Verified Document

Conducting Online Investigations Essay

¶ … Online Investigations for Website Management When it comes to investigating and implementing tools for website management, there are so many things that can be applied. It is important to appreciate the different types of tools appropriate because there is no such thing as one size fits all. It is also clear that the diversity of proprietary and open source applications available over the Internet is increasing every day. Numerous of these can be of assistance to the website manager. Also, as consumers access websites that are from a growing diversity of devices, receptive Web design turn out to be more and more important. Implementing tools for website management is about building a Web manifestation that scales and purposes well on desktop, mobile devices and tablet. The inspecting size of each device is dissimilar, which generates challenges for Web designers, not only on account of the designs themselves but also by reason of the need to manage website constituents as they scale from one device to another. With that said, this essay will examine the tools for website management.

Intranet and Extranet

The intranet is essentially a small-scale version of the internet, operating with similar functionality, but existing solely within the firm. Like the internet, the intranet uses network technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP). It allows for the creation of internal networks with common internet applications that can allow them to communicate with different operating systems (Newell et al. 2000). Intranets serve an organization's digital communications needs. They also provide a secure space for storing, accessing and developing electronic materials. Using intranets to replace older business solutions can produce big gains in efficiency by speeding up workflows and reducing errors. Some specific intranet applications include network folders where multiple employees can access the same files, offline websites that can be tested for functionality before going live, digital reference databases for looking up facts and figures, internal email systems and instant messaging software.

Rocktime is an internet tool used to implement Intranet and Extranet. The Rocktime intranet platform allows organizations to control a diverse range of information efficiently, and most importantly communicate, manage and share this information internally between relevant staff. The Rocktime extranet is where this functionality is extended to include access for 'external' people, for example customers, suppliers and partners. Rocktime's intranet and extranet platforms allow your business to implement varying levels of access and user rights e.g. defining what each person can see and whether they can make changes to such information. In addition both platforms can be accessible securely over the internet via a web browser, consequently removing the constrictions of site-specific geography. As long as staff and users are connected to the internet they can securely access the company intranet or extranet.

Web Analytics OR SEO

When considering the different web analytics tools that your business requires, the plethora of available options can be overwhelming for businesses that may not understand how to use them. And that's where hiring someone to really dig into all of the reports can be vital. One tool is the Web analytics 2.0 is a three-tiered data delivery and analysis service for small and big businesses. The first is the data itself, as it measures the traffic, page views, clicks and more for both your website and for your direct competition.

Google Analytics is another good tool to use. A completely free service that generates detailed statistics about visitors to your website, Google Analytics is the simplest and most robust web analytics offering. Currently used by over 50% of the top 10,000 websites in the world, according to the site's usage statistics, you can find out where your visitors are coming from, what they're doing while on your site and how often they come back, among many other things.

Yahoo Web Analytics

Once you've mastered Google Analytics, Yahoo's similar offering gives you a little more depth in your surveying. It offers better access control options and a simpler approach to multi-site analytics, raw and real time data collection (unlike Google, you can import cost of goods data), visitor behavior and demographics reports and customized options as well. Yahoo Analytics is a bit of a step up from Google in terms of profiling, filtering and customization, so for those looking to dig a little deeper, it's a great option.

Security backups and penetration testing

Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications....

Parts of this document are hidden

View Full Document
svg-one

Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process. Unlike other scanners, Arachni takes into account the dynamic nature of web applications and can detect changes caused while travelling through the paths of a web application's cyclomatic complexity.
This way attack/input vectors that would otherwise be undetectable by non-humans are seamlessly handled by Arachni. Finally, Arachni yields great performance due to its asynchronous HTTP model (courtesy of Typhoeus). Thus, you'll only be limited by the responsiveness of the server under audit and your available bandwidth.

The Zed Attack Proxy (ZAP) is considered to be an easy tool to for finding susceptibilities in web applications. This device is intended to be used by individuals with a wide variety of security experience and as such is perfect for functional and developer testers who are new to diffusion analysis. ZAP offers automatic scanners in addition to a set of tools that permit you to find security vulnerabilities by hand. Another tool is the w3af which is an Audit Framework Web and Application Attack. The project's goal is to generate a framework to exploit and find web application weaknesses that is easy to extend and use.

Another tool that is effective is called the Vega. This device is considered to be an open source stage that is used so that it can test the safety of web applications. However, Vega can help a business find and authenticate Cross-Site Scripting (XSS), and SQL Injections, unintentionally unveiled sensitive information, and other weaknesses. This tool is written in GUI based, Java, and also runs on OS X, Linux, and Windows. This device does consist of a very effective computerized scanner which is used for quick tests and a diverting alternative for strategic review. One of the most interesting thing about this tool is that it can be drawn-out using a powerful API in the language of the web.

Social Media

Even social media can be looked at as one of the most effective ways a business to get more new leads and generate traffic. It is important to understand that having the right social media management tools and an attendance on all the major networks such as Twitter, Facebook, LinkedIn, and Google+ is a requirement these days for any big business. Nevertheless what type of publishing tools dashboards and marketing software, are the social media manager experts really using to juggle these numerous accounts?

One of these is the HootSuite for big businesses it is most popular social media management tool to collaboratively perform campaigns across numerous social networks such as LinkedIn and Twitter from one web-based dashboard (Morningstar, 2014). Hootsuite has turned out to be a vital tool for tracking conversations, handling social media, and determining campaign outcomes via mobile devices or web. Hootsuite provides a free, pro and creativity answer for managing limitless social profiles, improved analytics, cutting-edge message scheduling, Facebook insights integration and Google Analytics.

Buffer is an east and smart way to program content through social media. When a company thinks of Buffer it is much similar to a virtual queue the business is able to use in order to fill with content and then amazing posting times during the course of the day. This lets the company keep to an ongoing social media schedule that goes every day without being concerned in regards to micro-managing every one of the delivery times. Another interesting thing is that this device gives out analytics concerning the arrangement and reach of the business posts.

Big businesses can use IFTTT. This is a powerful Internet robotics site that can save a business a lot of time handling social media and other responsibilities through procedures. A business can basically attach any channel or major network together to systematize sharing on sites like LinkedIn, Twitter, Facebook, and more based on any action a business desire. Like directing out a tweet routinely every time a business publish a new blog post or receiving an email when your preferred periodical has something new to say. In addition to all of this, it works well with Hootsuite and Buffer and just improves those tools even more and is a must use for any serious social media expert.

Recommendations for Big Businesses

CoTweet is an outstanding instrument for small businesses or even divisions of superior businesses that extend social media responsibilities among team members and have a customer-service method to commitment. Similar to countless SMM services, CoTweet brings everything up-to-date automatically and follow-up messages are robotically dispensed to particular social media managers (Segal, 2014). This can make replies more appropriate as team members with assured knowledge bases can…

Sources used in this document:
References

Acedo, M., 2014. 25 Teaching Tools For The Digital Classroom. [Online]

Available at: http://www.teachthought.com/technology/25-teaching-tools-to-organize-innovate-manage-your-classroom/

Carr, D.F., 2015. Best Website Management Tools For Small Business. [Online]

Available at: http://www.forbes.com/sites/davidcarr/2010/12/15/best-website-management-tools-for-small-business / [Accessed 18 April 2014].
Available at: http://www.knowledge-management-tools.net / [Accessed 17 April 2015].
Available at: http://corporate.morningstar.com/U.S./asp/subject.aspx?xmlfile=2731.xml [Accessed 18 April 2015].
Available at: http://www.fbi.gov/publications/leb/2002/june2002/june02leb.htm
Available at: http://www.section508.gov/technology-tools [Accessed 18 April 2015].
Available at: http://www.cio.com/article/2387279/developer/7-tools-to-build-websites-using-responsive-design.html
Available at: http://www.schultzwilliams.com/resources-realized/essays-and-editorials/critical-tools-required-for-building-a-successful-website.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Online Learning and Education Technology
Words: 747 Length: 3 Document Type: Term Paper

Two weeks after the course, a follow-up survey will be given to assess if they have increased their level of computer knowledge and level of usage in the classroom. Methodology Sample participants for the study will be selected from among elementary school teachers in several local school districts. They will be teachers for grades 1-6 and will be selected by announcing the study and allowing volunteers to sign up. They will

Online Dating and Identity
Words: 7046 Length: 23 Document Type: Research Paper

Online Dating Scams and Its Role in Identity Theft ONLINE DATING SCAMS AND IDENTITY THEFT The increased use of the Internet in modern communications has contributed to the emergence of cyberspace, which has become an alternative medium for developing and experiencing new relationships. The cyberspace is currently used for various purposes including communication and for developing creative romantic endeavors with less spatio-temporal restrictions. While online love platforms have proliferated and blossomed in

CEO's Private Investigation Key Issues in the
Words: 1350 Length: 4 Document Type: Essay

CEO's Private Investigation Key issues in the case This case is about a new CEO known as Cheryl Tobin who contemplates launching an inquiry in a fraud case that might have taken place at the firm. The CEO as a new employee has assumed a legendary position at the company. The position had previously been held by the deceased James Rawlings who was the reckoning force behind the tremendous innovative achievements and

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Adults on Secured Online Environments
Words: 12910 Length: 50 Document Type: Term Paper

Next, the researcher will conduct a query of the computer awareness of education administrators, teachers, parents, and students in the New Orleans school district, then evaluation of documented data will provide a research base of the required elements needed to consider while developing a framework that can be used as a guide by educational leaders and parents for the protection of children at school and at home. Research areas

Online Consumerism Internet Usage Has Been on
Words: 2588 Length: 6 Document Type: Research Paper

Online Consumerism Internet usage has been on the rise in recent years, and consequently is the increase in the number of online consumers. This research explores the attitudes, behaviors, and motivations of this new type of consumer in the market. The online consumer behavior has been considered for over 2 decades and will undoubtedly make a contribution to many future researches as internet consumerism expands. This paper will be guided

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now