Wednesday, November 16, 2011

Blog Entry 7.1 - IS Security (Part B)

Sending a message
Mark decides to send the article about the murder of a person to Frank. Mark uses Frank's public key to encrypt the article. Frank receives the  article and then decodes the article so that it can be reviewed and sent to the printer.

Signing a message
Mark decides to send the article to Frank about a murder. Mark encrypts the code with his private key. Mark sends the message and his public key to Frank. Frank decodes the article with Mark's public key. Frank can then review the article and release it because he knows that it is Mark's work.

Blog Entry 7.1 - IS Security (Part A)

If the Ferrum Times is threatened by floods, power outages, or other unexpected issues we will back up our files using cloud computing, have a generator on hand, and have keyboards and screens lock after not being in use for 5min. If the Ferrum Times is threatened by employees or consultants stealing or putting viruses on the server for revenge to deal with these issues we will give a password to every employee that way we can keep an eye on which employee does what and also install anti-virus software on all our computers. If the Ferrum Times manages to get a virus on our computers that could delete all our stories for the day and past records we will install a firewall and anti-virus software. When the Ferrum Times sends messages about how much paper we are going to buy we will encrypt the data using public key technology. If we are attacked by hackers then they could steal information and also look at our clients private records in order to protect ourselves and clients we will use photo ID cards to make sure that they are employees and also install a proxy server which will be able to identify if the person is an employee by their password.

Blog Entry 6.1 – Web 2.0

1.      Utilizing the Web As a Platform
a.       Using the Internet to provide services to customers.
2.      Harnessing Collective Intelligence
a.       Allows for customers to tell the company how they are doing and what problems they are having.
3.      Leveraging Data
a.       Companies use data collected online to make decisions about products in the future.
4.      Implementing Innovative Web Capabilities
a.       Using technology to create a competitive edge
We will use the first pillar by making a website that allows customers to buy our newspaper online. For the second pillar we will install a topic blog on our website to check to see what our readers really want. The third pillar will be used by our company by way of rating the articles in the papers and allowing them to post reviews. We will allow our customers to download widgets for their computer and also for our employees they will have a calendar widget for their schedules. We feel by doing these things we will gain an advantage over our competition.

Monday, October 24, 2011

5.1 Critique Your Competitor’s E-Commerce Website

Web Site: washingtonpost.com


Rule 1: The Website should offer something unique   Rating: 4.5
I gave washingtonpost.com this rating because it offers more than news it also offers move listing, comics, and clips from sport games. According to alexa.com washingtonpost.com is ranked 325 globally.

Rule 2: The Website should be aesthetically pleasing   Rating: 4.5
I gave washingtonpost.com this rating because it has a lot of movement and people could get distracted and just find another news oriented site to check the news. Also a lot of the articles are bunched together making it hard to click on the one the person wants.

Rule 3: The Website must be easy to use and fast    Rating: 5
I gave washingtonpost.com this rating because if a user uses the tabs at the top of the page or types in a subject they will be able to find articles on that subject.

Rule 4: The Website must motivate people to visit   Rating: 4
I gave washingtonpost.com this rating because even though it has news that might interest some people the way the web site is presented it was not motivating people to stay on the site.

Rule 5: You must advertise your presence on the web  Rating: 4.5
This web site advertises sports and other businesses. I would have given it a 5 if they advertised the newspaper a little bit more.

Rule 6: You should learn from your website      Rating: 5
The user learns about the different events that are happening around the world. According to alexa.com this web site is ranked 325 globally and 72 in the US.

Sunday, October 23, 2011

5.3-B2E Electronic Commerce

In the following diagram an employee is requesting information from the Ferrum Times server which makes the employee a client. The employee is using the internet to connect over a VPN to our firewall. After the client connects to the server they will be able to access their files from where ever they are. This diagram is an example of intranet because it is used by an employee to gain access to private files using a password that the company gives them.

5.2-B2B Electronic Commerce

Ferrum Times will use an extranet to do business with Dunder Mifflin. In the following extranet diagram both networks are connected over the internet using a VPN. We would be considered the client because we are requesting information from the Dunder Mifflin server. Both have a firewall to protect information from unauthorized people.

Saturday, October 15, 2011

4.4 Entity Relationship Diagram

The following picture is an example of an entity relationship diagram or ERD for short. In the ERD the entities are the invoice, company, customer, and product in the tables listed. Each of these entities are divided attributes which are stored in the columns a database table and records which are stored in the row of the database table. At the top of each row in the database table are the attribute types that are used to help identify the information about the entity. Data types are used to organize and sort data for attributes. Data types usually contain text, numbers, or dates. This diagram is used to show the relationship between the entities.