Tuesday, November 15, 2011

7.1-IS Security

Our business could potentially be threatened by the 5 most common threats which are unauthroized access, information modification, computer viruses, denial of service attacks and spyware.


The picture above is our public key encryption diagram

6.1-Web 2.0

The 4 pillars of Web 2.0 are:

1.Utilizing the Web as a Platform
2.Harnessing Collective Intelligence
3.Leveraging the Data
4.Implementing Innovative Web

The 4 pillars could definitely be used in our company. Pillar 1 could be used for clients to interact with the company through the web. Pillar 2 could be used for people to express what they think about our company. Pillar 3 could be used to keep track of our customers. Pillar 4 could be used to make sure the customers can keep up with their accounts.

Sunday, October 23, 2011

5.3 Intranet diagram

The outside client sends data through the VPN to the server. The server stores the data. The data is then transported to the inside client.

5.2 Extranet diagram

The vendor network is on the left. The supplier network is on the right. The VPN is the middle man in the situation

5.1 Competitor's E-Commerce

These are the 6 rules

Rule 1 : The Website Should Offer Something Unique
Rule 2 : The Website Should be aesthetically pleasing
Rule 3 : The Website Must be easy to use and fast
Rule 4 : The Website must motivate people to visit
Rule 5 : You must advertise your presence on the web
Rule 6 : You should learn from your website

I chose Carilion Clinic as a competitor.

I gave them a rating of 4 out of 5 for rule 1 because of the alphabetical word search on the page. I gave them a rating of 5 out of 5 for rule 2 because it has different color schemes. For rule 3 I give them a rating of 5 out of 5 because it is easy navigate around the page. For rule 4 I give them a rating of 2 out of 5 because the website is somewhat dull. For rule 5 I give them a 4 out of 5 because they advertise well. For rule 6 I give them a 2 out of 5 because you don't learn much from their website.

4.3

The invoice is meant to communicate with potential customers. We will keep record of our customer's first and last name, phone, email, and job. The product part is meant for taking in supplies. On each product is a supply id, product code, product name, description, and destination.

4.2 Packet switching

The image shows a shared network system. The client or user can store and move what he/she pleases. The router is what holds all the sections. The TCP sorts and orders the information. The IP completes the delivery.