Wednesday, November 30, 2011

(7.1) Information System Security

The five most common threats to ISS are accidents/natural disasters, employees and consultants, links to outside business contacts, outsiders (i.e. hackers), and viruses/worms.In order to safeguard against these threats, Gaming Evolution would first protect against consultants and employees by placing access restrictions on what employees and consultants can and cannot do. They would require a password and username in order to gain access to our database in order to make sure they are not a hacker or some other sort of outsider trying to gain access to our companies system. We would also implement firewalls, wireless LAN controls, and VPN's to project against viruses, worms, and malware. In order to authenticate a user, Gaming Evolution would use biometrics, such as body weight, fingerprints, and retinal patterns along wtih passwords, ID cards, and combinations and if deemed necessary, security questions.

The use of encryption would also be used by Gaming Evolution as a safeguard for the site aswell as B2B interations.

To send an encrypted message, the sender would decide to create a message to send to the receiver. First you use the receivers public key to encrypt the message. Once the message is encrypted the message is sent. When the receiver receives the message, they would then use their own private key to decrypt the message. Once the message is decrypted, they would then be able to read it.

To electronical sign a document, the sender would send a message asking for the sender to authenticate it's identity. The sender would then use their own private key to sign the message. After electronicaly signing the document, they would send them the signed document. When the receiver receives the document, they would use the senders public key to verify the signature. Once the signature has been verified, the receiver can be sure that it was the sender who sent the original document and signed it.

(6.1) Web 2.0

The Pillars of Web 2.0 are harnessing collective intelligence, utilizing the web as a plateform, leveraging the data, and implementing innovative web capabilities. All of these Pillars allow software to continually be updated, offer a wide variety of products, constantly monitor content and behavior of the website, and allow users to contribute to the imporvement of the site's content. Gaming Evolution would utilize these Web 2.0 Pillars by updating the system each for each new game release and continous minitoring which items are selling the best from our website. Gaming Evolution would also use these Pillars in order to allow customers who have brough specific items to give a "Customer Review" in our online forum. A Customer Review is where the customer reviews a purchased item in a one to two short paragraphs so that others can see how other people think about the product. Customers who visit the site would also be able to give feedback to Gaming Evolution so we know what content needs to be improved on our website.