StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Networking Bachelor - Essay Example

Cite this document
Summary
During the project I will conduct a detailed research and collect information about the implementation and structure of a secure e-commerce network. I will also demonstrate the learning outcomes of the project course specification outlined by the school of computing and Mathematical Science at the University…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Networking Bachelor Essay
Read Text Preview

Extract of sample "Networking Bachelor"

PROJECT PROPOSAL ID: Programme: Implementing A Secure e-Commerce Solution Final Project Project Justification:During the project I will conduct a detailed research and collect information about the implementation and structure of a secure e-commerce network. I will also demonstrate the learning outcomes of the project course specification outlined by the school of computing and Mathematical Science at the University. I will be using the basic project management techniques to plan, organize, schedule and control the project.

I will be conduction appropriate literature study, research work done in an organization, using a variety of sources and methods for collecting reference material and to provide all relevant and correct information about the same.Keywords:E-commerce SecurityTransfer of DataWorld Wide WebEncryptionDecryption1. Overview A secured e commerce service is one of the major concerns for any corporation today in the growing business world. Today e-commerce has provided the gateway for any company to grow and at the same time has provided with its customers and consumers with all the facility to shop from the comfort of their home, while watching TV or listening to music.

The major concern for any organization and/or corporation is to provide the necessary security for the online transaction either done through a bank or via any credit card company. Security has become a major concern in the 21st Century. This research work concentrates and focuses more on the e-commerce Security protocols and to improve.The aim is to understand e - commerce security critically and analyze it further into depth to provide more relevant information regarding e-commerce security.

The greater part of research work has been dedicated to e-commerce security of electronic business and why the security is considered as very important and how each country spends significant amount of their capital available for security of their electronic business and the loss they may face in security breach of their competitive, confidential, data processing and business information. These protocols are basically used by banks and large corporate, their functionality includes:Encrypting of InformationDecrypting of InformationRouters Firewalls Data encryption key management Intrusion detection systems (IDS )AuthenticationDigital certificateSecure Sockets Layer (SSL) Internet Protocol Security (IPSec).

With the growing use of internet today people want to use more and more of the services available. As today computer are available and accessible for virtually anywhere in the world. This makes it more attractive for business to use new avenues for business and this at the same time brings down the barriers and has no borders. World has become one market today with the use and availability of the internet. E-commerce as we all know today is not only limited for retail and for particular individuals but also for corporate who buy and manage a large part of their supply network on internet.

The research will specifically focus on how to improve the security protocols and if there can be modification for better security regarding online business.2. Objectives The project seeks to show the definition and functions of e-commerce, its great contributions to today's business as well to identify its security concerns and the present moves to solve them. The main objective of this paper is to show how security can be implemented in an e commerce application.The objectives of these project focuses of three main objectives which are:1.

Review the literature on security or how to develop secure systems 2. Design and implement a secure e-commerce website 3. Critically evaluate the implementation On the design and implementation of a secure e-commerce website, it will be based on the following tasks proposed tasks:Specification, procurement and configuration of database and application servers to support known requirements for the proposed electronic Commerce solution, in particular the initial systems which will utilize the Internet Payment Gateway.

Development and implementation of a secure e-commerce application through a shopping cart web application.Implementation of the servers within the secure network infrastructure.Complete implementation of SSL for a web based Applications. Technical documentation for use by technical persons and overview documentation for target customers. 3. How I intend to accomplish the objectivesThe project has been divided into parts for its completion. Basically, a complete review of relative literature is to be done with appropriate reading materials.

Collection of primary and secondary data will be done comprehensively. Reading material about e-commerce security, internet protocols, security layers, encryptions, firewalls, etc. After all the relevant data has been gathered, data will be processed and analyzed on the basis of the information gathered. This would lead us to a better understanding of all the issues arising in the working of an organization. This would lead us to providing with conclusion on the research done and the report prepared and recommendation will be made accordingly for improvements or changes to be made to their e-commerce security services.

After gathering the relevant data, a web application will be develop by using chosen programming language. On the development process, requirements, and analysis will be done to accomplish the task of implementing a secure e-commerce solution through a shopping cart application. 4. Reason for selecting this project and how my prior sills/knowledge plus the topics currently being studied will enable me to complete the project. Information technology today is growing leaps and bounds. I being computing students have always had special interest in the field of security, this is due to the subjects I have studies during the course of my education.

Subjects such as; Database management systems, Essentials of computer networks, computer system organization, silver side scripts and more importantly web commerce. The interest I developed during the course of the education related to the information I acquired in these areas led me to the curiosity of finding and doing more research on security issues which are of major concern today. The growing need of security for better commerce inside and outside the organizations. (This attributes to my personal experience with security breaches) The advantages and benefits of e - commerce security as the world is converting into one market with no barriers for trade and commerce and with the technology growing the need for secured online transactions.

Public and private keys studied in E-commerce and the motivation I have received from my professors and my personal interest in the field of online security. 5. BENEFITS OF THIS STUDYE-Commerce is not merely confined to traditional buying and selling over the Internet. It also covers any kind of business transaction that is carried out electronically. E-Commerce has become increasingly necessary in order to facilitate the smooth and fast transaction in modern business. And because it is in a global scale, e-commerce also offers more diverse and exciting business opportunities.

From sole proprietorships to multinational firms, business organizations can broaden their businesses by reaching potential customers and new markets with efficiency. The sole proprietor is now able to expand the scope of his/her business to a mass market approach, while the multinational companies can now concentrate to "niche" markets (with the use of web-based advertising, for instance), that are otherwise too costly to break into by using the traditional marketing methods.For consumers, they can send and/or receive remittances, shop for products, communicate with sellers or their business prospects (through advanced electronic mails, SMS messaging, video conferencing, and others), comfortably and effectively without actually ever getting out of their own location.

And since the Internet is readily accessible to millions of people worldwide, it is vital that proper safeguards are put in place to ensure security and maximize the potential of e-Commerce. This study will focus on the importance of having the technological means to support solid identification, accountability, verification, and liability in e-Commerce transactions in order to protect the software, hardware and data assets of a business entity from unauthorized access and abuse.6. ImplementationThis project seeks to facilitate in the implementation of a secure platform for conducting e-Commerce.

This project applies to a specific e-Commerce web application.The proposed system will utilize the following resources:A programming language or scripting language for the development of the web application. In this case, we have chosen to use ASP.NET and Visual Studio as the development environment,A relational database system where the data and transactions will be stored. This paper have chosen MS SQL 2005 Express for in integrates well with ASP.NET and also for being available for free.Web servers for the storage of database system and application system. 6. 1 Architectural HighlightsHardware RequirementsTwo servers are required for the web application, a web server and a database server.

Below are the required hardware specifications:Database Server- Intel P4 Processor 2.0GHz- 512MB RAM- 40GB Hard Disk spaceWeb Server - Intel P4 Processor 2.0GHz- 512MB RAM- 40GB Hard Disk space- 1 Public IPClient PC Configuration - IBM PC Compatibles min. of 433MHz- 64MB RAM- 56 kbps ModemBelow are the recommended hardware requirements:Software RequirementsThe following are required software, tools, and operating systems to be loaded on all the hardware requirements.Web ServerOperating SystemWindows 2003 server Web ServicesIIS 6Other tools and services.

NET framework 2.0SMTP serviceCDONTS mail serviceDatabase ServerOperating SystemWindows 2003 serverDatabaseMS SQL Server 2005Network RequirementsBoth web and database servers must be connected within a local area network of an Internet hosting facility. Both web and database server must have interconnectivity through TCP/IP protocol within the local are network.A public IP should be provided for the web server for it to have Internet presence.For security reasons, the database server should no be exposed to the Internet.

Large organizations and business dealing with their customers online are worried about the security of the information transferred from one end to another. Today high amount of capital and finance is being spent to make a website more secured to give their customers a perfect sense of security and satisfaction that their personal data and information in on a safe and secured website from where they are shopping. At the same time there is to be more awareness among people to explain the need of security as it may not be very comfortable for many customers who would also try and find a easy way to do things as well as try and breach the security levels of any particular website or company.

It is important to build a system which provides sufficient enough security for genuine users. Users who find security policies and systems too restrictive will find ways around them. It's important to get their feedback to understand what can be improved, and it's important to let them know the reason of things done, the sorts of risks that are deemed unacceptable, and what has been done to minimize the organization's exposure to increasing crimes over the internet.The threat to organization security is one of the main barriers to e - commerce.

Cryptography and Digital CertificateSecure Socket Layer (SSL) and Transport Layer Security (TLS)7. RESEARCH METHODOLOGY This paper will use both qualitative and quantitative method of research. 8. CONCLUSIONWhile e-Commerce is definitely beneficial -- or even necessary -- for this rapid and ever-changing business environment, one must be also be aware (and beware) of the some risks involved particularly on its security and accountability concern. Through this project proposal we can have a clear grasp of how security is implemented, how it works, and how the system will perform in this ever changing technological age,

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking Bachelor Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Networking Bachelor Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1510652-networking-bachelor-essay
(Networking Bachelor Essay Example | Topics and Well Written Essays - 500 Words)
Networking Bachelor Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1510652-networking-bachelor-essay.
“Networking Bachelor Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1510652-networking-bachelor-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Networking Bachelor Essay

Personal and Professional Development - Hong Kong and Shanghai Banking Corporation

Essay on “Personal and Professional Development” Introduction Organization chosen for this assessment is HSBC Holdings plc.... which is commonly called as HSBC.... It is the third largest bank providing financial services in the world.... It is a publicly held banking service.... hellip; HSBC has its headquarters in London, United Kingdom....
10 Pages (2500 words) Essay

University of Wales Institute, Cardiff: life for a student

I am a freshman student of the UWIC for the first semester of 2010 studying Software Development and Networks.... I personally chose UWIC, mainly for two reasons: it is popular in my home country-Saudi Arabia and the institution boasts of excellent facilities.... … Likewise, this school enjoys the reputation as one of the best institutions for higher learning in the United Kingdom....
6 Pages (1500 words) Essay

Artifact #1: Needs Analysis/Context Narrative

hellip; Having graduated with a degree of bachelor of Arts in English from the Jeddah Teachers' College, I was immensely excited to teach middle school students.... Artifact #1: Needs Analysis/Context Narrative Name ENGL 754/854: World Englishes in Composition & Applied Linguistics Dr....
4 Pages (1000 words) Essay

Debate about American Higher Education

? (Blue Ribbon Commission) The Blue Ribbon Commission on Higher education further observes: “Out of every ten 9th graders nationally, only three will obtain an associate's or bachelor's degree on time.... The big success that US has achieved in creating unprecedented wealth and prosperity for its people and the larger world through innovation and higher learning throughout the twentieth century culminated in the information technology revolution and coming of a new… d economy where human beings were its biggest capital....
7 Pages (1750 words) Essay

University registration

I am currently pursuing my bachelor's degree, and looking forward to pursuing my master's degree upon completion.... I am currently pursuing my bachelor's degree, and looking forward to pursuing my master's degree upon completion.... I humbly seek admission to your university to complete my bachelor's and embark on my master's degree even as I continue with my charity work (Stewart, 2009).... This has improved my networking skills....
2 Pages (500 words) Essay

The Relevance of Personal Networks

Personal networks also become influenced by factors such as gender, overall network size, age, frequency of interaction with network… Moreover, personal networks act as a drive towards bridging the gap between income levels and the employment rates for Chinese immigrants in Germany.... Additionally, the social assets of an individual would always be Personal networks serve as sources of information on business, education, jobs and wage prospects....
7 Pages (1750 words) Essay

Sales Layout for ONTELA PICDECK

Ontela's PicDeck is a one of a kind picture transfer facility that eliminates the hectic process of connecting one's phone to the PC through a wire in order to use them… In the fast moving world of today people require speed and efficiency that provide them ease by reducing the amount of needless procedures that are required....
8 Pages (2000 words) Essay

Hospitals and Community Pharmacies Visit

… My Reflection Regarding Hospitals and Community Pharmacies VisitFrom my visit in the local hospital, I found that pharmacists are also experts in the field of medicine.... Their role in the hospital was to purchase, dispense, quality test and keep track My Reflection Regarding Hospitals and Community Pharmacies VisitFrom my visit in the local hospital, I found that pharmacists are also experts in the field of medicine....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us