Wednesday, November 17, 2010

Blog Entry 7.1 - IS Security

My compnay Web Design Inc. can be affected by all of the following threats. It can be affected by natural disasters because if i am updating the website and the power goes out i could lose alot of information. It can also be affected by outside intruders becuase if my passwords dont change daily hackers could figure it out easily. Also the website can be affected by viruses. If i do not run an anti-virus system daily viruses could hack into my hard drive and steal important documents as well as customers identitys. Our website also has links to other businesses and that leaves us at risk due to the electronic infromation sent back and forth could send viruses and such to our computers. Our employees can also cause problems if they try and access from home on a personal computer. The personal computer does not have all of the protection that we do on our main computer. We could get rid of these problems by putting up firewalls, encrypting our information being sent to other businesses and high risk documents, having deidicated employees, physical access restrictions, and audit-control software.

Tuesday, October 26, 2010

B2B Electronic Commerce


      The Extranet System Architecture shown above shows the client or vendor sending information or data of a product to the supplier through the internet. The data goes through the vendors firewall through a VPN and then through the suppliers firewall to their server. This allows a business to send information to another business without any viruses or other hackers to invade on their information. It protects both parties and allows both businesses to work together electronically.

B2E Electronic Commerce



In this example of an Intranet system architecture the client connects to the server and sends information and data through a firewall. Then the information travels through the internet through a secure VPN or virtual private network to make sure the information is safe. The safe information is then sent to the client outside of the local network. This allows information to be sent from a business to a employee without it being tampered by outside sources.

Entity Relationship Diagram




The entity would be U.S cellular for this example. The data types are as follows. The attributes would be the the one of the customer's purchase information. The record would be one of the customer's purchase information like the actual total.The attribute types would be the quantity, description, unit price, and total. The whole invoice is a database table. All of this then forms the relationships between the client and the provider.

Packet Switching Technology



Computers A and B would be the servers that deliver messages and information through the router to the clients C and D. This is capable because of packet-switching technology which is the delivery of data and information across networks. Packet switching allows for a single channel to be used for multiple concurrent data transmissions. TP breaks the information into small chunks called data packages and manages the transfer of those packets from computer to computer. Every computer connected to the internet is given a unique address called an IP address. The data packets that conforms to this IP specification is called an IP datagram.

Basic Network


    A basic network as shown above involves a server which allows access to files, printing, and communication to anyone on the network such as a client. Clients only request services. When the computer converts something into digital information it is called digitizing. After transformed into bits it can travel across the network if there is enough bandwidth. Thy wire that connects one computer to another computer is called a cable medium indicated by the black lines above. A wireless media may be used instead of a cable media. Both types are called transmission media. The computers have to follow a certain protocol  to transmit and receive data.

IFS H/W Infrastructure


      

       The picture shows the physical box which is the system unit. Inside of the computer is the CPU or microprocessor which is made of two parts the ALU which handles the mathematics while the control unit handles decoding and fetching instructions like the 8-bit ASCII binary code you see above. Input technologies  are used to put information into the computer. Processing technologies transform the inputs into outputs. such as the transformation of binary code into usable language. Output technologies  like the computer monitor show you what you see on the screen. The language that computers understand is called machine language which is binary code. In binary code The individual 1's and 0's that are shown above are bits. When 8 bits are put together it equals a byte. 
  

Wednesday, October 13, 2010

Competitor's Website Critique

Web Design Library http://www.webdesign.org/

Rule 1: 5 out of 5 This website offers not only everything you need to design a website but most of it is free.

Rule 2: 4 out of 5 This website could be more colorful and maybe get rid of a little clutter to make it easier for people to find different aspects of design.

Rule 3:  1 out of 5 This website has a very slow load time and could be very hard to use for the first time web designer.

Rule 4: 5 out of 5 This website defiantly motivates people to come by advertising some free products to help design a website. Also it keeps them from leaving since it is a one stop shop for web design.

Rule 5: 3 out of 5 This website did not advertise on the gray top section of Bing.com but was the first regular site to be named.

Rule 6:  2 out of 5 I don't think that this website has learned anything from Alexa.com because it has a slow loading time and 96% of websites are faster which could be a major factor in future traffic. Also it is based in Australia but it the most popular in Pakistan. Maybe they could cater more to the them.

Monday, September 20, 2010

Building a Business Case

1.) FAITH- I, Michael believe that If we established a way for the customer to pay online the transaction could be processed quicker and it more readily available to the customer.

2.) FEAR- If we do not buy the supplies needed online or in bulk to design several web designs we could lose the web design contract to another company who could do it faster and easier for the customer.

3.) FACT- If we collaborated over the telephone or on a video conference each person could do their part and then meet up and collaborate to decrease time lost. This would make the company more money by being able to take on more clients due to faster processing.