Discuss security issues in e-commerce.

Transfer-Encoding: chunked Firewall can block Trojans. These can latch onto your computer files, then when you send a file they go with the file and makes more damage where it is received. They are very dangerous as they transmit what they undercover about you on a web server. A firewall blocks them from the outset, before they have a chance to infect your computer. They are used mainly to prevent hacking. Without firewall security, a hacker could get a hold of your computer and make it a part of what’s called a botnet, which is a large group of computers used to conduct illicit activity, such as spreading viruses. A firewall prevents such peeping-tom intrusions. Having firewall security will reduce the risk of key loggers monitoring you. A key logger is spyware software that cybercriminals try to put on your computer so they can target your keystrokes. After they can identify what you're typing in and where, they can use that information to do the same thing. This knowledge can help them log in to your private online accounts. Firewalls are central points of attack. Firewalls are designed to prevent unauthorized network intrusions; however, if an intruder or malware slips through the system, your computer becomes vulnerable to additional system attacks. Once installed, malware can actually disable the firewall and processes used to run it, which is especially easy

  • Word count: 1508
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Explain why modular elements are important for procedural programming

Transfer-Encoding: chunked Explain why modular elements are important for procedural programming I am working as a junior for an electronic games maker. My manager has asked me to write a short guide to the basics of procedural programming and to demonstrate some of the techniques. I will explain why modular elements are important for procedural programming. Modular programming is a software design technique that highlights separating the functionality of a program into independent, interchangeable modules, that each contain everything necessary to execute only one aspect of the desired functions. There are different elements of procedural programming. It’s a programming design style in which a program is split up into small chunks that complete each part of the task. Example: Procedural programs give the computer a series of instructions for example for a calculator program. Then carry out the task and calculations according to what the user specifies. Modular Design breaks down complex procedures into simple steps which can be turned into computer code much more easily. You can fit modules together very well so the interfaces are very important. For example, what data is passed into modules (parameters) and what data is passed out (return values). There are many advantages to modular programming. Firstly, modular programming is good because you can work on each

  • Word count: 695
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Types of E-commerce

Transfer-Encoding: chunked Types of E-commerce E-tailers An e-tailer is a business that sources products from other suppliers and sells them in their own store online; they only sell through e-commerce and would not survive without the internet. E-tailers are a great way to be competitive as they do not need storage to hold their items which means they do not have to have overheads for shop space, electric and water or staff. This means they can set lower prices and attract more customers gaining more profit. An example of an E-tailer is Amazon. This is because Amazon sell products from different suppliers but do not sell their own brand of products. Manufacturers Manufacturers create and sell their own products online. They do not allow other retailers to sell their products nor sell in traditional shops. They can provide lower costs or special offers to customers because they do not need to pay for retail rentals and overhead for a traditional shop. Dell is an example of a manufacturer because they make the computers and dell them online, not through shops like PC World. Existing Retailers Existing retailers are businesses who were originally a traditional shop (bricks) but have now expanded to e-commerce and now sell their products online. This means they work in both sectors and get all the benefits of being online and also being on the high street. Although

  • Word count: 505
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Recommend methods to promote an e-commerce system for a local business.

Transfer-Encoding: chunked Sharron Walker, a local cake maker, is thinking to move into e-commerce. I have created a table setting out the pros and cons of each potential method of promotion listed below. Search Engines - The site may be displayed on the front page of a search engine which promotes their website and gains them customers and makes the site better known. It is also cost effective. However, other sites can match a meta-tag and make theirs match the business so their site comes up more often. It takes time for websites to be noticed and recognised by customers as a good trustworthy site. I recommend Sharron to have specific mata-tags in order to get noticed on search engines. This means that when people search up something similar to Sharron’s store like ‘Lipstick’ her website will show as one of the first. This will mean that more customers will come to her website. Newsgroups and Forums - Newsgroups and forums are easy to find and they can have a moderator which makes sure all the information is relevant and doesn’t contain any inappropriate language. You will be able to find a frequently asked questions on a newsgroup, which is helpful for those who are not sure of anything. It is not a quick as some other methods like direct marketing. Information submitted may be submitted by people who do not know what they are talking about. I recommend that

  • Word count: 995
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Explain the potential risks to an organisation of committing to an e-commerce system

Transfer-Encoding: chunked I am working for a firm of e-commerce consultants. I have been asked to write a report to a start-up businesses explaining the potential risks to an organisation of committing to an e-commerce system. Any business that operates online is at risk of many internet threats so it’s important that there is sufficient security to prevent any malicious harm to the business. One the main problem that happens is identity theft. This can make customers the victims of serious fraud and damage caused by viruses can close businesses down. It’s Important that businesses show that they are safe for their customers so they will want to continue using the site. Hacking is a major problem within e-commerce. Hacking is when somebody gains unauthorised access to data in a system or computer. E-commerce businesses need to prevent hacking from occurring so that the day to day running of the businesses isn’t disturbed and to make sure customer details are not stolen and used for fraud. To prevent hacking from occurring, specialist software can be used to look at the ports of the computer and to identify what ones are open as this is the way hackers can enter. Therefore the best way to stop hacking is to make sure all unused ports are closed by a firewall. A firewall is a network security system that acts as a barrier to protect the system from unauthorised

  • Word count: 827
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Explain the postives of introducing an e-commerce system to an organisation

Transfer-Encoding: chunked Amazon sell worldwide which means they can sell products to more people and have an advantage over companies that do not sell across the world. This means that customers have the chance to purchase products from all over the world in the comfort of their homes. E-commerce makes this possible as the store can be accessed anywhere in the world with internet access. This beats traditional stores because only the people who are in the area of the store can go in and buy products, not everyone in the world like e-commerce can do. Amazon allow 27/7 trading which means that a customer can log on whenever they wish and buy products. Customers are more likely to do this as it’s easier and more convenient for them. Trading can be carried out day or night and unlike some businesses, there is no closing time. Because websites can be automated, there doesn’t need to be any staff like there is in highstreets stores. This also means more customers can shop when it’s convenient for them. Amazon would have been easy to set up because they don’t need premises, electric, water and other essential things when opening up a traditional store but only need a website and things that need to maintain the site. Relatively low start-up and running costs means it’s easy for people to start their own business. For a traditional store, you will need to buy

  • Word count: 1032
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Describe the potential prompts that initiate the installation of new or upgraded software

Transfer-Encoding: chunked For P1, learners might provide a report or presentation, possibly based on a case study. To be able to describe the potential prompts that initiate the installation of new or upgraded software. I have recently been hired as an IT consultant by a small charity that wishes to advertise itself with a website and take donations. They have asked me to look at their current computer systems and advise on any new software installations or upgrades that may have been necessary. In this report I will describe the potential prompts that initiate the installation of new or upgraded software. There are many different reasons for why you would want to prompt an install or upgrade software. Perhaps it was because a bug was identified or upgrading would make the device run faster and more efficiently. It’s important to be aware of the prompts so that you can act on them quickly as they could be vital such as the security of the device. The first reason for upgrading or installation of software is problems with the existing system. It could be that the software keeps crashing or is no longer supported by the manufacturing and therefore will not receive updates for it. There also could be security issues that the software is running which makes it at risk of malicious attacks. And you could even find that the software is incompatible with the new operating

  • Word count: 505
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Explain the user side and server side factors that influence the performance of a website

Transfer-Encoding: chunked I am working for a local web development company and I have been asked to help design and develop Alumwell B&E College’s (ABEC) website. Throughout this project I will meet with my project manager to clarify the website requirements in more detail and report my progress. In addition to the design and creation of the website I will look at the security, legal and performance issues involved with web development. I will compose a report which focuses on the user and server side factors that influence website performance. User Side Factors Download speed Download speed is the speed that data or a program can be transferred from a central computer or website to a peripheral computer. The internet speed of a user’s internet connection determines how fast you can browse within the internet, how fast pages, pictures or videos load. There are four types of different internet connections including, dial-up, ISDN, DSL and Broadband. Dial-up is a connection that is inexpensive but slow. It uses a modem connected to a PC, users can then connect to the internet when the computer dials a phone number and connects to the internet. The modem converts received data to digital and vice versa. Because dial-up uses telephone lines the quality of the connection is not reliable and data rates are limited. A dial-up has an average speed from 2400bps to

  • Word count: 1308
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Explain the security risks and protection mechanisms involved in website performance.

Transfer-Encoding: chunked Hacking is when somebody gains unauthorised access to data in a system or computer. A hacker will break codes and passwords to get into the computer system which can cause a lot of damage to the system. Unfortunately, even with firewalls preventing hacking it still has occurred to many popular websites including Facebook, Microsoft and Twitter. Twitters systems were hacked early February 2013. The hackers were able to gain access to over 250,000 user accounts including their usernames together with their encrypted and randomised passwords. Phishing is when somebody tries to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organisation but contains a link to a fake website that replicates the real one where information is stolen. Many banks are the target of phishing. Banks such as Santander, HSBC and NatWest. Customers of their banks will receive an email claiming to be from their bank saying there is a problem and they need personal private information in order to fix it like bank account details and pin numbers; if successful they can steal lots of money from people’s accounts. Identity theft is a fraudulent practice of using somebody else’s name and personal information in order to obtain credit. Hypertext Transfer protocol is the data transfer

  • Word count: 777
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Plan an installation and an upgrade of security software.

Transfer-Encoding: chunked The small charity has accepted my proposal of upgrading their anti-virus to a fully integrated Internet security suite. They currently have five computers, all of which require the software upgrade. They have asked me to create a comprehensive plan showing the procedures I will be following when upgrading the software. First, I will plan everything ahead of the installation of the software so everything works how I want it to work. To start, I will make a defined sequence of activities to follow in order to ensure the installation is completed successfully. I will check that the system meets the requirements for the software and decide if I will install a fresh copy or install over the previous software. Also I will ensure that the installation method is suitable. For example if the files are stored on a DVD, I will need to have accesses to a DVD slot and to make sure the hardware is compatible to that format. I will also need to select the most appropriate location for the application to be installed as this could be the main hard drive or an external one. Lastly, I will define a suitable procedure for the installation. This will involve checking contents, performing virus scans, backing up data or configuring the software. Also I will consider timing. Installations or upgrades perform at different rates depending on the time that I complete

  • Word count: 766
  • Level: AS and A Level
  • Subject: ICT
Access this essay