate on work tasks, schedule appointments, share files Software include Exchange, Groupwise, Lotus Notes, and Outlook Chapter 14-8 Groupware, Electronic Conferencing, and Blogs Instant Messaging Software Remote users communicate in real time Electronic Conferencing Knowledge Management Programs utilized to distribute expertise within the organization Blogs Collaboration tool Create, share, and leverage knowledge Chapter 14-9 Study Break #1 Which of the following is most likely to contain only numbers? A.Domain address B.URL address C.IP address D.Postal address Chapter 14-10 Intrusion Detection Systems Passive IDSs Create logs of potential intrusions Alert network administrators Reactive IDSs Detect potential intrusions dynamically Log off potentially malicious users Program firewalls to block messages from suspected source Chapter 14-43 Value-Added Networks Definition Private, point-to-point communication channels Usually created for security purposes Methods of Creation Blank slate, create from scratch Lease secure, dedicated transmission lines Create a Virtual Private Network (VPN) Chapter 14-44 Value Private Networks Definition Similar to a VAN Transmit messages over existing Internet connections Creating Secure Data Transmission Use “tunneling” security protocols Encrypt transmitted data Authenticate remote computer Chapter 14-45 VAN-based EDI System Chapter 14-46 Proxy Server Definition Network server that controls web access Advantages Funnel internet requests through a single server Examine and test requests for authenticity Limit employee access to approved websites Limit stored information Store frequently-accessed web pages (Cache) Chapter 14-47 Data Encryption Definition Transform plaintext messages into unintelligible cyphertext messages Encryption key Mathematical function dependent upon a large prime number Data Encryption Standard (DES) Chapter 14-48 Simple Data Encryption Chapter 14-49 Data Encryption Secret Key Cryptography Users must keep the key secret and not share the key with other parties Public Key Encryption Each party uses a pair of public/private encryption keys SSL and S-HTTP Chapter 14-50 Digital Signatures and Digital Time Stamping Digital Signature Encrypted portion of message Digital Signature Standard (DSS) Digital Certificate Certificate Authority Digital Time-Stamping Services (DTSSs) Chapter 14-51 Study Break #5 Which of these statements is correct? A.A VPN is a type of VAN B.DES stands for “data entry system” C.An IDS is the same as a firewall D.All of these statements are correct Chapter 14-52 Study Break #5 - Answer Which of these statements is correct? A.A VPN is a type of VAN B.DES stands for “data entry system” C.An IDS is the same as a firewall D.All of these statements are correct Chapter 14-53 Study Break #6 Spoofing means: A.Kidding someone about their firewall B.Simulating a disaster to test the effectiveness of a disaster recovery system C.Posing as an authentic user to gain access to a computer system D.Encrypting data for security purposes Chapter 14-54 Study Break #6 - Answer Spoofing means: A.Kidding someone about their firewall B.Simulating a disaster to test the effectiveness of a disaster recovery system C.Posing as an authentic user to gain access to a computer system D.Encrypting data for security purposes Chapter 14-55 Copyright Copyright 2011 John Wiley & Sons, Inc All rights reserved Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc The purchaser may make backup copies for his/her own use only and not for distribution or resale The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein Chapter 14-56 Chapter14Chapter 14-57 ... standardized for business reporting purposes Chapter 14- 14 XBRL Code Chapter 14- 15 XBRL - Financial Reporting on the Internet XBRL Instance Documents and Taxonomies Must understand the standard... pages Chapter 14- 5 HTML Code Chapter 14- 6 Display of HTML Code Chapter 14- 7 Groupware, Electronic Conferencing, and Blogs Groupware Allow users to complete numerous tasks electronically Send and. .. Internet and World Wide Web Internet Addresses and Software Intranets and Extranets The World Wide Web, HTML, and IDEA Groupware, Electronic Conferencing, and Blogs Chapter 14- 2 Internet Addresses and