Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Computer Science, Research Paper Example

Pages: 5

Words: 1492

Research Paper

Part1

Firewalls are specific software programs that are used to protect the database of a server that contains personal information of a particular contingency. These programs are designed to protect or secure a network. The program aims to identify whether a specific information packet should be allowed to enter into the network or not. Noting that Bibliofind is specifically opened to the public and an access into their contact page could immediately trigger email-sending to the main server of the organization, it was rather easy for their entire system to be accessed by outside intruders especially those who have an idea about system hacking [which actually happened later on].

This specific incident could have been prevented if a firewall software has been installed into the system. With the amount of information that is contained within the primary server of the organization, it was rather important that everything is properly protected as well as kept from foreign intruders as much as possible. Layering the sectors of the server as to who could be given access to the said divisions could have created a specific structure of system architecture that would make it easier for the operation to automatically command whether or not a visitor is to be allowed to manipulate a certain section. Utilizing the network layer or packet filters could have been an effective form of firewall operation that could have protected the organization’s server from the intruders. It operates on low level TCP/IP protocol that does not allow packets to easily pass through the system unless they match a created set of default rule. This would have protected the server since the hacker’s id or particular entry form as used would not match that of the default system unless he does have a direct connection and if he does know the inside data for the website.

  1. Encryption is the process by which the data recorded in a server is protected even in the process of transit. The transfer of data is handled through an algorithm that cannot be readable to everyone else unless the one accessing information has the right id pass or the right key to open the file as needed. The result of this approach is called as the ciphertext. Decrypting such data may not be easy especially if the right key is not known by the one trying to open it. Because of the openness of the internet when it comes to sharing and passing on information through data transit, the protection of information seems quite impossible to establish. Nevertheless, through the system of proper encryption, protecting data at rest [or the ones that are not utilized at the moment] becomes possible. Notably, encrypting the layers of information presented through the website and providing specific protocols that could only be opened through a released key system would have actually created a more viable source of protection for Bibliofind as they serve the public. This would have created a sense of indication on which specific information would only be accessible to particular visitors who aim to access the site’s different sections as defined through created protocol rules.
  2. Creating a legislated rule against the private information of customers stored in data servers specifically imposed a sense of protection for the clients as a whole. Nevertheless, this directed for a more defined rule among company owners as they establish their option of development that would actually push them to make conditions that would protect the customers’ information fully. Different programs and software applications could be utilized by organizations as they aim for this particular condition to be established in line with the integrity of their website in serving the needs of their clients online and creating a feel of security for them as their information are kept in storage offline.

On the other hand, the clients may be motivated to be more crucial as well as critical in asking the organization handling online transactions for more assurance that their information is kept properly hence allowing them to gauge the integrity of the organization as a whole. This puts more pressure on the organization and gives more liberalized condition for the clients to question the capacity of the company that operates particular website-based transactions online. While the pressure might be helpful in improving services that are released by the organization, it might also cause for the company to lose sight on giving high importance to the quality of their service towards assuring the established security of the clients’ information kept in the servers. Balancing the attention placed upon the different matters of the organization’s operations, which includes establishing a secure line of service for the clients, is an aspect that should be considered to be able to respond to this particular dilemma.

Relatively, this legislation poses a specific source of advantage and disadvantage for both the clients and the website operators. Nevertheless, its implication aims to improve overall internet-based business transactions that are sure to provide exceptional satisfaction for both sides of the situation hence increasing internet-based loyalty of clients who are now becoming open to engaging in online business transactions.

Part 2

Electronic wallet or digital wallet is a form of program that allows online clients to engage in online transactions in a quick and secure manner. Like a physical wallet, this form of monetary keeper online allows users to receive, store and release an amount of money during transactions as they engage with sellers and buyers online. Digital wallets, having software and information sectors have a specifically encrypted system that immediately protects information that is stored in the system that connects it online to the worldwide web. Easily accessible and easily navigated, the users of the said program are noted for their capability to control the activities they encounter in relation to the transactions they handle through the said program. The critical side of the system however lies on the capacity of organizations offering database-founded operations are able to provide client-defined protection that improves customer trust and confidence on the overall service that the system provides.

The cash kept in the system is called e-cash. However, the e-cash system’s life was rather short lived. As of now, the emergence of cash services online has evolved into storing online shopping information that allows users to incur easier conditions of transacting through the internet. The digital wallet now becomes a securely protected money-keeping service that improves online business transactions that are almost cashless as the exchange of monetary amount transfer occurs virtually. With the emergence of mobile phone industry and the creation of more improved programs embedded within the said gadgets, service providers of digital wallet account creations are now slowly popularizing utilizing digital wallets through carry-on gadgets. Through the use of the Near Field Communication or the NFC, several transactions are now being undertaken through the use of phones and other gadgets that are easily accessed by users.

Part 3

Direct Client-Relation and Communication

An online business transaction is noted for its being open to the general public. The internet is a wide area of location that is open to anyone who decides to access several websites online. This is the reason why businesses that are assertive enough to operate online find the internet as a form of an open market. Realizing that different types of people with different types of interest are utilizing online connections for several reasons, the internet offers businesses a huge source of an “ocean of prospected clients” who would likely want to accept what they have to offer. Nevertheless, the success that a business would get from operating online largely depend on how much the said organization would like to open its doors to new ways of developing their organization from a traditional system towards a more e-commerce dependent set-up of operations. This would include both management and marketing options that they embrace.

Cost-Effective Management

Given that there would be lesser concern for physical establishment rentals, the cost of operations become lesser in the case of operating through an e-commerce setup. The amount of money dedicated for city services and other utility maintenance options could now be disregarded. Channeling this amount of budget to other options of operation such as marketing and website management would create more profit for the organization as whole. Marketing options online are often cost-effective. If higher level of popularity is desired by the organization then perhaps a higher-cost of marketing option could be taken. This often involves enrolling in Google-ad programs, search-engine boosters and other programs alike. This however does not completely assure high range of online popularity.

Accurate/on-time Transactions

Everything happens in a real-time condition. This is the truth behind the option of operating business online. Organizations that are specifically taking the option of making a relative name in the field of internet-based commercial operations know that they would be able to get the attention of clients in an easier manner. If this option is utilized effectively then it could be expected that higher turn of accountable profit could be earned accordingly.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Oracle Corp Reported Decline in Financial Performance and Its Market Share, Research Paper Example

This report aims to examine the financial performance of the oracle and its impact on share prices. Oracle is a technology firm that supplies software [...]

Pages: 7

Words: 1790

Research Paper

A Community Response to HIV/AIDS in Nigeria, Research Paper Example

The article NELA: A Community Response to HIV/AIDS in Nigeria discusses how NELA collaborates with various organizations in the fight against HIV/AIDS. They attempt to [...]

Pages: 11

Words: 3085

Research Paper

Efficient Exercise for Weight Loss, Research Paper Example

Exercise is a great way to lose weight and improve physical fitness. Finding the right exercise program can be challenging due to the numerous options [...]

Pages: 4

Words: 1040

Research Paper

Cons of Human Cloning for Reproductive Cloning, Research Paper Example

Cloning has been found to have many potential benefits from a reproductive perspective. While the advantages are numerous, it is also important to take into [...]

Pages: 1

Words: 361

Research Paper

The Expositor’s Bible Commentary, Research Paper Example

Introduction The purpose of this analysis is to provide a deeper understanding of 2 Timothy 3:10-17, which intends to demonstrate that it is important for [...]

Pages: 10

Words: 2802

Research Paper

Just Because It Has Wings Does Not Mean It’s an Angel, Research Paper Example

Experienced writers who use allegoric literary devices often leave the readers wanting to know the real meanings behind the metaphoric examples. Set during an undefined [...]

Pages: 11

Words: 3140

Research Paper

Oracle Corp Reported Decline in Financial Performance and Its Market Share, Research Paper Example

This report aims to examine the financial performance of the oracle and its impact on share prices. Oracle is a technology firm that supplies software [...]

Pages: 7

Words: 1790

Research Paper

A Community Response to HIV/AIDS in Nigeria, Research Paper Example

The article NELA: A Community Response to HIV/AIDS in Nigeria discusses how NELA collaborates with various organizations in the fight against HIV/AIDS. They attempt to [...]

Pages: 11

Words: 3085

Research Paper

Efficient Exercise for Weight Loss, Research Paper Example

Exercise is a great way to lose weight and improve physical fitness. Finding the right exercise program can be challenging due to the numerous options [...]

Pages: 4

Words: 1040

Research Paper

Cons of Human Cloning for Reproductive Cloning, Research Paper Example

Cloning has been found to have many potential benefits from a reproductive perspective. While the advantages are numerous, it is also important to take into [...]

Pages: 1

Words: 361

Research Paper

The Expositor’s Bible Commentary, Research Paper Example

Introduction The purpose of this analysis is to provide a deeper understanding of 2 Timothy 3:10-17, which intends to demonstrate that it is important for [...]

Pages: 10

Words: 2802

Research Paper

Just Because It Has Wings Does Not Mean It’s an Angel, Research Paper Example

Experienced writers who use allegoric literary devices often leave the readers wanting to know the real meanings behind the metaphoric examples. Set during an undefined [...]

Pages: 11

Words: 3140

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!