Find this at http://www.npac.syr.edu/users/gcf/cps714securityinfrastructurejune99/

Security Infrastructure fo Electronic Commerce and Internet

Given by Roman Markowski at CPS714 Computational Science Information Track on June 2 and June 7 99. Foils prepared July 6 99

Introduction to Network Security
E-commerce - definitions, characteristics, requirements
Security Standards and Protocols
Public Key Cryptography and Infrastructure
Secure Electronic Messaging (PGP, S/MIME)
Payments on the Web, Electronic Commerce
C2B: SSL and SET Standards
Organizing Cyber-Store
B2B: OFX and OBI Standards
Firewalls
Computer Crimes, Threats and Attacks


Table of Contents for Security Infrastructure fo Electronic Commerce and Internet


001 CPS714 Portal Technologies Internet Infrastructure for Electronic 
    Commerce
002 Overview
003 Network Security (1)
004 Network Security (2)
005 Network Security (3)
006 Network Security (4)
007 What is Electronic Commerce ?
008 Underlying framework
009 Internet Infrastructure for E-commerce
010 Requirements for E-commerce
011 Traditional Solutions
012 Electronic Solutions
013 Security Standards and Protocols (1)
014 Security Standards and Protocols (2)
015 Security Standards and Protocols (2)
016 Security Standards and Protocols (3)
017 Security Standards and Protocols (4)
018 Security Standards and Protocols (5)
019 Public Key Cryptography (1)
020 Public Key Cryptography (2)
021 Public Key Cryptography (3)
022 Public Key Cryptography (4)
023 Cryptography (1)
024 Cryptography (2)
025 Secure Electronic Messaging (1)
026 Secure Electronic Messaging (2)
027 Secure Electronic Messaging (3)
028 Secure Electronic Messaging (4)
029 Secure Electronic Messaging (5)
030 Secure Electronic Messaging (6)
031 Secure Electronic Messaging (7)
032 Traditional Credit Card Transaction (1)
033 Traditional Credit Card Transaction (2)
034 Traditional Credit Card Transaction (3)
035 Payment on the Web  (1)
036 Payments on the Web (2)
037 Payments on the Web (3)
038 Payment on the Web (4)
039 Payment on the Web (5)
040 E-commerce (1)
041 Electronic Commerce  (2)
042 Electronic Commerce  (3)
043 Secure Socket Layer  (1)
044 Secure Socket Layer  (2)
045 Secure Socket Layer  (3)
046 Secure Socket Layer  (4)
047 Secure Socket Layer  (5)
048 Secure Electronic Transaction (1)
049 Secure Electronic Transaction (2)
050 Secure Electronic Transaction (3)
051 Secure Electronic Transaction (4)
052 Secure Electronic Transaction (5)
053 Secure Electronic Transaction (6)
054 Secure Electronic Transaction (7)
055 Secure Electronic Transaction (8)
056 SET  vs.  SSL
057 Cyber-Store (1)
058 Cyber-Store (2)
059 Cyber-Store (3)
060 Cyber-Store (4)
061 Cyber-Store (5)
062 Cyber-Store (6)
063 Open Financial Exchange (1)
064 Open Financial Exchange (2)
065 Open Financial Exchange (3)
066 Open Buying on the Internet  (1)
067 Open Buying on the Internet  (2)
068 Open Buying on the Internet  (3)
069 Firewalls (1)
070 Firewalls (2)
071 Firewalls (3)
072 Firewalls (4)
073 Computer crimes (1)
074 Computer crimes (2)
075 Computer crimes (3)
076 Threats
077 Trends
078 Denial of Service Attacks (1)
079 Denial of Service Attacks (2)
080 DNS Cache Poisoning (1)
081 DNS Cache Poisoning (2)
082 DNS Cache Poisoning (3)
083 Back Orifice (1)
084 Back Orifice (2)
085 Session Hijacking (1)
086 Session Hijacking (2)
087 Web Spoofing (1)
088 Frame Spoofing (1)
089 Unix vs. Windows NT


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Tue Jul 6 1999