Thursday, November 21, 2019
Literature review for online booking system for dry cleaners
For online booking system for dry cleaners - Literature review Example undry, ironing, dry cleaning and shoe repair to residents of east, west, north and south Belfast; the system is user-friendly and easy to use for clients. It contains pages about the all washed up laundry and dry cleaning company, delivery service which includes the online booking service, prices, frequently asked questions, where to find them and the their contacts. In addition, they have also created pages that are in line with the services that they offer, these are; domestic laundry services, commercial laundry services, dry cleaning services, ironing services, tailoring and shoe repair service. The visibility of similar websites that are available online is not at its best since it requires a lot of effort before one can locate a laundry and dry cleaning business that is online. The most common places that an individual can find such businesses is in online directories and even in such places, services such as online booking are absent. Just like other websites, the most common security threat for such websites is hacking to steal the clientsââ¬â¢ credit card information or other crucial data. According to Morgan (2006), the most common attack will be on SQL databases through the SQL direct injection attack; this injection attack occurs where the hacker gains access to a website and alter the databases either by deleting records in the datable or entire tables of data; the method they do this is through making use of the weak points in the website code especially the way the website code queries the database. However this can be solved through keeping databases error quiet; this means that when a hacker tries to detect vulnerabilities to exploit he will only find friendly messages that do not expose the vulnerabilities (Fernandez, Abrahà £o & Insfran, 2011, p 118). The other solution is to ensure all the data that is entered through form is checked and sanitized for any malicious content before being entered in to the database (Aggarwal et al, 2005, p97).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.