Preview

IS3445 Project part 1

Satisfactory Essays
Open Document
Open Document
317 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3445 Project part 1
Identify e-business and e-commerce web applications to support the proposed implementation
First off e-commerce is one of the best things for business whether you have your whole business through the web or partly. If you have a physical store, you are limited by the area that you can sell your product or offer service. An ecommerce website opens your business to the world. In addition to these two drivers,online retail is also driven by traffic from search engines. One of the most important positives of ecommerce is the lowered cost. A part of these lowered costs could be passed on to customers in the form of discounted prices. Advertising and marketing is global and you get a better buying market. For personnel use the automation of checkout, billing, payments, inventory management, and other operational processes, lowers the number of employees required to run an ecommerce setup. last but not least Real estate, the store does not need a prominent physical location. you can Locate the Product Quicker, eliminate travel time and cost, provide comparison shopping, also cross reference deals, bargains, coupons, and group buying.if you do open a e-business vulnerabilities that need to be taken into account if you decide to create an e-commerce site is security internal and external. Hackers attempting to steal customer information or disrupt the site or server containing customer information that is stolen. Also Imposters can mirror your ecommerce site to steal customer's money. authorized administrators/users of an ecommerce website downloading hidden active content need to watch the attacks on ecommerce system. Scans should be frequently done on your server. this will help identify any malicious programs that may be running worms, viruses or Trojan horses. Limited user access will ensure that you know exactly who has access to your ecommerce system and assign each user with unique access authentication method.
IS3445 Project Part 1

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    E-Commerce would allow clients to schedule their appointment. Would allow an opportunity to pay for services rendered on line. It would allow the business to grow in cliental revenues, and marketing products. The online marketing would increase exposure to large businesses and more clients.…

    • 1103 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    Integrated Distributors Incorporated is facing a lot of challenges. The IT infrastructure has a lot of outdated hardware and software in multiple locations. This greatly increases security risks and exposes confidentiality, integrity, and availability. Some network compromises have ensued due to the outdated hardware and software. Sensitive and strategic information has been leaked to the public and it is time we put an end to this.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I was able to review the duplicate KG’s and resolve them. There were several different issues that cause the duplication.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    First World Bank Savings and Loan's Linux-based infrastructure requires an in-house custom kernel or a kernel provided by a vendor…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The main topic for this article is to determine and seek out the benefits of developing an e-commerce business in a small underdeveloped country that has the potential to grow. Developing countries are home to more than 80% of the world’s population, and are the site for growing use of e-commerce. (Molla & Heeks, 2007). There are quite a few questions that can be asked about this subject, but the main topic question is “Would it be beneficial attempting to create and implement an e-commerce business in a developing country such as South Africa?” In the research and analysis portion of the article there are four questions which stem from the benefits of e-commerce, they are: “Has the use of e-commerce enabled firms in developing countries to improve their market efficiency”, the second which relates to this subject is: “Has the use of e-commerce enabled firms in developing countries to achieve operational efficiency?”, the third question is: “Has the use of e-commerce enabled firms in developing countries to improve their market access?”, and the fourth and final question that is asked is: “Has the use of e-commerce enabled firms in developing countries to improve their competitiveness?”…

    • 924 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    When comparing traditional business to e-business, one can see several differences between the two. The most obvious difference when buying standard goods such as a computer or Clothes is the store. When dealing with e-business there is no "real" store or merchandise to look at. It is all presented through the merchant's webpage, or by other electronic means. You will not be able to touch, or feel potential purchases. All you will have to go on is perhaps a picture and a brief description of the item on your computer screen. This is obviously a big change from traditional store where you can walk in physically touch what you plan to purchase.…

    • 1708 Words
    • 7 Pages
    Powerful Essays