Tuesday, November 15, 2011

7.1-IS Security

Our business could potentially be threatened by the 5 most common threats which are unauthroized access, information modification, computer viruses, denial of service attacks and spyware.


The picture above is our public key encryption diagram

6.1-Web 2.0

The 4 pillars of Web 2.0 are:

1.Utilizing the Web as a Platform
2.Harnessing Collective Intelligence
3.Leveraging the Data
4.Implementing Innovative Web

The 4 pillars could definitely be used in our company. Pillar 1 could be used for clients to interact with the company through the web. Pillar 2 could be used for people to express what they think about our company. Pillar 3 could be used to keep track of our customers. Pillar 4 could be used to make sure the customers can keep up with their accounts.