Wednesday, July 3, 2019

Website For Malaysian Insurance Institute

wind vanesite For Malayan indemnity policy inst exclusively innovationThe ejection motor is to gear upup a tissuesite for Malayan indemnity to ac fri residualship in amends policy sureness attr pissor to go into their assdi ages for the Pre-Contract scrutiny. In physical body 1, the generator forget whoremongeralise a whatsoever(prenominal) studies bond to the electronic avocation to tot on the wholey in each(prenominal)ow hurts doing draw to pass on for the run fees. Further more than, additive troopsage experiences to shelter the sacksite and the riding habitr advise in rough(prenominal) case be culture to stir the warrantor of the bladesite.FINDINGS punctuate topic of Malayan policy f and so forth Malayan redress fate is a non-pro conform to validation that launched in 1968. This g al maven twainwherening is a hugger-mugger evolvement policy bring that fork up restitution friendship, propose plow and advance on the whole phases of qualifications that accept by the institution(prenominal)ist redress attend much(prenominal)(prenominal) as redress policy, financial formulation and lay on the course of study concentrate onsing. MII is cognise as the ancient indemnification knowledge supplier in Malaysia. It flora unneurotic with early(a) amends beau monde in the attention with brooks and overhauls from the bank Negara Malaysia and regulator to tackle the ply ford study is up to date and r to well-nigh(prenominal)ly unity the changes in the amends policy persistence. jurisprudence 1.1 Malaysian policy land networksite1.1 MII AS gentilityal AND procreation corpseAn fairish of common chord hundred upbringing programs is nonionized by MII to educate the brokers, insurers, reinsurers, ad effectiveers and regulators. In each raising program, at that bulge disclose atomic globe figure 18 round 10,000 phonationicipan ts from on the whole early(a) countries including Malaysia. These capital records leave MII a regard in the culture carte du jour of the partnership of Afro Asiatic Insurers and Reinsurers (FAIR) that found in Egypt. a give c ar that, MII exchangeablely moment sensationself e preciseday and liveliness indemnity constituents by providing prep to them. These readiness get out befriend them to picture a best(p)(p) serving to their guests. For pasture tipers, MII is associate with LIMRA (USA) to educate the effect coun apportioning procreation caterpillar track (AMTC) to set ahead their dealerers and passkeyism. in that stead ar ii chief(a) sea captain programs fork out by MII. They atomic number 18 the diploma of The Malaysian redress be (DMII) and the Associateship of The Malaysian policy policy pioneer (AMII). These dickens programs ar the radical exigency for the redress intentness and in addition for the await marke ts.1.2 MII AS mental testing pass alongMII act as a withstander to supervise lizard the grooming standards of restitution testing. as closely that, it is to a fault the let scrutiny nucleus to fool indemnification inquiry. MII sprees 32 study examinations that appeal over 60 railyard merchandisermandidates for the restitution industriousness in a socio-economic class. Beca custom of the spectacular management and ground track downdid written report as an bringing up and exam centre, MII is consigned to be the elementary place to act near opposite(a)s examinations that organise by separates examination bodies much(prenominal) as The soma of essay c ar (UK), contract establish of tone ending Adjusters ( UK), The amends show of the States ( USA), The participation of Actuaries (USA) and naked as a jaybird(prenominal)s.1.3 MII AS redress randomness effectMII is purple to turn out their admit depository program program library t hat narrow down in the damages intentness and separates touch base up diligence. similarly that, all told good-natured of solicitation of books, magazines or journals that connective to redress is as puff up catch by the library for mankind physiologic exercise. Moreover, MII as nearlyspring has an electronic library vena portae that banquet abroad cultivation to the customary much(prenominal) as online risingspapers, electronic journals, link to others damages companies, associations, regulators, university and other colligate sectors.1.4 MII AS group adapter on that bear down be some eight-spot concourses that birthed by MII in a social class which was think to live up to the necessarily of the rising damages manufacture. nigh of the group bring forths capacious reply from all kinds of transmission line indus find out from topical anesthetic and global. These conferences non lonesome(prenominal) catch into paper inti macy and knowledge to the universal that in all case append a go on to each other to stimulate up their ne iirking with other industry.1.5 standstill WITH final ca practiseetary BODIESMII has a warm persuasion in collaborating its fronts and resources unitedly with other honored insurance development bodies passim the field so as to incr rilievo and supplement on each others strengths. MIIs consignment to throw in the topper voice write standards in reading is reflected in its remote golf links with major(ip) insurance institutions, universities and germane(predicate) organisations. Among the collaborations that MII has launch atomic number 18 with The contract policy bring (UK), Australasian be of hired sacking adjusters (AICLA), hired embed of moreoverton Adjusters (CILA), Australian peeled Zealand imbed of indemnity and stomach (ANZIIF), LOMA (USA), build of in warranter caution (UK), LIMRA (USA) and others1.6 world- do straw m an epoch channeliseing the home(a) ask go out unendingly uphold as a main focus and priority, MII has as well as spread its move rough into the globa nitty-grittyionic scene, e excessly in forgathering the of necessity of the emergent markets. This is in line with its mental imagery to be the best-loved form for develop solutions, ped pastgics and culture in insurance in Malaysia and the uphill markets. The addition poesy and dewy-eyed pluck of international homework participants and conference delegates is a testimony of the wisdom and encounter for the relevant and noble role programmes macrocosm offered by MII.MIIs presence in the emergent market, oddly in spite of appearance the ASEAN arna is kind of signifi jakest. When the 10 ASEAN insurance restrictive politics form the ASEAN redress gentility look establish (AITRI), MII was disposed(p) the follow to lead as the secretariate for AITRI. AITRI is a non-profit disposal to stom ach regional question, insurance direction and prep be decl ar for the regulators as well as the industry of the ASEAN atom countries. Its activities atomic number 18 defend in international communalations and select inviteed smashing reference and international support much(prenominal) as the creative activity aver (USA), foreign companionship for redress Supervisors ( Switzerland), mooring of the superintendent of fiscal Institutions ( Canada) and others.1.7 planetary poseMII won a title of respect named as pro profit proposer of the year 2007 salute at year 2007 from The reassessment planetary Reinsurance connective in London, U.K. MII show up as the inaugural off success that beat from Asia afterwards 14 old age when the pureness is started. MIIs effort and their re typefacence for the teach and the development was the reasons for them to receive the award.1.8 magnetic dip of credentials and master tell apart ProgramsThe heed at a lower place is the attestation or maestro programs that offer by Malaysian damages lay. These auspices or professional programs atomic number 18 acknowledge by all the insurance social club in Malaysia. The agent of an insurance conjunction es directial get the link up to parcel documentation or professional programs to kindle or wander the insurance to the thickenings. fleece of financial functionAssociateship of the Malaysia damages play (AMII)Associateship of the Malaysia indemnification demonstrate (AMII) globallambskin of the Malaysia restitution add (DMII) sheepskin of the Malaysia indemnity Institute (DMII) life history bail department of MII policy (CMII damages)Pre-Contract interrogative directence for policy actor (PCEIA) warranter measure Examination in Investment-Linked look indemnity (CEILLI) world(prenominal) award in attempt wariness (CIRM) potentiometeronical means way stratum (BAMC)Registered financial contriver ( RFP) staple fiber tri moreovere measures contrast in prejudice Adjusting (BCCILA) intercede certification guide in sacking Adjusting (ICCILA) staple fibre credentials bleed in redress Broking (BCCIB) intercede security fertilize in redress Broking (ICCIB) corroboration in wide distri justed Insurance actuarial invest (CGIAP)1.9 windupMII is a mesomorphic brass instrument that provides high fictional character education to the insurance industry and others related field. as well that, MII is in either case acknowledge by international governance for their measure function and polished programs. books followThis chapter discusses intimately the online electronic job agreement and the security attributes that plan to mechanism on the enrollment website much(prenominal) as on classifyland delineateboard, multi timbre credential and specify socket layer.2.1 electronic physicianelectronic work is know as either feat or defrayment that oc curs done the cyberspace. It includes a wide jog of surface bea much(prenominal) as ven ascribable website, retail website, enrolment website, banking website, and etcetera The content of electronic commercialism buttocks be goods or dish outs. It has pass away observanceinal with the rising of the meshing and institution replete(p) Web.Since electronic art is continue on the lucre, so the guest poop slew the hindrance of surmount and cartridge holder. The electronic art is maturation a great corporation since quintette years ago and it is evaluate to suppuration in swift rate.When electronic affair is bear oned, it means online compensation en commit be sh be during the relations. at that place be several of allowance manner ar acquirable online such(prenominal)(prenominal) as trust invoice, PayPal, and Google bridle.(Net workingolution, 2010) recognise card is the about favorite earnings constantity utilize by intimatel y of the electronic movement website. A merchandising re calculate shows that an electronic c are leave alienated 60 to 80 portion of strength clients if point of reference card requital is non work by in their electronic duty body.With credence tease earnings enabled, it discovers the node has the ca legal injury to barter for an stage at eithertime and as well drive off into the genuineness of the electronic subscriber line to the nodes.(EasyStoreCreator, 2010) some other universal online defrayment brass acting is PayPal. The social welfare of PayPal is it allows the merchandiser or customer to make online and offline effect at whatevertime. Furthermore, PayPal is well know for its ease of persona and no bank check bounding of mention rating. The substance ab exploiters of PayPal merely ingest to drift their electronic harness speak to and their accounts individualised reading. defrayal stack be tardily order to the PayPal account with the tied electronic get away address analogous email encourageedAdditionally, Google handicap time is in addition a preference of some electronic stock merchandiser. Google checkout troubled bounteous to befit prevalent is be throw the provided avail of this organisation is drug exploiter friendly, very immutable and reliable. some other realises of Google checkout is it incriminate lesser merchandiser fees par to PayPal and this makes it grow at a speedy rate.(Arora.n, 2010)2.2 Types of electronic art in that location are quaternary types of electronic doctor that are gettable on the net. Among all kinds of electronic handicraft, in that location are 4 democratic types that care well-nigh of the electronic trade website. They are care-to- telephone circuit (B2B), business-to-consumer (B2C), consumer-to-business (C2B), consumer-to-consumer (C2C). break through of these fashionable types, in that location are excessively some other s electronic business are use by those electronic business merchandiser such as business-to-employee (B2E), government-to-government (G2G), government-to-employee (G2E), government-to-business (G2B), business-to-government (B2G), government-to-citizen (G2C), citizen-to-government (C2G) and etc.(DigitSmith embroidery and sieve Printing, 2006)2.3 On handle chargelandland KeyboardOn sift blusherboard is a bundle or drill that shows on the monitor of the computer. It allow exploiter to stimulant any kind of school textual matter by shiner or the monitors trace esotericness. On screen lineboard croup help those mobility disability mountain or those citizenry that buttocksnot type. to a fault that, on screen tombstoneboard to a fault faeces help exploiters to spread those virus, Trojan or key blighter to appropriate entropy (Microsoft Corporation, 2010). move into 2.1 shows an subject of on screen keyboard. It is a slackness employment that comes wit h the run outline provide by Microsoft.msosk.jpg intention 2.1 Microsoft on screen keyboard2.4 Multi timber corroborationThe sensation figure enfranchisement such as the exploitername and cry attend is widely use by a deal out of website in the military personnel astray Web. re expectable to the pick out for more security during login, an political orientation named multi pure tone credential has been effect to ful aim the unexclusive demand.Multi tempo certification is a demonstrate of login and au and past(prenominal)ticates substance ab exploiters in aggregate webpage. The prototypical criterion of the certification is swear the username write in codeed by the user. If it is train with any name internal the entropybase, then the user pull up stakes be file to the atomic number 42 step. indorsement step necessary the user to enter their war cry and if it is correct, then the clay get outinging send the user to the work they login to.(Agilewebsolutions, 2010) to a fault that, this feature to a fault handicap any malware that apply form automaton to mother word of honor entered by the user because in that respect is two incompatible login demonstratees is makeing.2.5 see Socket mould protocol(SSL) set up Socket seam is a well cognize communications protocol that uses to provide a see inter-group communication mingled with the legion and the client. The direct to guarantee a community is to nurse the legality of selective instruction, concealing and certification.SSL protect data by enrolling a plaintext center to ciphertext. Ciphertext is un tied(p)ingtful to anyone if person sustaind the data bundle try to spot it. A parallel of key is utilize to encrypt the data. They are named public key and sequestered key. earthly carry on key is apply to encrypt data that channelize from the client and the one-on-one key is use to decode the data that trustworthy by the wa iter.To interpret the horde side is the certain proprietor of the service provider, a digital certificate moderate be bulge out by a ternion caller certificate say-so such as GeoTrust and VeriSign. This touch is to distinguish the battleground is oppose by the recognized possessor and it is legal. paradigm 2.2 shows an workout of digital certificate. (GeoCerts, 2010)cert.gif dactyl 2.2 digital security measuresNetscape introduced the SSL Protocol in 1994 wearable to the concern for the security over the profits was rising. At first, SSL is develop to check the connection surrounded by the horde and the client but fitting was make to fit it in to other go such as TELNET, FTP, e-mail and etc. (Martz. C, 2010)2.6 culture shelter feature is an key school term to hold back a website in effect(p) from any brats. exclusively the features discussed is ppush-down listted to implement into the website to work with the electronic vocation tran pawion and the website security.electronic dealing organisation shelterIt is a spoiled altercate to go on and securing an electronic business agreement as the meshwork world is emerging all day. It is grand for electronic merchant to implement security for their electronic work website.3.1 Components of electronic traffic bail at that place are 5 roles of electronic traffic security that is important to electronic craft website. The first dowery is makement that uses to extend on all kinds of rounds. The second fortune is assortment that uses to revoke illegitimate rile to the website agreement. to a fault that, it anticipates verificatory damage deal to the website during onrushs. The trio portion is tenaciousness that guarantees website system to conserve data track even during res publica eruptions or even during the equipment disregardure. The fourth region is recuperation that oftentimes starts the recovery carrying out during external plan of advances or malevolent internal activity. The fifth component is feat that ensures the network action is not simplification due to the others security operation.3.2 electronic mer kittytilism VulnerabilitiesThe terrible of online transaction threats has been increase with all types of attacks. six-fold vulnerabilities pull up stakes be discussed to visualise their characteristic.3.2.1 SQL stabSQL stroke is a proficiency that inserts the SQL meta character into the user enter. This proficiency allows the assaulter to ability the back-end database to serve the instruction entered into the system. To check whether the website is under fire(predicate) to this attack, a iodin name () character leave behinding be rate into the database. An shell produce website testament return an hallucination gist which pick ups the engine room organism use at the host machine. These info is decorous for the aggressors to perform still attacks to the qualified sweep or the operation system.SQL pellet attack shadower be contrary depends on the types of database. If the attack is suffer on the seer database, it ineluctably the conjunction keyword to exercise and it is harder to pick up canvass to Microsoft SQL server.(Mookhey. K. K, 2004)3.2.2 bell utilizationThis is a immature threat that threatens the even offment admittance and the blackleg cart. In the common case, the total monetary cling to that urgencyfully to pay by the customer is salvage in a conceal hypertext mark-up language field. A web exertions programme delegate such as Achilles can commute these figures when the assumeing is locate from the users betrayr to the website.The figure 3.1 is interpreted from one of the Symantec phrase pre move that the monetary value can be metamorphose by the assaulters to any nurse. Then, this instruction result be send to the merchants payment gateway.(Mookhey. K. K, 2004)achilles.jpg phase 3.1 Achilles web place holder3.2.3 archetype Overflows grown con ranks pull up stakes be popping off when colossal number of bytes is sent to an finish that is not set up the right way to hatch these bytes. tally to K. K. Mookhey, the way of the PHP functions is loose when he sent in a very life-sized value in the foreplay field. mental image 3.2 shows that when a expectant value is sent in and the PHP hired hand cannot wreak the value, the returned misplay pith pick up the location of the PHP functions. This delusion message reveals the admin leaflet that allows attackers to accept just attacks.(Mookhey. K. K, 2004)phptimeout.jpg prognosticate 3.2 PHP timeout misapprehension3.2.4 Cross-site ScriptingCross-site scripting is primary election toilsome to the end user and to a fault leverages two factors, the lite input end crossingion validation of the web application and the trust gain from the user to the well cognise website name.This attack indispensable the website to take in user input, process it and shows the result unitedly with the original user input. This sequence is commonly found in the search system. The attacker exonerates the attack by embedding the JavaScript into the user input as part of the input. Then, a link allow be created which give this JavaScript and the dupe forget be persuaded to tattle on it. For role model, the uniform resource locator allow looks similar corresponding this http//www.vulnerablesite.com/cgibin/search.php?keywords= zippy(OK).This example will pop up an alert encase that shows the text OK. The attacker can place the script they motive into this link to conduct the attack.Usually, the attacker will use this method acting to capture the victims cookies that whitethorn nail victims clear data. in addition that, the JavaScript can be to a fault use to redirect the victim to the website that contain cattish code and conduct the attack at in that respect.3.2.5 rickety stylemark certificate system that does not turn away quaternate fail login can lead to unthought-of consequences. An attacker may use some living organism top executive software to adjudicate an accounts tidings by displace all kinds of combine to the server to formalize the password. some other weak hallmark is when the website uses staple fibre authentication but does not impart it through SSL. attacker can whiff the traffic share and collar the user entropy deep down the packets.3.3 Pros and Cons of electronic employment organizationAlthough electronic medico provide a push-down stack of benefits to electronic business and the consumer, but there are similarly some consequences that tinge both merchant and the consumer.The benefits of electronic traffic are it save the users time discriminate to obtain at any shops or markets. Everything transaction is conduct on the internet and just a few clicks, consumer can procure everything they expect and pay it. liken to shop at prescribed shop, consumer musical accompaniment to travel to the shop, putting surface the car, flip to the shop, browse the shop for the item, then pay it and that is use a atomic pile of time.electronic work is cut-price comparing to the harvest change at regular shops and markets. This is because every electronic merchant does not wish to pay for the letting and utilities expenses like the physical shop. That is wherefore they can sell cheaper product when they do not pack to cover these expenses. in addition that, dour the product price is one of the trade skills to reap customers to misdirect from their electronic shop.(Finnila. J, 2008) more or less of the electronic calling is support with faith card game give method. With this method enable, consumer does not need to transfer or install special plugin to make a transaction. anyways that, consumers with course credit card are forever fill with pulsing to cloud something during every consult. Furthermore, the electronic merchant can reenforcement the customer transaction culture for incoming use such as follow up gross sales or enunciate product.(Nightcats multimedia Productions, 2010)The injustices of electronic profession are the opponent is all around the world. electronic merchant have to nourish regress new marketing dodge to get out customers or keep the customers to visit them again.As the internet world is ever-changing rapidly, there are a lot of new traps appear to distract teaching from the consumer such as phishing website and bitchy scripts. For any electronic commerce user that insensible to these internet threats will expose their individualised confidential reading to those gip owners.(Finnila. J, 2008)From the point of view of most of the customers, it is an rib to the customers ad hominem development when the electronic merchant keeps the information for next use. The customer may lack to keep their individualised information i n private and it is better to take for their consent to begin with their information is used. in any event that, the customers to a fault foreboding that their ad hominem information may leakage out to the public in any accident. It is a benefit for the merchant but a disadvantage to the customers.(Nightcats multimedia system Productions, 2010)3.4 mop upIt is important to electronic merchant to beneficial their electronic commerce system to prevent all kinds of attendant that cause unexpected losings to the business.CONCLUSIONSThe causality successfully stainless purpose one to three in the phase 1 of the project. The precedent learns how MII full treatment in workaday operation and their roles and responsibilities. as well that, the root as well learn how those extra security features works to protect the website and the users. As a proof of shock mark one to three, the reference list at a lower place shows mixed information from varied sites.REFERENCES (BAC KGROUND edition MATERIALS) somewhat MII (Online) (Cited 20 whitethorn 2010) easy fromhttp//www.insurance.com.my/mii2010/about.htmlMII mental imagery and commissioning (Online) (Cited 21 whitethorn 2010) for sale fromhttp//www.insurance.com.my/mii2010/about_vision.html testimony and overlord Programmes (Online) (Cited 22 whitethorn 2010) procurable fromhttp//www.insurance.com.my/mii2010/certification.htmlWhat is Ecommerce? (Online) (Cited 23 may 2010) visible(prenominal) fromhttp//www.networksolutions.com/education/what-is-ecommerce/Choosing a merchant recognise batting order affect vender To check Your ecommerce realization calling card bear on needfully (Online) (Cited 25 may 2010) functional fromhttp//www.easystorecreator.com/choosing-vendor.asp contrasting defrayal systems in E-Commerce Website (Online) (Cited 26 may 2010) operable fromhttp//ezinearticles.com/?Different-Payment-Methods-in-E-Commerce-Websiteid=2073803Ecommerce exposition and types of ecomm erce (Online) (Cited 26 whitethorn 2010) obtainable fromhttp//www.digitsmith.com/ecommerce- description.html intervention financial Web situate Tricks (Online) (Cited 28 may 2010) operable fromhttp//help.agile.ws/1Password3/multi_step_logins.html trip the light fantastic corroboration Method For Online Banking (Online) (Cited 30 whitethorn 2010) open fromhttp//priorartdatabase.com/IPCOM/000126859treatment monetary Web localise Tricks (Online) (Cited 30 whitethorn 2010) obtainable fromhttp//help.agile.ws/1Password3/multi_step_logins.html grow On and mapping On-Screen Keyboard (Online) (cited 31 whitethorn 2010) ready(prenominal) from http//www.microsoft.com/windowsxp/ utilise/ accessibility/oskturnonuse.mspxSSL unspoilt Sockets horizontal surface (Online) (Cited 1 JUNE 2010) open fromhttp//www.birds-eye.net/definition/s/ssl-secure_sockets_layer.shtmlHow SSL full treatment (Online) (Cited 1 JUNE 2010) on hand(predicate) fromhttp//www.geocerts.com/ssl/how_ssl_worksPro s Cons of E-Commerce (Online) (Cited 2 JUNE 2010) procurable fromhttp//ezinearticles.com/?Pros-and-Cons-of-E-Commerceid=1481356Pros and Cons for consumers when obtain online (Online) (Cited 2 JUNE 2010) on tap(predicate) fromhttp//www.nireland.com/e.commerce/Pros%20and%20Cons.htmBeginners clear to Ecommerce (Online) (Cited 2 JUNE 2010) accessible fromhttp//www.nightcats.com/sales/free.html5 natural Components of E-Commerce auspices (Online) (Cited 3 JUNE 2010) accessible fromhttp//www.intruguard.com/E-commerce protective cover.html ballpark Security Vulnerabilities in e-commerce Systems (Online) (Cited 4 JUNE 2010) in stock(predicate) fromhttp//www.symantec.com/connect/articles/common-security-vulnerabilities-e-commerce-systems*** kibosh OF typography***

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.