Verified Document

Computer Security Briefly Support Your Term Paper

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it improve trust?

First, the reliance on public-key cryptography from unfamiliar sites can increase trust by having the specific security levels of security configured on an enterprise-wide network to only support more advanced forms of cryptography-based configurations (Galindo, Herranz, 2008). In other words configuring an entire network to support only the more advanced forms of public-key cryptography can make each site accessed more trustworthy. In organizations this is possible yet in individual system and website use, the reliance on certificate-based encryption significantly increases trust (Galindo, Morillo, Rafols, 2008).

D1. Rapid growth of the Internet is triggering dramatic changes in traditional business methods and practices. But some industries and businesses seem better able to deal with the online world than others. For this question, identify a business or a service function you are familiar with. Describe and defend your strategy for implementing a web-based application to support that business or service. Be sure to conduct an environmental scan, determine best practices, identify information technology elements (infrastructure or capabilities) necessary to conduct the business, and a strategy for capitalizing on the success of your venture in the next iteration. (2 pages, 6 APA)

The most critical aspect of any company's ongoing operations and its future growth is the strength and depth of its relationships with customers. Given the pressure software companies are under to continually stay on top of their customers' needs and rapidly innovate, these company's rapid adoption of Software-as-a-Service (SaaS) Customer Relationship Management (CRM) applications is understandable (King, 2010). Further fueling the urgency to adopt CRM on the SaaS-based delivery model is the growing acceptance of this platform by Chief Information Officers (CIO) who is historically the most conservative members of senior management teams (Creeger, 2009). Based on an environmental scan of the use of SaaS for CRM-based strategies the finding has emerged that organizations prefer being able to pay a monthly fee for access, accounting for these fees as operating expenses (OPEX) (Hill, 2008). This is quite a shift in how enterprise software is purchased as the majority of the time the costs are included in larger capital budgets (CAPEX). Often CAPEX-based spending for software must be approved by a company's board of directors and therefore can take months or years in some cases to get approved. The environmental scan of companies adopting CRM on the SaaS platform showed that the ability to pay for the software on a monthly basis while also scaling it globally throughout an organization is a powerful catalyst for adoption (Kenney, 2007).

Just as rapidly as CRM is being adopted on the SaaS platform, often with the support of CIOs (Creeger, 2009) an evolving set of best practices is beginning to also emerge. These best practices center on aligning the highly specific and unique business processes within organizations to the CRM systems as combined these systems allow for faster attainment of initiatives, plans and strategic goals (Concha, Espadas, Romero, Molina, 2010). The reliance on Business Process Management (BPM) (Hoskins, 2008) techniques to further streamline critical customer-facing and internal processes that rely on customer information has also delivered measurable financial results for SaaS early adopters (Creeger, 2009). The economics of SaaS, combined with the commitment on the part of companies to re-architect their processes to capitalize on a higher quality and speed of delivery of customer information, is in the process of significantly increase company performance (Hill, 2008).

The technological implications of SaaS are highly dependent on the underlying Web programming languages the applications are based on, with Asynchronous JavaScript (AJAX) being the most prevalent due to its speed...

The most challenging aspect of adopting SaaS as a platform for delivering CRM applications however is in integrating the new platform to legacy systems, many of which are decades old within the companies adopting SaaS platforms (Bajaj, Bradley, Cravens, 2008). CIOs are finding that the investments in SaaS integration are worth it (Creeger, 2009) as the streamlined business processes (Bajaj, Bradley, Cravens, 2008) deliver greater efficiency and greater accuracy of customer records (Hill, 2008). When all of these factors are combined many companies using SaaS for CRM strategies begin to integrate data modeling and advanced analytics in their firms (Hoberman, 2010). The ability of companies to quickly interpret the advanced analytics that are available through greater integration with customer data is proving to be a competitive advantage in better understanding unmet market needs (Hill, 2008). When implemented correctly SaaS-based CRM systems then can become a powerful catalyst for greater competitive advantage in each of the markets they serve.
References

Jason E. Bailes, & Gary F. Templeton. (2004). Managing P2P Security. Association for Computing Machinery. Communications of the ACM, 47(9), 95-98.

Bajaj, oA., Bradley, W., & Cravens, K.. (2008). SAAS: Integrating Systems Analysis with Accounting and Strategy for Ex-Ante Evaluation of IS Investments. Journal of Information Systems, 22(1), 97-124.

Caviglione, L.. (2009). Understanding and exploiting the reverse patterns of peer-to-peer file sharing applications. Network Security, 2009(7), 8-12

Chevalier, Y., & Rusinowitch, M.. (2010). Compiling and securing cryptographic protocols. Information Processing Letters, 110(3), 116.

Concha, D., Espadas, J., Romero, D., & Molina, a.. (2010). The e-HUB evolution: From a Custom Software Architecture to a Software-as-a-Service implementation. Computers in Industry, 61(2), 145.

Creeger, M.. (2009). CTO Roundtable: Cloud Computing. Association for Computing Machinery. Communications of the ACM, 52(8), 50.

Leon Erlanger. (2004, February). IM and P2P Security; the explosion of IM and P2P in the workplace can be a security nightmare. Here's how to keep your network - and your company - safe. PC Magazine, 23(2), 68+.

Galindo, D., & Herranz, J.. (2008). On the security of public key cryptosystems with a double decryption mechanism. Information Processing Letters, 108(5), 279.

Galindo, D., Morillo, P., & Rafols, C.. (2008). Improved certificate-based encryption in the standard model. The Journal of Systems and Software, 81(7), 1218.

Gaspary, L., Barcellos, M., Detsch, a., & Antunes, R.. (2007). Flexible security in peer-to-peer applications: Enabling new opportunities beyond tile sharing. Computer Networks, 51(17), 4797.

Sidney Hill, & Jr.. (2008, January). SaaS economics seem to favor users more than vendors. Manufacturing Business Technology, 26(1), 48.

Steve Hoberman. (2010). Data Modeling in the Cloud: Will the cloud make our data management jobs easier or harder?. Information Management, 20(2), 32.

Mike Hoskins. (2008). Solving the SaaS, SOA and Legacy Applications Sudoku. DM Review, 18(5), 21.

Brad Kenney. (2007, September). LIFE BEYOND CRM: SaaS Grows Up. Industry Week, 256(9), 38-39.

King, J.. (2010, February). Beyond CRM: SaaS Slips into the Mainstream. Computerworld, 44(4), 16-18,20.

Landau, S.. (2008). Privacy and Security a Multidimensional Problem. Association for Computing Machinery. Communications of the ACM, 51(11), 25.

Linda Leung. (2005, June). Hackers for hire. Network World, 22(24), 47.

Libeau, F.. (2008). Automating security events management. Network Security, 2008(12), 6-9.

Lowe, N.. (2009). Shields Up! Protecting browsers, endpoints and enterprises against web-based attacks. Network Security, 2009(10), 4-7.

Mansfield-Devine, S.. (2010). The perils of sharing. Network Security,

2010(1), 11-13.

Rowan, T. (2009). Password protection: the next generation. Network Security, 2009(2), 4-7.

Sarkar, S., & Maitra, S.. (2010). Cryptanalysis of RSA with more than one decryption exponent. Information Processing Letters,…

Sources used in this document:
References

Jason E. Bailes, & Gary F. Templeton. (2004). Managing P2P Security. Association for Computing Machinery. Communications of the ACM, 47(9), 95-98.

Bajaj, oA., Bradley, W., & Cravens, K.. (2008). SAAS: Integrating Systems Analysis with Accounting and Strategy for Ex-Ante Evaluation of IS Investments. Journal of Information Systems, 22(1), 97-124.

Caviglione, L.. (2009). Understanding and exploiting the reverse patterns of peer-to-peer file sharing applications. Network Security, 2009(7), 8-12

Chevalier, Y., & Rusinowitch, M.. (2010). Compiling and securing cryptographic protocols. Information Processing Letters, 110(3), 116.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Hacking, Electronic Surveillance and the Movie
Words: 1042 Length: 3 Document Type: Term Paper

Computer Hacking, Electronic Surveillance and the Movie Sneakers Sneakers Sneakers (1992), directed by Phil Alden Robinson, begins in December of 1969 as college students Martin Brice and his friend Cosmo are hacking into government and other computer networks and manipulating financial accounts by transferring funds from the Republican National Committee to the Black Panther Party and so forth as what is later termed a "prank." When Brice leaves to get a pizza

Security Planning and Assessment Security
Words: 2028 Length: 7 Document Type: Thesis

It's not necessary, for the purposes of this paper, to look in detail at these steps for a basic understanding of how a security assessment is conducted. To understand the nuances, there are about a million books one can read, but we will discuss a few general "rules." The first thing to keep in mind with an assessment is that the methodology is flexible. It has to be to adapt to

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Aviation Security Pre and
Words: 10540 Length: 30 Document Type: Term Paper

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

Benchmarking Key Loggers for Gathering Digital Evidence on Personal...
Words: 8600 Length: 18 Document Type: Multiple Chapters

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now