Friday, November 18, 2011

The Paragraph Part of 7. 1

Sunshine Land will have to contact the designer of our rides, Architect Plus, to let them know what they want their next design to be.
Sending the message: They first have to decide to send the message to Architect Plus. Sunshine Land uses Architect Plus' public key to encrypt the message being sent. Then, the message is sent to Architect Plus. Architect Plus uses its own private key to decrypt the message. Finally, Architect Plus can read the message that was sent by us.
Signing the message: Sunshine Land decides to sign a document to be emailed to Architect Plus. Sunshine Land uses it's own private key to sign the message. The message is sent to Architect Plus. Then, Architect Plus uses our, Sunshine Land, public key to verify our signature. Finally, Architect Plus can now be certain that we signed the document.


Sunshine Land can be threatened by accidents and natural disasters like hurricanes, floods, fires, etc. Outside intruders could possibly put a virus in our system and potentially shut it down. Employees could unknowingly open up emails that contain viruses that, yet again, could potentially shut our system down. If Sunshine Land sends information through the internet to Architect Plus, for example, it could potentially be accessed by an unknowingly source. That source could use our personal information to hack into our system and mess up our system. We can safeguard our information by making outsiders and employees type in an ID number and a password to get into the system.

Friday, November 11, 2011

7.1 How Encryption Work


Our business would be be threatened by the 5 most common threats to information systems security. Because there could be a natural disaster. Where our business is based they have had earthquakes and hurricanes. Another threat would be out database admin. If with the them have access to our data at all times. Another threat would be if our employee is checking email and there is a virus in it. Last would be hackers, and crackers.To safeguard our information system from exposure to theses threats, we will move our servers, and place back up servers in different states. Next we will only allow our database admin a certain time to access the system. Then we will have certain sights blocked on the we. Last to prevent the hackers we will put in place a firewall.
Part B.
All encryption systems use a key, the code that scrambles and then decodes messages. When both sender and recipient use the same key, this is called a symmetric secret key system.
1.SunShine Land will send a layout document of our rollercoaster design and emails it to the architect plus company
2.SunShine Land will use the architect plus company public key to encrypt a message
3. Architect plus uses there private key to decrypt the message
4. Architect plus can read or print our decrypted message

Friday, November 4, 2011

6.1- Web 2.0

The Four Pillars are:
1.Utilize Web as Platform
2.Harness Collection Intelligence
3.Leveraging Data
4.Implement Innovations Web Tech

The amusement park company "Sunshine Land" we use all of the four pillars in the success of our business we use pillar #2 for each and every employee so that we know the days they want off and requested leave and be able to keep track of days missed and things of that nature. We also use pillar #1 as a platform to keep not just employees but all customers up to date with what we are doing with the company and all of our future plans and intentions. pillar #4 one of our major forms of pillar #4 is the use of widgets for weather and all a customer tracker. pillar #3 we use a sign up tool to ensure that each individual gets properly accounted for and gets customized systems data.