StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Secure Network Infrastructure for E-Commerce - Research Proposal Example

Cite this document
Summary
As the paper "Secure Network Infrastructure for E-Commerce" tells, many businesses use corporate applications and hence there has been a drastic rise in demand for the applications. Organizations have implemented these applications which act as a medium of communication, transactions, etc. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful

Extract of sample "Secure Network Infrastructure for E-Commerce"

This company owns a number of hotels. With the high technology growth rate and globalization, external systems and corporate application links are necessary because they will facilitate growing business demands of reaching external or global markets. This will enable the company to reach out to many tourists worldwide. Through internet marketing, the company will be able to market online and the target consumers will be able to purchase online through the use of the Secure Network Infrastructure for eCommerce.

The aims of this project are mainly to design and implement server protocols that will satisfy the company’s needs as well as maintain the security and integrity of the organization's critical and confidential data. This project will meet the QCF guidelines for Masters Projects by evaluating the existing system, and designing and implementing system software through high-level programming.

  1. Objectives:

This project mainly aims at implementing host internet-based service with support from FMD Unix consultants to assist in the network infrastructure construction. This will enable the company to easily conduct eCommerce transactions from not only within but also from external links through the internet.

Among the areas that will require the new system includes;

  • Meeting and Accommodation Services and rooms bookings Management  – This will include modules enabling prospective customers to book meeting or accommodation rooms online via the web.
  • Accounting and Payment Services – this will include a system that will enable secure payments, auditing, and booking deposit payments. An example is an e-Receipting system which will enable tourists or potential customers and the general public to pay for services online.
  • Hotel Website – This will play a major role in marketing the Hotels as well as enabling the link into the internal system. Through this website potential customers will view the services being offered and will also be able to pay online.

The major objective is satisfying these high demands while at the same time retaining the integrity and security of the hotel's critical business data. This project’s primary goal is to complete the implementation of the secure network infrastructure and establish a platform for the secure conduct of eCommerce.

  1. These Objectives will be achieved through:
  • In cases where credit cards will be required, their data will be stored on the Company's system.
  • The system architecture will include application servers which will provide a link between the software and data for security purposes.
  • This will physically separate Mufraq’s internal services from the global access services via the internet.
  • This service will be protected through the implementation of sub-networks which will be controlled through firewalls and subnet masks.
  • Special software will be incorporated to control the logging of access.
  • A security audit will be compulsory.
  • Connection Authority will be maintained for all systems.
  •  A comprehensive register will be incorporated for all connected systems detailing software, hardware, and data assets.
  1. Benefit Statement

With tourism being the center point for the Hotel industry, eCommerce and the use of the Internet offers better marketing basis and opportunities due to an expanded target market. However, proper safeguards are put in place to maximize these whilst protecting the Company’s software, hardware, and data assets from unauthorized access and exploitation. This project will deliver a secure, more efficient, and scalable basis that will enable the hotels to obtain maximum benefit from the Corporate Application portfolio.

  1. Constraints and Assumptions

Among the major constraints in undertaking this project will be purchasing the IT infrastructure that will be required to facilitate the project. For example, the proposed Internal Payment Gateway which will include related systems like receipting will require to be procured. The high demand for eCommerce solutions increases significantly and so will the cost.

The major assumption will be that the SSL implementation will use Mufraq’s root certificate established by EUCS. Also, the removal of direct access via PC is dependent on web enablement of remaining client/server and character-based Corporate Applications.

  1. Resources:

The resources required for the execution of this project will include;

Consultancy: EUCS FMD Unix, commissioned external consultants IS Integration Ltd to assist in the creation of a skeleton network infrastructure to permit various organizational departments to securely host internet-enabled service provision and conduct e-commerce transactions from the internet.

Hardware:  Database and Application Servers.

Software: Application Server Software.

  1. Costs

Staff

MIS DSG  -Dev Pool 10 Resource Days

MIS DSG - TS  50 Resource Days

MIS BSG – 10 Resource Days

MIS CSG - 5 Resource Days

EU FMD Unix – 50 Resource Days

Business Partners – 10 Resources Days (For Testing)

Hardware and Software

The database and Application servers will cost £30,000.

Application Server Software will cost £5000.

 

  1. Schedule

Task 

Responsibility 

Estimated Days

Introduction of Web service to Database Servers

MIS DSG - TS
FMD Unix

7 days

Implementation of SSL

MIS DSG - TS
FMD Unix

14 days

Hardware Specification

MIS DSG - TS
FMD Unix

5 days

Procure and Configure Hardware

MIS DSG - TS
FMD Unix

14 days

Vulnerability Testing Service Established

MIS DSG - TS

FMD Unix

3 days

Implementation Of Initial eCommerce Systems 


MIS DSG – Dev Pool

FMD Unix

5 days

Removal Of Direct PC Access To Database Servers

FMD Unix

3 days

 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Secure Network Infrastructure for E-Commerce - Information Technology Research Proposal, n.d.)
Secure Network Infrastructure for E-Commerce - Information Technology Research Proposal. https://studentshare.org/e-commerce/2037776-information-technology-security-management-and-its-impact-on-business-success
(Secure Network Infrastructure for E-Commerce - Information Technology Research Proposal)
Secure Network Infrastructure for E-Commerce - Information Technology Research Proposal. https://studentshare.org/e-commerce/2037776-information-technology-security-management-and-its-impact-on-business-success.
“Secure Network Infrastructure for E-Commerce - Information Technology Research Proposal”. https://studentshare.org/e-commerce/2037776-information-technology-security-management-and-its-impact-on-business-success.
  • Cited: 0 times

CHECK THESE SAMPLES OF Secure Network Infrastructure for E-Commerce

Significant Importance of E-Commerce Security

Such programs are necessary for e-commerce survival and their effectiveness in the organization.... This essay discusses that new technologies have been introduced through e-commerce to give a wider exposure and innovate new ways of conducting businesses.... e-commerce presence is important for expansion in business, dissemination of information and access to physically inaccessible markets.... From this paper, it is clear that e-commerce has given a boost to the financial sector tremendously, especially the banking sector which now enjoys a larger customer portfolio and, in return....
7 Pages (1750 words) Research Paper

E-commerce security and fraud protection

According to Schneider (2011), such a system would be pegged on a complex interaction of several database management systems, applications development platforms, network infrastructure and systems software.... Thus, the paper articulates access control approaches, securing of e-commerce channels, security in payment protocols and communications security.... e-commerce presents a strategic platform that offers organizations and consumers an easy-to-use and convenient way of transacting in business....
7 Pages (1750 words) Term Paper

Communications and Networks Analysis

ot used for e-commerce.... Not used for e-commerce.... The Internet provides the infrastructure backbone for e-commerce.... The extranet can be run over secure VPN tunnels or leased lines to other business partners for e-commerce.... Extranet – is the intranet extended over the internet or public telecommunication network to provide B2B services and e-commerce.... e-commerce The VAN services are limited to intranet users....
6 Pages (1500 words) Essay

Virtual Private Network

Thus, more effective ways of combating the threats, especially in terms of access to the network are extremely important in order to determine that those who access an information systems infrastructure are authorized and recognized by the system.... VPN traffic can be carried over a public networking infrastructure (e.... In terms of scalability, VPNs allow corporations to utilize remote access infrastructure within ISPs.... This essay "Virtual Private network" discusses VPNs that started coming out of the market, they were mostly application-based systems that are installed and configured on available servers....
5 Pages (1250 words) Essay

PKI and Ecommerce Significance

The main area of discussion is the analysis of the external and internal e-commerce systems that can be secured using PKI, e-commerce significance, and benefits of PKIs.... The main area of discussion is the analysis of the external and internal e-commerce systems that can be secured using PKI, e-commerce significance, and benefits of PKIs.... "PKI and Ecommerce Significance" paper presents an analysis of the public key infrastructure and associated X....
5 Pages (1250 words) Coursework

E-Commerce Technologies

The paper "e-commerce Technologies" is a good example of an information technology annotated bibliography.... With the coming up of several technologies, e-commerce has become simpler and viable than traditional trading methods.... The paper "e-commerce Technologies" is a good example of an information technology annotated bibliography.... With the coming up of several technologies, e-commerce has become simpler and viable than traditional trading methods....
6 Pages (1500 words) Annotated Bibliography

Information Technology Security Management and Its Impact on Business Success

Another important accomplishment that has been achieved is the determination of an approach to identifying the appropriate secure network infrastructure for H&R.... Wave secure data group provides an approach to determining a secure network infrastructure.... esearch on the secure network info eCommerce for ecommerce ... etermination of theconstraintsns and constraints of the secure network infrastructurconstraintsmmerce ... nvestigation of teCommercemmerce e-commerce the and the use of internet on business eCommerce to identify the benefits of the new system and ...
12 Pages (3000 words) Thesis

Designing a Secure Network Infrastructure for E-Commerce

"Designing a Secure Network Infrastructure for E-Commerce" paper is about a secure network infrastructure design appropriate for a company involved in e-business operations.... Designing a Secure Network Infrastructure for E-Commerce is one way of showing one's specialization and high level of knowledge.... The selection of the appropriate design is done through research on secondary information about secure network infrastructure.... nderstanding the requirements of e-commerce and those of the organization (H&R) has led to the understanding of the necessary technology and devices for the design and implementation of a secure network infrastructure....
28 Pages (7000 words) Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us