Wednesday, November 16, 2011

6.1 Web 2.0

In this chapter we learned how a company can utilize web 2.0 to help a company. The pillars of web 2.0 are: utilizing the web as a platform, harnessing collective intelligence, levering data, and implementing innovative web capabilities. Utilizing the web as the platform is to keep everyone on the same level. This encourages peer-to-peer technology which increases the sites down load speed this can be helpful to our company. Harnessing collective intelligence will give us the ability to understand our customers better and they will feel like part of the company in a way. Levering data is to get data on our customers by where they go on our site so we can more carefully cater our advertising g toward them. Also implementing innovative web technologies is how we will constantly monitor and upgrade our system. This will help us maintain our company profile.

7.1

In this Unit we discussed security features for computers. This diagram represents how encryption works. The first step in encrypting a message is that the sender creates a document to be sent to the receiver. The next step is the sender uses the receiver's public key to encrypt a message. The next step in the process is that the receiver uses his/her private key to decrypt the message. Lastly the receiver can read and/or print the decrypted message. All in all our company could use this system to send messages to each other with less threat of outside intrusion. (Part B)

(Part A): As a puppy daycare we have to be aware of possible threats to our security. One possible threat would be that we have a lot of dogs running around and one could possibly run over a open computer while its user was distracted and delete all our data. To solve this threat I suggest we implement a backup system somewhere that's not at the puppy daycare. Another threat that could happen to our computer system would be our employees increasing their salaries intentionally. We will solve this problem by having the employees limited on their user accounts. Another possible threat would be someone hacking their way into our system and stealing our customers credit card information. To solve this problem we will put up several firewalls and a auto detection system if some unknown source is hacking into our system. Another possible threat could be the possablity of viruses getting into our system. Another possible threat that could possibly concern us is the likely hood of a natural disaster. We should back it up on a off site server location.