Preview

cis505 week 3 discussion

Satisfactory Essays
Open Document
Open Document
378 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cis505 week 3 discussion
HTTP and HTTPS. Please respond to the following:
Analyze the current uses of HTTP and HTTPS, and predict the future outlook for both protocols. Describe any foreseen changes in the frequency or way each protocol is used.

HTTPS are used by sites that handle money (Gilbertson,2011). HTTPS are also used to protect highly confidential online transactions like online banking and online shopping order forms. HTTP is used for transferring files from a web server into a browser windows to view a web page that is on internet. Future outlook for both protocols are emerging more protection and reliable web pages to pull information up on. To my knowledge no changes has been made with both protocols.

Identify the various uses for HTTP and HTTPS, and justify the use of one over the other. Include two examples to demonstrate the use of each protocol.

HTTPS is used for banking, credit card transactions and anything to do with securing information. HTTP is used for accessing HTML pages and web surfing. HTTPS is better than HTTP because HTTPS secure information and keeps all information private.

HTTPexample:An application program that establishes connection for the purpose of sending requests. A network data object or serve that can be identified by a URI (Stallings,2009).
HTTPSexample:PayPal(https://www.PayPal.com)&GoogleAdSense (https://www.Google.com/AdSense/

References:
Gilbertson, S. (2011). HTTPS is more secure, so why isn’t the Web using it? Retrieved from http://arstechnica.com/business/2011/03/https-is-more-secure-so-why-isnt-the-web-using-it/

Stallings, W. (2009). Business Data Communications. 6th Edition. Upper Saddle River, NJ: Prentice Hall.

Elastic and Inelastic. Please respond to the following:
Provide three examples of inelastic traffic not discussed in the text and validate their inclusion as inelastic.

Video Conferencing is inelastic traffic because its streaming isn 't one way. Stock trading is inelastic traffic because it requires real time



References: Stallings, W. (2009). Business Data Communications. 6th Edition. Upper Saddle River, NJ: Prentice Hall.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    - SSL and HTTPS will applied to online transactions. Enabling encrypted connection through user login to encrypted pages until sign out. (System/ Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As the CTO of a retail organization, the use of RFID technology will allow for better inventory management of stock. RFID allows better tracking of products from when it leave the warehouse until it arrives at the store. It keeps a detail log of its every movement along the way and can allow for grantee of available of stock. It can be used to keep costumers informed about something is available in the store as well as how many. By using the new technology my organization could gain a competitive advantage that others retailers do not have which will increase profit margin sine it would allow for better pricing and inventory management.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    CHAPIN, L. 1992. The Internet Standards Process [Online]. IEFT. Available: https://tools.ietf.org/html/rfc1310 [Accessed 10th April 2016].…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Chatp 8 Review Q's

    • 3439 Words
    • 14 Pages

    A Web server that handles e-mail coming in through the Internet must be compatible with the _____ Protocol.…

    • 3439 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    HTTP: Hypertext Transfer Protocol, The protocol used by web browsers and web servers to define the format of URLs (web addresses) and the messages used to exchange web objects.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    3. The process of HTTP asking TCP to send some data and make sure that it is received correctly is an example of what?…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    NET410 Week 1 iLab

    • 383 Words
    • 2 Pages

    2. (40 points) In college-level paragraph(s), describe how background traffic affects both e-mail data and VoIP data.…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    3. What is a protocol and why would one be used? Provide an example of a technological protocol or a society-based protocol.…

    • 544 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cis500 Week 2 Assignment

    • 1948 Words
    • 8 Pages

    Today, the world is experiencing significant technological revaluation at the main part of which is the information technology. There is a general belief that information technology eases and contributes to many aspects of our life (Nunn & Quinet, 2002). And new technologies has drastically changed our way of life to include attitudes, thoughts, perceptions and community at large. In particular, Information Technology has transformed our big world into a global village. Unlike the traditional means of law enforcement, in this case through street patrols, the adoption of Information Technology has brought a tremendous improvement to the law enforcement community and hugely impacted crime rate. In the past, random patrolling of the streets were carried out without proper organization with regards to insight, predictions of crime activities and the nature thereof. The use of IT in law enforcement centers around predictive policing which is the term used to describe “any policing strategy or tactic that develops and uses information and advanced analysis to inform forward-thinking crime prevention”. (Predictive Policing Symposium, 2010). Predictive policing focuses on some strategies which will be used in the remaining of this paper to address the comparison and cotrast of the use IT in policing versus random street patrols, how Inormation Systems have allowed police departments that implement tools such as COMPSTAT to respond to crime faster, and implementing the SWOT analysis on behalf of police departments that intend to implement predictive policing.…

    • 1948 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    Hackers now use protocols such as the Hypertext Transfer Protocol (HTTP) to send data or commands to attack computers, making it difficult to distinguish an attack from legitimate network traffic. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: Lesikar, R., Flatley, M., & Rentz K. (2008). Business Communications (11th ed.) Boston, MA: McGraw-Hill. Retrieved from www.phoenix.edu…

    • 974 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Q3- Identify the features of the Internet that make it unlikely to stop working from a single point of failure. Why do you think the internet has such as high degree of redundancy?…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In modern life people tend to use credit cards more than putting cash in their wallets. Also, cash is still used but not taken in big amounts that might cause insecurity. Both credit and debit card payments have been proven that they are safer and more convenient than cash payments, especially when it comes to the online purchases. In…

    • 375 Words
    • 2 Pages
    Satisfactory Essays