Tuesday, November 16, 2010

IS Security 7.1

Our company can be threatened by many different things. The many common threats to Information Systems Security are viruses, outside intruders, employees, Natural Disasters, and other Outside businesses. In order for our business to remain safe, there are several safe guards that can take into account. The Safeguards could include Physical Access Restrictions, Firewalls, and Encryption. Physical Access Restrictions meaning using some form of authentication; requiring passwords, etc. Firewalls is a type of private network that detects intrusions. Encryption is encoding messages so that the information going across the internet is secure.

Web 2.0 6.1

Our company NetFlix Co. could utilize the Web 2.0 pillars by being able to get our company across the internet. The Web 2.0 pillars that would be used are Utilizing the Web as a platform meaning being able to use the platform to expand your business across the internet. The second Web 2.0 pillar is Harnessing Collective Intelligence. This means that users can contribute and improve content on the Web. The third Web 2.0 pillar is Leveraging the Data which businesses utilize powerful data bases to make their decisions . The last Web 2.0 pillar is Implementing Innovative Web Capabilities. This is referring to businesses having a competitive advantage. Our company can be able to implement this pillar by checking and monitoring our system upgrades for our business. All of these pillars help with building and forming our business for its expansion across the internet.