Friday, June 14, 2019

Potential Computer Application Essay Example | Topics and Well Written Essays - 750 words

Potential Computer Application - Essay ExampleAmazon.com, e-bay argon few of the notable sites that deal in such businesses and are world renowned (Dave, 2008). Many a times, it is being said that the threats arise at the end nodes however the threats are still equally potent all the same if they do not penetrate the clay across the medium. The e-commerce setup largely consists of three components, the server, the I.P section and the client section. Clients are usually the soft targets for the hackers. Security breaches sacrifice taken place in history of e-commerce in case of Yahoo and E-bay.com trading and have resulted in large amount of financial damages as well as loss of trust of guests. Code Red Warm, The NIMDA, are few of the threats and experienced by Microsoft in recent past where private selective information was at direct threat (Whitman & Mattord, 2007). Various other threats include vir intakes and Trojan horses. Denial of service (D.O.S) is a common term in the wor ld of e commerce and is another menace towards the smooth and reliable operations in the world of online businesses. The need is to install vendor patches in order to minimize the intrusion of denial of service intrusions. This along with providing the customers more warranter n form of protecting their SSN numbers, and most importantly enable encryption mechanism on the transactions performed by the customers (Marchany & Tront, 2002). Installation of firewalls can minimize the entry of undesired elements, and would limit the interaction to only authenticated customers and the parent companies. Encryption in shape of digital signatures and secret keys are small efforts that can make a large difference. Privacy issues about RFID have received extensive attention. Discuss how to protect privacy in electronic society. RFID, acronym for radio frequency identification technique, is largely in use nearly all business centers and malls as well as industries. Their use is not just limit ed to the commercial applications rather it is being used in military equipments as well. It has reduced the manual work and through the computerized entropy storing, has added large value to various components of the system. However, of late numbers of issues have popped up during its use. The issues come in various forms and they are believed to be able to trace the customer even after they have left the premises of the mall just because of the tag that is embalmed on the product (Dempsey, 2010) .Other issues concerning this technology include the compatibility in terms of universal proposition handling and the factor of various proprietary bodies that have created upgrade obstacles by restricting its use. With efforts in place for globalization of RFID based on unique numbers, it could further hamper the security factor since the standardization may lead to tracing of other important numbers like credit card and social security numbers. In terms of the supply chain and various industries, it is being believed that the RFID tags can enable getting the information about the internal components of the supply chain which is otherwise strongly held from other organizations and competitors. On the application front, the possibility of jamming of the particular frequency at which RFID operates, can result in halting of entire system which can be least afforded in the field of medical and military

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.