• Tidak ada hasil yang ditemukan

MIDDLEWARE

N/A
N/A
Protected

Academic year: 2024

Membagikan "MIDDLEWARE"

Copied!
11
0
0

Teks penuh

(1)

MIDDLEWARE

(2)

INTRODUCTION

❖An e-commerce application; being web based application has to be three tiered.

❖ First is user interface layer; responsible for creating interactive, flashy web pages like HTML.

❖Second are Web containers and scripting engines.

❖Third tier is data layer which comprises of DBMS.

❖Automation of back-end and front end operations is effected by middleware.

❖ First connecting, then communicating, integrating distributed systems to external sites, talking between client and server over heterogeneous networks, systems architectures : all this is

facilitated by middleware technologies

❖Middleware technologies offer undercover functions to seamlessly integrate various

applications with instant info to make it accessible across diverse architectures, protocols and networks.

(3)

MEANING

➢ A set of common business-unaware services that enable application processes and end users to interact with each other across a network.

➢A software that resides above the network and below the business-aware application software.

➢A software that sits between two or more types of software and translates information between them.

➢Serve to “glue together” separate, often complex and already existing programs.

➢A mechanism that allows one entity (application or database) to communicate with another entity.

➢Facilitates communications between two or more software systems.

➢EXAMPLES: Internet Protocols ( TCP/IP and HTTP) and Network Control Program (CORBA).

(4)
(5)

DECIDING ON ENTERPRISE MIDDLEWARE

MAIL & COLLABORATION

NETWORK AND SYSTEM MANAGEMENT

SECURITY SOLUTIONS

PAYMENT SOLUTIONS

DBMS

(6)

MAIL & COLLABORATION

Takes care of handling the communication and collaboration needs of the user.

high levels of security and system performance to keep employees in touch.

Proprietary Local Email systems : Use of local email systems; messages are addressed to another person in the system by using their actual/user name.

Online Services: A business which provides wide variety of info resources like news, weather, sports etc. like MSN

Email via ISP:

A business that provides access to internet and email through local phone line. Like Messenger, Outlook Express.

Web based Email:

Websites that provide free email accounts. Example yahoo mail.

(7)

NSM

Administration and management of the networks and computer systems in the organisation.

▪Broad subject of managing computer networks.

▪Includes Security, performance and reliability

Includes gathering requirements, purchasing equipment and software, distributing it to where it is to be used, configuring, maintenance & enhancement etc.

▪The department that performs systems management is sometimes called Management

Information Systems.

(8)

TRENDS AND ISSUES IN SYSTEMS MANAGEMENT

• Ownership cost

• Right balance of resources and control

• Outsourcing of all or part of Info systems

• Tactical versus strategic purchasing decisions

• Use of graphical user interface

• Security Management

(9)

SECURITY SOLUTIONS

➢ Security is an essential part of any transaction that takes place over the internet.

➢Customer will lose his/her faith if security is compromised.

ESSENTIAL REQUIREMENTS FOR SAFE E-PAYMENTS o Confidential

oIntegrity oAvailability oAuthenticity

oNon-Repudiability oEncryption

oAuditability

(10)

MEASURES TO ENSURE SECURITY

Sender encrypts the data using secret code

Only specified receiver can decrypt using same or different secret code.

ENCRYPTION

E-signature authenticated through

encryption and password

DIGITAL

SIGNATURE Unique digital id

used to verify identity of an individual website or user.

SECURITY CERTIFICATES

(11)

SECURITY PROTOCOLS IN INTERNET

SSL (secure Socket Layer)

Authentication Encryption Integrity

Non-repudiability Example: https

Secure HTTP

Extends the HTTP internet protocol with public key encryption, DS and authentication

Works by negotiating encryption scheme used between client and server

Secure Electronic Transaction

Secure protocol developed by Mastercard and Visa with Digi Wallet software , Merchant software, Payment gateway and Certificate Authority software

Referensi

Dokumen terkait

Website Relying Party yang menggunakan HTTP tanpa dilengkapi dengan layer yang aman ( Secure Socket Layer/SSL ) membuat semua paket data yang dikirimkan dan diterima

a) Penggunaan teknologi Secure Socket Layer (SSL) 128 bit digunakan untuk memberikan perlindungan komunikasi terhadap server bank dengan komputer nasabah dengan

socket(AF_INET, SOCK_STREAM, 0), berfungsi untuk membuat socket dan parameter family yang digunakan adalah AF_INET yaitu internet protocol dan socket yang digunakan adalah

It’s secure e-mail system is based on verisign’s public key security and uses a 40-bit SSL browser encryption technology.. • HyperSend is a secure delivery platform that provides

Secure Socket Layer (SSL) adalah suatu mekanisme atau protokol yang digunakan untuk mengacak data sebagai bentuk layanan keamanan pada pengiriman pesan (informasi) melalui

Keterangan :Tingkatan risiko dikategorikan low karena koneksi konektifitas sudah menggnukana SSL (Secure Socket Layer), memasang anti spam, mengkonfigurasi email dan

Secure Socket Layer (SSL) adalah suatu mekanisme atau protokol yang digunakan untuk mengacak data sebagai bentuk layanan keamanan pada pengiriman pesan (informasi) melalui

Network Security Protocols: -The role of this protocol is to make sure that the data exchanged over the internet is safe and secure and there are no security attacks.. These protocols