E-commerce and small Business

4. Write on the impact of IT to date on one of the sectors of the business world or community services, and describe what changes in technology and structure are reasonably likely to take place in the next 5-10 years, indicating the likely effect on customers and society. You may choose any business or community sector . E-commerce and small Business Every business considering a website for e-commerce purposes must develop an underlying strategy. This is critical. After all, just posting a website probably will not draw substantial traffic. The target audience needs to be educated about the existence of the site. Developing a strategy will force you to consider your approach towards the Internet and help set realistic goals. Without quantifiable goals it will be impossible to gauge whether your investment in e-commerce is successful or not. Many businesses attempt to enter the Internet and e-commerce with a huge splash. The result is over-engineered sites that are complex and cumbersome. If the website navigation is complicated or the pages load slowly, the potential customer is likely to become frustrated and abandon your site for happier surfing elsewhere. Therefore, maintain a customer focus and make the site simple. In addition, give the potential customer alternative choices in doing business with you. Some people like to do research on the web but would rather call

  • Word count: 1774
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Project proposal "Designing a simple Integrated Network for a Secondary School"

Designing a simple Integrated Network for a Secondary School Yayale Nabeel Ahmed MDX 08 Key words Internetworking, interoperability, email, database, servers, workstations, connectivity, Internet Problem definition Currently, up to 60 to 70 percent of schools in Nigeria are not computerised, so I have been authorized by a proprietor of a medium sized secondary school to setup an entirely new network from scratch for his school. The scale of the school currently is about 50 to 65 staffs and about 500 students who are dependent on the small number of computers. Because their computers are not networked, they both don't have the resources needed to keep pace and updated with technology, Internet based learning materials, communication between staffs and students. The only 11 computers the school have currently get access to the Internet using dial up connection, this as a result give them relatively slow connection and most of the time no connection. The administrative department include; the principals office, vice principal, finance office, admission office, reception. The faculty department composes of the staff room. The student department includes the physics lab, computer lab, chemistry lab and biology lab respectively. These entire departments don't have any option of sharing information but to move up and down from one room to another physically. With this, you

  • Word count: 1835
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This report will cover the aspects of applying the principles illustrated in Ciscos Gigabit Ethernet Campus Design whitepaper to the network in Middlesex University. There will also be discussions focusing upon the chosen WAN technology

This report will cover the aspects of applying the principles illustrated in 'Cisco's Gigabit Ethernet Campus Design' whitepaper to the network in Middlesex University. There will also be discussions focusing upon the chosen WAN technology that will be implemented within the design, features giving resilience, budgetary limit of the implementation of campus design, security features and the quality of service features for this design. Currently the university has a network consisting of many clients connected to a hub via coaxial cabling (shown below in fig.1). The hub acts as an interface connecting the clients with each other but can also have its disadvantages, as clients send data to the hub at the same time the CSMA/CD protocol is used, its used when a collision like this occurs to act as a defence and takes control of all incoming data for a period of time. The current architecture runs on a multilayer campus design using the generic campus design. Multilayer design bonds gigabit Ethernet trunks to the layer 2 switches located in the wiring closet and the layer 3 switches in the distribution layer. Fig1. example of how clients (PC's) are connected to a hub Gigabit campus switches offer users the chance to build an extremely high performance networks, high reliability and with the ability to make self-management implementations makes it easy to manage and maintain. A

  • Word count: 1214
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Why are governments so concerned about the use of cryptography in digital communications? What kind of laws and regulations have they brought in to try to deal with their concerns? How far do such efforts threaten the privacy that organisations need for conducting legitimate business?

Why are governments so concerned about the use of cryptography in digital communications? Cryptography is a discipline which embodies principles, means and methods for the transformation of data utilized to ensure the confidentiality of data, authenticate the data and to ensure its integrity1. Internet has resulted in data, business and communication being conducted on open networks which are more difficult to control and monitor than traditional channels. Despite its value in ensuring information and data security, many nations regard cryptography as a dual-use technology that can be applied for civil and military purposes, and therefore should be regulated. Governmental concerns particularly revolve around the reduced ability for intelligence and security agencies to perform effective surveillance of computers and electronic communication to uncover, prevent and prosecute illegal activities2. What kind of laws and regulations have they brought in to try to deal with their concerns? The Wassenaar agreement3 acts as the principal document on the encryption software export control regimes around the world. Its guidelines base restrictions on the key length of symmetric cryptographic products, and allow the free export of mass-market cryptographic software which complies with such provisions. OECD Guidelines for Cryptography Policy4 focus on trust, free choice and

  • Word count: 726
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Information Security System

Table of contents: . Introduction 2. Existing threats and risks 3. What a virus is and how to protect a computer 4. General controls 5. Application controls 6. Summary conclusion Introduction Information has no value in itself. Nowadays any company stores its information on its computers. Information is now considered so important that it is regarded as a factor of production, labour, enterprise and capital. Whether it is a revenue company or any other organisation it is necessary to keep a record of events in the company in order to maintain its operational activities. The main aim of this assignment is to increase the awareness of users in the area of information security in order to be able to secure our personal data better then before. In this assignment I'll try to investigate and analise the main objectives such as: > Why computerised systems are particularly important > The major risks and threats to computer security > How to deal with computer misuse, such as hacking and viruses > How to protect your computer from harmful program > How back up can be put in place for essential computer facilities Many organisations today are highly dependent on their Information Systems and must be mindful that all IT resources are not immediately replaceable in the event of damage or destruction. Replacing a mainframe computer, for example, could involve a lead

  • Word count: 3883
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Message confidentiality, Encrypt/Decrypt an arbitrary message using secret key cryptography including Base64 encoding.

Assignment of Network Security (NETSEC/IV2020) Dated: 20 December, 2009 Report topic: Message confidentiality, Encrypt/Decrypt an arbitrary message using secret key cryptography including Base64 encoding. Introduction Secret key cryptography is also known as Symmetric Encryption. Here same key is used for both the Encryption and Decryption processes [1]. In this approach, sender and receiver both should know the algorithm to use and the secret key. Sender and receiver should be kept the key secret and they should obtain the key in a secured way [2]. Most commonly used secret key cryptography algorithms are DES, 3DES, RC4 etc [1]. In this test DES has been used to encrypt/decrypt an arbitrary message. Here Base64 encoding has also been used to encode the message. We know that, while sending SMTP e-mails with attachments normal text files can be attached in plain text format, but binary files (such as image files) cannot be attached in the same way. Binary files need some sort of encoding process to be attached with STMP mail. And the most widely used encoding is Base64 [3]. Description of DES algorithm DES Encryption Process "DES has a very strong internal structure" [2]. The following figure presents an overview of the DES encryption process. Figure 1: DES Encryption process In DES encryption process 2 inputs are provided to the encryption function: a 64 bit plain

  • Word count: 740
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study.

RESEARCH REPORT ON: MANAGING NETWORK OPERATING SYSTEM IN THE ORGANIZATION A CASE OF NATURAL FOREST RESOURCES MANAGEMENT AND AGROFORESTRY CENTRE (NAFRAC), SHINYANGA. PREPARED BY: MARTIN, masanja (ADIT III 2007/2008) SUPERVISOR: KAVUTA, K. D A RESEARCH PROPOSAL SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF ADVANCED DIPLOMA IN INFORMATION TECHNOLOGY OF THE INSTITUTE OF ACCOUNTANCY ARUSHA. ABSTRACT This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study. It has been conducted for 16 weeks at effective from the 1st October, 2007 to end of January, 2008. A case study method was used because the study was at a single unit and it is less expensive compared to other methods such as survey. The findings are presented in relation to the research questions, while analysis of data presented in relation to the proposed methods which are both qualitative and quantitative, with figures and tables by using scientific packages for social science (SPSS) & Microsoft excel (Version 2003). Data was interpreted in relation to the objectives of the study. The researcher gave a conclusion in relation to research questions and data interpretation against objectives of the study, and finally the researcher provided some recommendations for any

  • Word count: 11449
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

individual project

A study of a smart card ID system in government Submitted in partial fulfilment Of the requirements for the degree BSc (Hons) Business Information Systems Leeds Metropolitan University May 2004 Acknowledgements I would like to acknowledge the contribution others have made during my time at university and especially during the final year of my course towards the construction and completion of the individual project. First of all I would like to thank Ms Linda Strickler my supervisor for whom has stuck by me through some difficult times and has provided me with all the support and guidance that I have needed. Without her generous support and desire to succeed I would have been lost within the project. Secondly I would like to thank Mr Steve Cockerill for his astounding support and understanding throughout some very hard times that I faced. Without his strength and belief in me I would have been in a very difficult situation. And lastly I would like to thank my friends and family for their unwavering support throughout my years at university. Thank You All Plagiarism Disclaimer I certify that all material in this dissertation which is not my own has been identified and properly attributed. Signed: ------------------------------------------------- Date: --------------------------------------------------- Abstract The purpose of this report is to outline the

  • Word count: 11205
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Purchase of hardware and software systems to operate the business(TM)s activities and perform accounting functions

Assignment for IIT, DF Sem 1&2 Scenario Your friend is in the process of setting up a company in order to start trading as a wholesaler and retailer of Chinese food through a shop premises, as well as providing high quality meals in a restaurant in Central London. Your friend realises that a major cost will be the purchase of hardware and software systems to operate the business's activities and perform accounting functions. He has no expertise in IT, and has come to you for expert advice. He has asked for a detailed description of the hardware and software required together with an estimate of costs, and is also very keen that all of your recommendations are justified in terms of cost/benefit and importance to the success of the business. Requirements Write a formal report to your friend, using word processing software, giving your recommendations. Your report should be supplemented by detailed descriptions and pricings of the equipment and software required written with a spreadsheet program. Your assignment can be produced with any software, but make sure that the files are compatible with MS Word and Excel. A copy of your actual document and spreadsheet files should accompany the final documentation. Limit: Report - 2000 words, spreadsheets - at least a page Maximum 70 marks, which will be awarded as follows: Introduction: 10 marks Discussion: 30 marks

  • Word count: 2231
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Advanced encryption Standars

ADVANCED ENCRYPTION STANDARD: HOW DOES IT WORK? Project Paper for Information Systems Audit and Control TABLE OF CONTENTS . Introduction 3 2. Cryptography 3 3. Algorithms 5 3.1. Asymmetric Key Algorithms 5 3.2. Symmetric Key Algorithms 5 3.3. Stream Chipers â€" Block Chipers 6 4. Data Encrypting Standard (DES) 6 5. Advanced Encryption Standard (AES) 7 5.1. How AES works 7 5.1.1. The State 8 5.1.2. Encryption Steps 9 5.1.2.1. SubBytes 10 5.1.2.2. ShiftRow 10 5.1.2.3. MixColumn 11 5.1.2.4. AddRoundKey 11 5.2. Strengths of AES 12 5.3. Attacks on AES 12 6. Summary 13 7. Bibliography 13 .Introduction Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network,

  • Word count: 3366
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay