Wednesday, May 6, 2020

Business Information System and Online Technology

Question: Discuss about the Business Information System and Online Technology. Answer: INtroduction: August Online Technology have been selling Indo-western clothes for over a period and wanted to improve the sales with the help of web technology. August Online Technology needs improvement of the marketing and sales as well as the impact of network attack, the internet, and risk related to the security of Indo-western clothes. Improving marketing and sales There are various process and method for increasing the annual sales through improvement of marketing and sales. On having a close observation of the Indo-western clothes, it is analyzed that August Online Technology can use internet and web technology for improving the annual sales as well as marketing of the product (Johnston and Marshall 2016). The company will be launching the product on the various online shopping sites product can also be advertised through face book, twitter, etc. Marketing of the Indo-western can be done on a regular basis at the social media and with the help of search engine. The company can give offers on purchasing the clothes online. Cash on delivery services will be provided to the customer giving an online order. Marketing of the product can be further done with the help of online pop-up. All the above mentioned method will be boosting huge sales in the sales of the product, because of the arrival of the festive season and attractive offer. Online sale s and marketing are one of the easier methods for increasing the annual sales of the company (Kotler et al., 2015). Network security risks and protection Security has become one of the major issues in each and every aspect specially related to a product. Security risk related will be related to the product designing, the design of the clothes may be stolen by another company. Indo-western clothes are the new trend, and it is mainly available on costly boutiques, high level designer, and costly shops. Moreover, the security of the product will also be affected by the hackers who are always in search of doing theft. If the encryption of the company is not met the company cannot save the database of the customer. Further, the cyber policy should be maintained, for not getting affected by the risk related to privacy and security of the company (Andres et al., 2012). There are network attacks which may affect the risk of the company. Here are some network attacks which will be affecting the company security in the following ways: Data modification - A network attack can be termed to be a modification of the data packet, by not affecting the knowledge of the receiver and sender. For preserving the message send to the customer of a company will be saved in the way of transition. Identifying Spoofing Some of the IP address can also be preserved with the identification of the valid entity. The attacker can make modification in the route of the data and turn it towards itself. Password-based attacks - Attacks based on the password will be affecting the company too much. Password attacks will be attacking only on a certain user if the hints of the account are known by the hacker (Chen and Zhao 2012). For protecting the company from these securities the company can make use of various tools and software. Tools used by the company can be in the following ways: The company needs to keep an update of the software use for maintaining the database as well as product related information. Different password and OTP facilities should be mentioned in each and every aspect of the company. Encryption should be present in the account of the company, so that company data is not getting hacked by the external user. Reference list Andres, S.G., Cole, D.M., Cummings, T.G., Garcia, R.R., Kenyon, B.M., Kurtz, G.R., McClure, S.C., Moore, C.W., O'dea, M.J. and Saruwatari, K.D., Mcafee, Inc., 2012.System and method of managing network security risks. U.S. Patent 8,201,257. Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Johnston, M.W. and Marshall, G.W., 2016.Sales force management: Leadership, innovation, technology. Routledge. Kotler, P., Keller, K.L., Manceau, D. and Hmonnet-Goujot, A., 2015.Marketing management(Vol. 14). Englewood Cliffs, NJ: Prentice Hall.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.