What problems does a company face when someone hacks data

Assignment Help Management Information Sys
Reference no: EM131299365

Discussion.

E-Commerce offers the promise of conducting business on the Internet, via Web-enabled applications. This allows organizations to sell and deliver products and services to customers remotely via the Internet. However, there are security concerns, for both the organization's assets as well as the customer's personal information.

Please respond to all of the following prompts:

• What problems does a company face when someone hacks into their data?
• Identify the legal aspects of loss of customer personal information? (Search the Web)
• Compare and contrast the advantages of tables and views.

Assignment

You were asked to develop a database table in MySQL for a customer service tool. Based on the structure of the table in MySQL, create a form that would let customer service agent retrieve customer information from the database.

The form should have the ability to perform multiple searches. At a minimum, the form should allow search by customer name and by phone number. The option to search by either parameter should be available on the form, and a search should be possible regardless of which search option is chosen.

Design the PHP page that will take information from the user input on the web form and will submit it to the MySQL database, and will retrieve the customer information.

If no information is found in the database, the Web page should return an appropriate message indicating no records found.

Note: Be sure to enter in some fictitious customer information into the MySQL database table, so that you can test and demonstrate a working application.

• PHP source code
• Screenshot of the Web form
• Screenshot of the working page accepting input from the user and successfully returning customer information from the database.

Reference no: EM131299365

Questions Cloud

Design questionnaire to satisfy roxanne freemans information : Critically evaluate the questionnaire.- Will Canterbury Travels gain the information it needs from this survey?-  Design a questionnaire to satisfy Roxanne Freeman's information needs.
Represent situation of restaurants with an e r diagram : Each menu has many menu items, and items can appear on multiple menus, and with different prices on different menus. Represent this situation of restaurants with an E-R diagram.
Provide another recommendation : Provide another recommendation.- Just conduct more research on the area of expanding menu. Read the file for detailed instruction.
Describe national trends that will affect the brand : Give a brief description of the company, the selected brand, its functionality and/ value offering.- Describe national trends that will affect the brand.
What problems does a company face when someone hacks data : What problems does a company face when someone hacks into their data? Identify the legal aspects of loss of customer personal information? Compare and contrast the advantages of tables and views.
Explain concisely and clearly your protocol a and b : Describe concisely and clearly your protocol A and B. Make the protocolsrealistic (think that you play it with your friends). Present small concrete examples for both protocol A and protocol B, and show how your protocols run in these cases.
Do you object to any of these course policies : Students are certainly somewhat dependent on their teachers. Do you object to any of these course policies? If so, which ones, and why?
Discuss occurrence or breach or disaster that has happened : Discuss the occurrence or breach or disaster that has happened. Perform a risk assessment and threat identification section for the organization that you have chosen, as RISK ANAYSIS AND THE.
Describe national trends that will affect the brand : Describe national trends that will affect the brand.- Describe the brand's competitive advantage in terms of quality, price, selection, location, and service.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop the system according to design specification

Plan and Design a Small System Project, You will use the information learned throughout the course to identify and document a full information system for a small company. Develop the system according to your design specification

  Does the article provide an adequate literature review

Does it discuss current research on the problem and help to situate the author's own research through a clear analysis/presentation of the literature (think about how it connects to the problem statement)? Is the research question clear and/or pur..

  Discuss the basic concepts of simple systems

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Discuss the basic concepts of simple systems

  Recommend for creating xbrl-tagged documents

Read "Six Steps to XBRL" by Phillips, Bahmanziari, and Colvard in the February 2008 issue of Journal of Accountancy. a. Is XBRL relevant to companies that don't file with the SEC? Justify your response. b. List the six steps the authors recommend for..

  Differences between systems and applications software

What are differences between systems software and applications software? Give an example

  Human resource information systems

Review the human resource information systems (HRIS) along with other HR web pages in the intranet section for Kudler Fine Foods in the Virtual Organizations

  Local franchises'' co-operation with corporate parents, 7-11

Japan ensure that local decision-makers simultaneously do what's best for customers and the corporate parent

  Software application implementationprepare a paper

software application implementationprepare a paper describing a successful or unsuccessful software application

  Describe the operational components of planning sourcing

describe the operational components of planning sourcing making and delivering. describe the importance of sales

  Compare and contrast footprinting and port scanning

Compare and contrast footprinting and port scanning. Determine which you believe is the more important step in the hacking process and explain why. Evaluate whether or not you believe these processes are more difficult for an enterprise. Justify y..

  Network security hardware and recommended security policy

Network security hardware and recommended security policy components

  Explain what is meant by security policy

Explain what is meant by security policy and describe the basic information that a security policy must stipulate. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your respon..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd