CSC 101 Blog
Wednesday, November 17, 2010
Blog Entry 7.1 - IS Security
My compnay Web Design Inc. can be affected by all of the following threats. It can be affected by natural disasters because if i am updating the website and the power goes out i could lose alot of information. It can also be affected by outside intruders becuase if my passwords dont change daily hackers could figure it out easily. Also the website can be affected by viruses. If i do not run an anti-virus system daily viruses could hack into my hard drive and steal important documents as well as customers identitys. Our website also has links to other businesses and that leaves us at risk due to the electronic infromation sent back and forth could send viruses and such to our computers. Our employees can also cause problems if they try and access from home on a personal computer. The personal computer does not have all of the protection that we do on our main computer. We could get rid of these problems by putting up firewalls, encrypting our information being sent to other businesses and high risk documents, having deidicated employees, physical access restrictions, and audit-control software.
Tuesday, October 26, 2010
B2B Electronic Commerce
The Extranet System Architecture shown above shows the client or vendor sending information or data of a product to the supplier through the internet. The data goes through the vendors firewall through a VPN and then through the suppliers firewall to their server. This allows a business to send information to another business without any viruses or other hackers to invade on their information. It protects both parties and allows both businesses to work together electronically.
B2E Electronic Commerce
In this example of an Intranet system architecture the client connects to the server and sends information and data through a firewall. Then the information travels through the internet through a secure VPN or virtual private network to make sure the information is safe. The safe information is then sent to the client outside of the local network. This allows information to be sent from a business to a employee without it being tampered by outside sources.
Entity Relationship Diagram
The entity would be U.S cellular for this example. The data types are as follows. The attributes would be the the one of the customer's purchase information. The record would be one of the customer's purchase information like the actual total.The attribute types would be the quantity, description, unit price, and total. The whole invoice is a database table. All of this then forms the relationships between the client and the provider.
Packet Switching Technology
Computers A and B would be the servers that deliver messages and information through the router to the clients C and D. This is capable because of packet-switching technology which is the delivery of data and information across networks. Packet switching allows for a single channel to be used for multiple concurrent data transmissions. TP breaks the information into small chunks called data packages and manages the transfer of those packets from computer to computer. Every computer connected to the internet is given a unique address called an IP address. The data packets that conforms to this IP specification is called an IP datagram.
Basic Network
A basic network as shown above involves a server which allows access to files, printing, and communication to anyone on the network such as a client. Clients only request services. When the computer converts something into digital information it is called digitizing. After transformed into bits it can travel across the network if there is enough bandwidth. Thy wire that connects one computer to another computer is called a cable medium indicated by the black lines above. A wireless media may be used instead of a cable media. Both types are called transmission media. The computers have to follow a certain protocol to transmit and receive data.
IFS H/W Infrastructure
The picture shows the physical box which is the system unit. Inside of the computer is the CPU or microprocessor which is made of two parts the ALU which handles the mathematics while the control unit handles decoding and fetching instructions like the 8-bit ASCII binary code you see above. Input technologies are used to put information into the computer. Processing technologies transform the inputs into outputs. such as the transformation of binary code into usable language. Output technologies like the computer monitor show you what you see on the screen. The language that computers understand is called machine language which is binary code. In binary code The individual 1's and 0's that are shown above are bits. When 8 bits are put together it equals a byte.
Subscribe to:
Posts (Atom)