Computer Security Briefly Support Your Term Paper

  • Length: 8 pages
  • Subject: Education - Computers
  • Type: Term Paper
  • Paper: #36332437

Excerpt from Term Paper :

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010).

C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it improve trust?

First, the reliance on public-key cryptography from unfamiliar sites can increase trust by having the specific security levels of security configured on an enterprise-wide network to only support more advanced forms of cryptography-based configurations (Galindo, Herranz, 2008). In other words configuring an entire network to support only the more advanced forms of public-key cryptography can make each site accessed more trustworthy. In organizations this is possible yet in individual system and website use, the reliance on certificate-based encryption significantly increases trust (Galindo, Morillo, Rafols, 2008).

D1. Rapid growth of the Internet is triggering dramatic changes in traditional business methods and practices. But some industries and businesses seem better able to deal with the online world than others. For this question, identify a business or a service function you are familiar with. Describe and defend your strategy for implementing a web-based application to support that business or service. Be sure to conduct an environmental scan, determine best practices, identify information technology elements (infrastructure or capabilities) necessary to conduct the business, and a strategy for capitalizing on the success of your venture in the next iteration. (2 pages, 6 APA)

The most critical aspect of any company's ongoing operations and its future growth is the strength and depth of its relationships with customers. Given the pressure software companies are under to continually stay on top of their customers' needs and rapidly innovate, these company's rapid adoption of Software-as-a-Service (SaaS) Customer Relationship Management (CRM) applications is understandable (King, 2010). Further fueling the urgency to adopt CRM on the SaaS-based delivery model is the growing acceptance of this platform by Chief Information Officers (CIO) who is historically the most conservative members of senior management teams (Creeger, 2009). Based on an environmental scan of the use of SaaS for CRM-based strategies the finding has emerged that organizations prefer being able to pay a monthly fee for access, accounting for these fees as operating expenses (OPEX) (Hill, 2008). This is quite a shift in how enterprise software is purchased as the majority of the time the costs are included in larger capital budgets (CAPEX). Often CAPEX-based spending for software must be approved by a company's board of directors and therefore can take months or years in some cases to get approved. The environmental scan of companies adopting CRM on the SaaS platform showed that the ability to pay for the software on a monthly basis while also scaling it globally throughout an organization is a powerful catalyst for adoption (Kenney, 2007).

Just as rapidly as CRM is being adopted on the SaaS platform, often with the support of CIOs (Creeger, 2009) an evolving set of best practices is beginning to also emerge. These best practices center on aligning the highly specific and unique business processes within organizations to the CRM systems as combined these systems allow for faster attainment of initiatives, plans and strategic goals (Concha, Espadas, Romero, Molina, 2010). The reliance on Business Process Management (BPM) (Hoskins, 2008) techniques to further streamline critical customer-facing and internal processes that rely on customer information has also delivered measurable financial results for SaaS early adopters (Creeger, 2009). The economics of SaaS, combined with the commitment on the part of companies to re-architect their processes to capitalize on a higher quality and speed of delivery of customer information, is in the process of significantly increase company performance (Hill, 2008).

The technological implications of SaaS are highly dependent on the underlying Web programming languages the applications are based on, with Asynchronous JavaScript (AJAX) being the most prevalent due to its speed and customization advantages (Bajaj, Bradley, Cravens, 2008). The most challenging aspect of adopting SaaS as a platform for delivering CRM applications however is in integrating the new platform to legacy systems, many of which are decades old within the companies adopting SaaS platforms (Bajaj, Bradley, Cravens, 2008). CIOs are finding that the investments in SaaS integration are worth it (Creeger, 2009) as the streamlined business processes (Bajaj, Bradley, Cravens, 2008) deliver greater efficiency and greater accuracy of customer records (Hill, 2008). When all of these factors are combined many companies using SaaS for CRM strategies begin to integrate data modeling and advanced analytics in their firms (Hoberman, 2010). The ability of companies to quickly interpret the advanced analytics that are available through greater integration with customer data is proving to be a competitive advantage in better understanding unmet market needs (Hill, 2008). When implemented correctly SaaS-based CRM systems then can become a powerful catalyst for greater competitive advantage in each of the markets they serve.


Jason E. Bailes, & Gary F. Templeton. (2004). Managing P2P Security. Association for Computing Machinery. Communications of the ACM, 47(9), 95-98.

Bajaj, oA., Bradley, W., & Cravens, K.. (2008). SAAS: Integrating Systems Analysis with Accounting and Strategy for Ex-Ante Evaluation of IS Investments. Journal of Information Systems, 22(1), 97-124.

Caviglione, L.. (2009). Understanding and exploiting the reverse patterns of peer-to-peer file sharing applications. Network Security, 2009(7), 8-12

Chevalier, Y., & Rusinowitch, M.. (2010). Compiling and securing cryptographic protocols. Information Processing Letters, 110(3), 116.

Concha, D., Espadas, J., Romero, D., & Molina, a.. (2010). The e-HUB evolution: From a Custom Software Architecture to a Software-as-a-Service implementation. Computers in Industry, 61(2), 145.

Creeger, M.. (2009). CTO Roundtable: Cloud Computing. Association for Computing Machinery. Communications of the ACM, 52(8), 50.

Leon Erlanger. (2004, February). IM and P2P Security; the explosion of IM and P2P in the workplace can be a security nightmare. Here's how to keep your network - and your company - safe. PC Magazine, 23(2), 68+.

Galindo, D., & Herranz, J.. (2008). On the security of public key cryptosystems with a double decryption mechanism. Information Processing Letters, 108(5), 279.

Galindo, D., Morillo, P., & Rafols, C.. (2008). Improved certificate-based encryption in the standard model. The Journal of Systems and Software, 81(7), 1218.

Gaspary, L., Barcellos, M., Detsch, a., & Antunes, R.. (2007). Flexible security in peer-to-peer applications: Enabling new opportunities beyond tile sharing. Computer Networks, 51(17), 4797.

Sidney Hill, & Jr.. (2008, January). SaaS economics seem to favor users more than vendors. Manufacturing Business Technology, 26(1), 48.

Steve Hoberman. (2010). Data Modeling in the Cloud: Will the cloud make our data management jobs easier or harder?. Information Management, 20(2), 32.

Mike Hoskins. (2008). Solving the SaaS, SOA and Legacy Applications Sudoku. DM Review, 18(5), 21.

Brad Kenney. (2007, September). LIFE BEYOND CRM: SaaS Grows Up. Industry Week, 256(9), 38-39.

King, J.. (2010, February). Beyond CRM: SaaS Slips into the Mainstream. Computerworld, 44(4), 16-18,20.

Landau, S.. (2008). Privacy and Security a Multidimensional Problem. Association for Computing Machinery. Communications of the ACM, 51(11), 25.

Linda Leung. (2005, June). Hackers for hire. Network World, 22(24), 47.

Libeau, F.. (2008). Automating security events management. Network Security, 2008(12), 6-9.

Lowe, N.. (2009). Shields Up! Protecting browsers, endpoints and enterprises against…

Cite This Term Paper:

"Computer Security Briefly Support Your" (2010, April 24) Retrieved February 8, 2017, from

"Computer Security Briefly Support Your" 24 April 2010. Web.8 February. 2017. <>

"Computer Security Briefly Support Your", 24 April 2010, Accessed.8 February. 2017,