Friday, November 18, 2011

The Paragraph Part of 7. 1

Sunshine Land will have to contact the designer of our rides, Architect Plus, to let them know what they want their next design to be.
Sending the message: They first have to decide to send the message to Architect Plus. Sunshine Land uses Architect Plus' public key to encrypt the message being sent. Then, the message is sent to Architect Plus. Architect Plus uses its own private key to decrypt the message. Finally, Architect Plus can read the message that was sent by us.
Signing the message: Sunshine Land decides to sign a document to be emailed to Architect Plus. Sunshine Land uses it's own private key to sign the message. The message is sent to Architect Plus. Then, Architect Plus uses our, Sunshine Land, public key to verify our signature. Finally, Architect Plus can now be certain that we signed the document.


Sunshine Land can be threatened by accidents and natural disasters like hurricanes, floods, fires, etc. Outside intruders could possibly put a virus in our system and potentially shut it down. Employees could unknowingly open up emails that contain viruses that, yet again, could potentially shut our system down. If Sunshine Land sends information through the internet to Architect Plus, for example, it could potentially be accessed by an unknowingly source. That source could use our personal information to hack into our system and mess up our system. We can safeguard our information by making outsiders and employees type in an ID number and a password to get into the system.

Friday, November 11, 2011

7.1 How Encryption Work


Our business would be be threatened by the 5 most common threats to information systems security. Because there could be a natural disaster. Where our business is based they have had earthquakes and hurricanes. Another threat would be out database admin. If with the them have access to our data at all times. Another threat would be if our employee is checking email and there is a virus in it. Last would be hackers, and crackers.To safeguard our information system from exposure to theses threats, we will move our servers, and place back up servers in different states. Next we will only allow our database admin a certain time to access the system. Then we will have certain sights blocked on the we. Last to prevent the hackers we will put in place a firewall.
Part B.
All encryption systems use a key, the code that scrambles and then decodes messages. When both sender and recipient use the same key, this is called a symmetric secret key system.
1.SunShine Land will send a layout document of our rollercoaster design and emails it to the architect plus company
2.SunShine Land will use the architect plus company public key to encrypt a message
3. Architect plus uses there private key to decrypt the message
4. Architect plus can read or print our decrypted message

Friday, November 4, 2011

6.1- Web 2.0

The Four Pillars are:
1.Utilize Web as Platform
2.Harness Collection Intelligence
3.Leveraging Data
4.Implement Innovations Web Tech

The amusement park company "Sunshine Land" we use all of the four pillars in the success of our business we use pillar #2 for each and every employee so that we know the days they want off and requested leave and be able to keep track of days missed and things of that nature. We also use pillar #1 as a platform to keep not just employees but all customers up to date with what we are doing with the company and all of our future plans and intentions. pillar #4 one of our major forms of pillar #4 is the use of widgets for weather and all a customer tracker. pillar #3 we use a sign up tool to ensure that each individual gets properly accounted for and gets customized systems data.

Sunday, October 23, 2011

5.3 B2E Electric Commerce


This intranet diagram shows how Sunshine Land, the client, can interact with their employees by setting up a place on their website that will pertain to their employees. They can put their schedules on the internet and the regular schedule of the actual amusement park.The information,server, will go through the firewall and then the VPN, to make sure the information is secure, and it will reach the employee that is outside of the local network.

5.2 B2B Electronic Commerce


In the extranet diagram, Sunshine Land, the client, will be sending information through the VPN to Costco, the server. The information that the client wants to send to the server over the internet will have to go through a firewall to make sure it doesn't contain any viruses. The extranet will allow Sunshine Land to do business with Costco through a secured network and give us an opportunity to do business swiftly and safely.

4.4 Entity Relationship Diagram


The three entities that we chose to show in the diagram are customer, invoice, and product. For the customer entity the attribute types that we chose to include for the different records are customer number, first and last name, the phone number, and their address (including street, zip code, city, state). For the invoice attribute types we chose to include invoice number, customer ID, product ID, date, subtotal, and total. For the product attribute types we chose to include product number, quantity, description, unit price, and total. When we gather enough information from our customers we will make database tables with these attribute types and fill in the records with attributes of those customers. The attributes will be of various data types and we will make relationships with them to connect the three entities.

Monday, October 10, 2011

5.1 Check Your Competition

Rule 1: Website should offer something unique

Rule 2: The website should be pleasing to the eye

Rule 3: Website must be easy to use and fast

Rule 4: Website must motivate people to visit

Rule 5: Must advertise presence on the web

Rule 6: You should learn from your website


The results from "Alexa.com" post data that says "KingsDominion" is 152,460 in Alexa traffic rank, it is 41,993 ranked in US and has a reputation 464.

Estimated percentage of global internet users who visit kingsdominion.com:

Reach Change
1 month 0.00074 -30% Change in  Reach over the trailing 1 month period
3 month 0.00104 -7% Change in  Reach over the trailing 3 month period

The competitor website we chose to compare to was Kings Dominion's website.

Rule 1:
- This website offers the same amount of services like any other amusement park website. There are tabs to click to receive online specials, see new attractions, and there is a tab on the website to purchase your tickets online!

Rule 2:
- When customers go on Kings Dominion's website they see the bright colors and huge letters to describe what their park contains. Also, there is a slide show of pictures describing the new attractions and specials.

Rule 3:
- I think the website is easy to use because it is very organized.

Rule 4:
- Personally, I think this website motivates people other than the online prices of the tickets because they are usually cheaper online. Other than the ticket prices, the customers see what new attractions are at the park when they are on the homepage of the website.

Rule 5:
- When you search for amusement parks on Google, Kings Dominion is an organic link. It doesn't appear on the side of the screen with the other adds where Busch Gardens is. I think they need to advertise their website more so people will notice it.

Rule 6:
- On Alexa.com, this website's traffic rate is 152,460 which is really good. But the time on the site was around last month for only a couple of minutes, which isn't really good compared to other websties.