Wednesday, November 16, 2011

7.1 IS Security Part B

For my company, Marval Land, to send another company we might be working with we would have our own public key and private key. For us to send them a message we would ask for their public to to encrypt our message and then send it to them. They use their private key to decrypt the message so they can read it. It is just the opposite if we have to sign a message to authenticate it. We will use our private key to decrypt and then send it to the reciever. The receiver uses our public key to encrypt and verify that it is us who signed it.

7.1 IS Security Part A

Our amusement park could be threatened by natural disasters such as hurricanes or mass floods. We can protect our company and our information by storing our backup information at a separate building away from our own building. Another threat that can happened to our company is an employee of ours sending other companies in the amusement park industry our ride designs and pretty much putting us out of business. A way we can stop that from happening is by giving access only to our top executives and limiting those who sees our blueprints. Links to outside business contacts is another form of threat to out company. Companies we could be doing business with can leak our plans out to the world before we even release them ourselves. To fix that problem we can just restrict the information we share with the other company and have a type of password on our files that we share where only we can get to all of our blueprints and plans. The last threat to our company is outside threats such as viruses. Viruses can infect our network and computer systems and completely destroy our systems and information. A  solution to viruses is to try and update our viruses protection software on our systems and learn about the new viruses out there so we can couther act them and stay one step ahead.

Sunday, November 6, 2011

6.1 Web 2.0

     The first Pillar of Web 2.0 is utilizing the Web as a Platform. This is peer-to-peer technology and an example of this this openSUSE operating systems.The way this relates to our company, the amusement park, is our company developing a operating system to allow people to comment on.  The second Pillar is Harnessing collective intelligence. An example of this would be reviewers on Amazon.com commenting on a product. This can relates to our company by the way we would set up our home page so that our customers, and anyone else for that matter, can rate our rides in our park. The third Pillar is Leveraging the data and this is a company such as Google knowing their customer's preferences. By knowing our customer's preferences we could design new rides or rides we have now to their likings. The fourth Pillar in Web 2.0 is Implementing innovative web capabilities such as Goog411 or widgets on their mobile devices. Our company could design and put out for our customers a virtual roller coaster game online that models one of our rides in our park.

Sunday, October 23, 2011

5.3 B2E Electronic Commerce

We would use the intranet to access our own company's server to get a diagram or document we might need. An employee of mine would use their server to access the company's server by going through the firewall we have set up to ask for a password of some sort and they will request the information they need and have it sent back to their own computer.

5.2 B2B Electronic Commerce

The way our company would use the extranet to do business with another company is first work with an engineer firm to draw up blueprints for our roller coaster rides for our amusement park. We would access their server by requesting it through our firewall to try and get permission first. Go through the internet or VPN and then go through their Firewall to get permission or use a password on it to get access. Request the information we want on their server to send it back to us.

5.1 Critique Your Competitor’s E-Commerce Website

Rule 1: The Website Should Offer Something Unique. Rate: 4
Rule 2: The Website Should be aesthetically pleasing Rate: 2
Rule 3: The Website Must be easy to use and fast Rate: 4
Rule 4: The Website must motivate people to visit Rate: 5
Rule 5: You must advertise your presence on the web Rate: 3
Rule 6:You should learn from your website Rate: 5
     The web site i critiqued was Angel.com. I gave Angel.com a 4 on offering something unique because they give their users many ways to view their grades.  Next, i gave Angel.com a 2 on aesthetically pleasing because their site is kinda plain, not much color or pictures. I gave the site a 4 on easy to use because most people who uses it have seen their controls before so they are familiar with them. Next, i gave Angel.com a 3 on advertisement because they have little advertisement on Google and other search engines like Google. Last, i gave Angel.com a 5 on learn from your website because u can learn your grade on Angel.com and professors can see how well each student is doing in their class.

4.4 Entity Relationship Diagram

The four entities in my diagram are the customer, invoice, company, and the product. in the customer entity there are customer key, first name, last name, street, city, state, zip, and phone number.These all relate to the customer so they are the attributes to the customer. In invoice is connected to the three entities so it is the primary key in the relationship. The product as attributes as well and they are Product key, name, price, quantity and vendor. The Company would attributes as well such as, company name, company ID, and that would be connected to the invoice number of the product.