Vanessa Hershberger-Bahena & Jose Cabrera
IS 3445: Security for Web Applications and Social Networking
May 22, 2014
Orange, CA
Hershberger-Bahena, Vanessa
Cabrera, Jose
May 18, 2014
IS 3445: Security for Web Applications and Social Networking
Transforming to an E-Business Model
Project part 1
Identifying E-Business and E-Commerce Web Apps for Planned Transformation
Introduction
Our world has changed drastically in recent years; we are living in the age of globalization and fast economic growth. Internet trading (e-commerce) has become an important part of our busy lifestyle and major part of every business sector in the world. As our lives have change the internet has changed …show more content…
The technologies used for e-commerce include the Internet, electronic mail, EFTPOS, telephone and fax machines. E-commerce is relatively cheaper than traditional way of doing business and offers its users the opportunity for global market reach.
In order to succeed in today’s highly competitive market more and more businesses regardless of their size or structure are looking for easier ways to communicate with the outside world; for that reason they are considering the incorporation of electronic commerce (e-commerce) into their business plans. Some of the ways that small businesses can benefit from e-commerce and internet trading is reduced advertising, promotion costs and at the same time they are able to increase the amount of consumer demographic information they collect as it is done easier and faster over the internet than with a traditional way of advertisement. We all know that well informed business is able to understand consumer purchasing patterns and make appropriate decisions in order to enhance customer-service and …show more content…
From the conception of software development, as studies have shown that the cost of remediation vulnerabilities or flaws in software/application design are far lower when they’re caught and fixed during the early requirements/design phases than after launching the software into production. Therefore, the earlier you integrate security processes into the development life cycle, the cheaper software development becomes in the long run.
Guidelines & Procedures
A software application typically undergoes several development lifecycles, corresponding to its creation and subsequent upgrades. Each such development lifecycle constitutes a project. Such projects continue until the underlying technology ages to the point where it is no longer economical to invest in upgrades and the application is considered for either continued as-is operation or retirement.
This Guideline applies to all major application projects, both new applications and upgrades of existing applications. The goals of this SDLC approach are to:
Deliver quality systems which meet or exceed customer expectations when promised and within cost estimates.
Provide a framework for developing quality systems using an identifiable, measurable, and repeatable