Executive Summary of an online Auction Business
Autor: Tsotso Machobane Jr. • March 26, 2015 • Business Plan • 1,490 Words (6 Pages) • 1,188 Views
This shows what equations I used to calculate the totals, percentages and the overall grade.
[pic 1]
Then after the equations the results are
[pic 2][pic 3]
WIFI HOTSPOT SAFETY
LOW DEPLOYMENT cost opens a quite open view for hackers to temper with data of which is not of theirs since this makers wireless user attractive to users. The fact that it is cheap and does not need any charger to access this makes the it easy and accessible hence they move to eavesdrop through network confection.
PARKING LOT’’ATAACK
These are the radios and the circular connection in which a group pf hackers can find a place to encounter and use this as an attacking area in which to access some organization which they will retrieve the information if the network is compromised the hacker shave a better chance to attack many accounts since the system will be a bit down.
SERVICES SET IDENFIER FLAW
Since this uses the ssids if the setup of the Wi-Fi default is not changed or made to be personal this highly makes all your data to be more exposed as it is considered to be of poor stored connections. This prints out all the frames in either an organisation .A as results this give the attacker more chances of contaminating the data.
ENCRYPTION
This is when the information in the computer is moving in and out of the systems through the Wi-Fi in order this leads to the sensitive information leaks. This allows other users to pass through in your account hence do whatever they want.
Risks like Frame spoofing, web crackers and the traffic analysis.
PRECAUTIONS TO THIS INCLUDES
-Making sure you the best computer software to protect your computer this manages time and provides energy more in that since it is frankly it helps since it provides constant protection and this address encryption.
-In communicating always make sure that there is no one tempering with that data thus address low deployment
-Authenticity this is whereby one makes sure that the information he is getting comes from a areal entity hence addressing spoofing and parking lot attack
-Integrity trying by all means to notice that there are intruders with your systems during transmission process hence addressing the services set idenfier flaw.
CLOUD COMPUTING
Cloud computing was described as what happens when software’s and services are transferred in a broad network which in the case is the internet. This is known to be time consuming in terms of it being achieved. This is usually the instruments used to have way in the application and services they do not require any different or a special application used to engage in.therfore I agree that it provides high availability and optimized scaling. This continues to provide muilti-tenancy and effective resource allocation as since many application and services will be installed into the internet hence providing muilti-tenancy as the application is installed, this theory same applies to google which has many different services to its users like email access , translations, maps and thus provides muiti-tenacy. Another example includes the Microsoft, SharePoint which also contribute as it gives out business tools.
...