Wednesday, November 16, 2011

7.1 IS Security Part B

For my company, Marval Land, to send another company we might be working with we would have our own public key and private key. For us to send them a message we would ask for their public to to encrypt our message and then send it to them. They use their private key to decrypt the message so they can read it. It is just the opposite if we have to sign a message to authenticate it. We will use our private key to decrypt and then send it to the reciever. The receiver uses our public key to encrypt and verify that it is us who signed it.

7.1 IS Security Part A

Our amusement park could be threatened by natural disasters such as hurricanes or mass floods. We can protect our company and our information by storing our backup information at a separate building away from our own building. Another threat that can happened to our company is an employee of ours sending other companies in the amusement park industry our ride designs and pretty much putting us out of business. A way we can stop that from happening is by giving access only to our top executives and limiting those who sees our blueprints. Links to outside business contacts is another form of threat to out company. Companies we could be doing business with can leak our plans out to the world before we even release them ourselves. To fix that problem we can just restrict the information we share with the other company and have a type of password on our files that we share where only we can get to all of our blueprints and plans. The last threat to our company is outside threats such as viruses. Viruses can infect our network and computer systems and completely destroy our systems and information. A  solution to viruses is to try and update our viruses protection software on our systems and learn about the new viruses out there so we can couther act them and stay one step ahead.

Sunday, November 6, 2011

6.1 Web 2.0

     The first Pillar of Web 2.0 is utilizing the Web as a Platform. This is peer-to-peer technology and an example of this this openSUSE operating systems.The way this relates to our company, the amusement park, is our company developing a operating system to allow people to comment on.  The second Pillar is Harnessing collective intelligence. An example of this would be reviewers on Amazon.com commenting on a product. This can relates to our company by the way we would set up our home page so that our customers, and anyone else for that matter, can rate our rides in our park. The third Pillar is Leveraging the data and this is a company such as Google knowing their customer's preferences. By knowing our customer's preferences we could design new rides or rides we have now to their likings. The fourth Pillar in Web 2.0 is Implementing innovative web capabilities such as Goog411 or widgets on their mobile devices. Our company could design and put out for our customers a virtual roller coaster game online that models one of our rides in our park.