Wednesday, November 16, 2011

Blog Entry 7.1 - IS Security (Part B)

Sending a message
Mark decides to send the article about the murder of a person to Frank. Mark uses Frank's public key to encrypt the article. Frank receives the  article and then decodes the article so that it can be reviewed and sent to the printer.

Signing a message
Mark decides to send the article to Frank about a murder. Mark encrypts the code with his private key. Mark sends the message and his public key to Frank. Frank decodes the article with Mark's public key. Frank can then review the article and release it because he knows that it is Mark's work.

Blog Entry 7.1 - IS Security (Part A)

If the Ferrum Times is threatened by floods, power outages, or other unexpected issues we will back up our files using cloud computing, have a generator on hand, and have keyboards and screens lock after not being in use for 5min. If the Ferrum Times is threatened by employees or consultants stealing or putting viruses on the server for revenge to deal with these issues we will give a password to every employee that way we can keep an eye on which employee does what and also install anti-virus software on all our computers. If the Ferrum Times manages to get a virus on our computers that could delete all our stories for the day and past records we will install a firewall and anti-virus software. When the Ferrum Times sends messages about how much paper we are going to buy we will encrypt the data using public key technology. If we are attacked by hackers then they could steal information and also look at our clients private records in order to protect ourselves and clients we will use photo ID cards to make sure that they are employees and also install a proxy server which will be able to identify if the person is an employee by their password.

Blog Entry 6.1 – Web 2.0

1.      Utilizing the Web As a Platform
a.       Using the Internet to provide services to customers.
2.      Harnessing Collective Intelligence
a.       Allows for customers to tell the company how they are doing and what problems they are having.
3.      Leveraging Data
a.       Companies use data collected online to make decisions about products in the future.
4.      Implementing Innovative Web Capabilities
a.       Using technology to create a competitive edge
We will use the first pillar by making a website that allows customers to buy our newspaper online. For the second pillar we will install a topic blog on our website to check to see what our readers really want. The third pillar will be used by our company by way of rating the articles in the papers and allowing them to post reviews. We will allow our customers to download widgets for their computer and also for our employees they will have a calendar widget for their schedules. We feel by doing these things we will gain an advantage over our competition.