The picture above is our public key encryption diagram
Tuesday, November 15, 2011
7.1-IS Security
Our business could potentially be threatened by the 5 most common threats which are unauthroized access, information modification, computer viruses, denial of service attacks and spyware.
6.1-Web 2.0
The 4 pillars of Web 2.0 are:
1.Utilizing the Web as a Platform
2.Harnessing Collective Intelligence
3.Leveraging the Data
4.Implementing Innovative Web
The 4 pillars could definitely be used in our company. Pillar 1 could be used for clients to interact with the company through the web. Pillar 2 could be used for people to express what they think about our company. Pillar 3 could be used to keep track of our customers. Pillar 4 could be used to make sure the customers can keep up with their accounts.
1.Utilizing the Web as a Platform
2.Harnessing Collective Intelligence
3.Leveraging the Data
4.Implementing Innovative Web
The 4 pillars could definitely be used in our company. Pillar 1 could be used for clients to interact with the company through the web. Pillar 2 could be used for people to express what they think about our company. Pillar 3 could be used to keep track of our customers. Pillar 4 could be used to make sure the customers can keep up with their accounts.
Subscribe to:
Posts (Atom)