Frequent Shopper Program, Part II
Christopher Prince
BSA/385
Vickie Shubert-Martin
December 3, 2012
Frequent Shopper Program, Part II Kudler Fine foods would like to enhance the clients shopping experience by developing a system in order to track the customer purchases which will be known as a Frequent Shopper Program. This will award loyalty points in order for the customer to have an opportunity to redeem these points for goods services. “Kudler Fine Foods is a Local upscale specialty food store committed to providing customers with the finest selection of specialty foods and wine.” Apollo Group Inc. (2010) this will keep track of the customers purchase habits in order to assist Kudler to offer their customers and valued
…show more content…
The goal will be to provide secure connections to all locations where Kudler is located which includes corporate headquarters and the ability to share files as a secure data transmission. Virtual Private network will be implemented to handle this task. A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. (Howstuffworks. 2011)
The Virtual Private Network will require a login each time a user needs to access the system implying that all users will be assigned passwords and usernames. The system will also keep in detail anyone who has logged in as a security precaution in order to keep track of who is going into their system and at what times.
Software Development Tools Object-Oriented interactive development environments have been chosen as the Software Development Tool for the software of the Frequent Shopper Program. The reason being is this tools shows software through pictures, object modeling, and graphical form which are the developers favorite because it permits the developer to create objects, which can provide future support. Available from IDE, StP/OMT uses the GE Object Modeling Technique methodology. StP/OMT allows the
VPN is the abbreviation of Virtual Private Network. A VPN can extend a private network (like local network) across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and thus benefit from the functionality, security and management policies of the private network [7].
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections and remote access facilities. OpenVPN allows authentication using certificates or username/password. OpenVPN can work in two different modes regarding encryption. It can use static encryption or Public Key Infrastructure (PKI). The advantage of static encryption is that it is very easy to configure. The disadvantage of this type setup is that if your encryption key is compromised, all VPN data can easily be decrypted. The PKI mode resolves many of the issues static encryption has. It
Kudler fine foods are a high level specialty food store with the finest series of food and wine. The storehouse is dedicated to offering top class foods to their consumers. Kudler fine foods would love to make an innovative program to follow any customer acquisition through a frequent shopper program. The frequent shopper program would gift loyalty points and give the chance to convert those points towards Kudler fine food products. The frequent shopper program will store customer purchase behavior, demographic information, which will assist in any promotions and store
Kudler Fine Foods (KFF), a virtual organization from the University of Phoenix (2008), is interested in developing and deploying a customer tracking system through a Kudler Frequent Shopper Program (KFSP) that would provide KFF data on shopping habits of cliental and in return provides customers with high-end incentives for shopping. The project will require the determination of requirements from KFF and their client base and a system analysis. This paper follows a systems analysis process by exploring business objectives and models, current and proposed system analysis, project constraints, functional requirements, cost benefit analysis, and design requirements with the assumed delivery being to an executive management
VPN refers to the networking technology Virtual Private Network. A VPN allows users connected to this network the ability to access any website or computer data from any location in the world with dedicated and secure networking environment rather than being present in a public server. Majority of VPN users belong to business class industry and educational purposes. VPN networks are used in this manner because majority of VPN networks offer the features like encryption and anonymity which increases the privacy and security benefits while using the VPN network. VPN networks also allow the user ability to perform activities on the internet as if they were accessing
The most secure networks are those that incorporate a virtual area network. This allows updating of information by employees and approvals or verification of those updates by authorized personnel. Access to this information calls for password and username protection by way of 128-bit encryption standards. If further, more detailed information would need updating or change, an authorized person will be required to input their information, including fingerprints. This is called multi factor authentication.
Kudler Fine Foods would like to develop a Frequent Shopper Program to track the purchases of their customers. As the purchases of a customer are tracked, they will accumulate loyalty points. A customer can redeem their points for gift items, specialty foods and other products or services.
Douligeris, C., Serpanos, D. (2007). VPN Benefits. Network Security: Current Status and Future Directions. John Wiley and Sons
The client by clicking on the word here, where he/she became a legitimate client of the enterprise network. But even though this, the client needs additional authentication for the purpose of access to existing applications on the network server. Case study application has been developed to demonstrate the access of the client to the enterprise application with addition to the security
As a business grows, an organization often expands to multiple offices across the country and even around the world. In order to expand and keep things running smoothly, the new offices need to have a fast and secure network to share information across computer networks. In addition, traveling employees like consultants and sales representatives need an equally secure and reliable way to connect to their business's computer network from remote locations. Fortunately, VPN (virtual private network) is one of the popular technologies to accomplish these goals. According to Tyson and Crawford, a VPN is a private network that uses the Internet to connect remote sites or users together. By using a VPN, an organization ensures security that non-authenticated user can intercept the encrypted data. This article will discuss about the advantages and disadvantages when VPN comes to its security and design to a higher level of secure communication when compared to other remote methods of communications, the cost to set up VPNs within an organization, and the scalability and flexibility in terms of growing with the company and adding new users to the network.
To secure remote connections, a virtual private network (VPN) will created using the Routing and Remote Access feature available within Windows Server 2012 R2. This feature allows end users to create a secure connection to the network by using Extensible Authentication Protocol-Transport Level Security (EAP-TLS) in addition to smartcards for authentication purposes. Traffic will also be encrypted by using Layer Two Tunneling Protocol over IPSEC (TechNet, 2016).
The company ABC will consist of several LANs, each of them will serve one part of the organization. Since the ABC Company is a worldwide company and has different location in various states and countries, it will require installing a WAN (Wide Area Network) to connect the different location with each other. All of these WAN connections will be set up as a VPN to have better, strong and secure communication within the business. The choice of VPN is because it is useful for multiples network connection. By using VPN it will be possible to share servers and other network resources among multiples offices across the world. Moreover, another advantage of using VPN is that all employees can work at the same time whether they are in or out of the office. Even those working at home are able to interact with each other and have the same work experience. The administrator will have full control over what the employee can do, for security purpose. (Advantages of using VPN Account).
Virtual Private Networks: It provides a private network over a shared infrastructure, it interconnect separate sites which are geographically far from each other, with the same privacy and facilities as a private network.
Penn State has its own VPN in order to establish a secure connection with the Penn State network from your home ISP using the VPN client. The client has addresses for network servers at Penn State that are set up to manage these virtual networks (its.psu). These servers and the VPN client are what give you access to the internal Penn State servers, which you could not access without (its.psu.edu). The VPN client contacts these network servers and creates a private connection that allows you to safely connect and transfer files to and from Penn State (its.psu.edu). Penn State has many different VPN services that you can access from your home network. Two of these services are the “ISP to PSU” connection and the the “LIAS-VPN” connection. While both of these VPN services allow you to connect to the Penn State network from home they work differently. The “ISP to PSU” connection is a VPN that allows you to connect to the Penn State campus wireless from your home ISP. This is just a connection into the Penn State network, it does not change your IP address and it looks like you are still at home. The “LIAS-VPN” works in a different way. While you still connect from your home ISP, it changes
Remote access has become a common part of many corporate networks, mainly because of the advance in telecommuting. Many companies have employees who rarely come to the office and work from home full time. These employees work from home or on the road including at coffee shops, libraries and various other locations. This means that the users need access to corporate resources using the internet. According to the book Fundamentals of information systems security by Kim, D., & Solomon, M. (2018), this remote access management system is tricky because you have to allow corporate employees access they need across public data network, but keep attackers out of these potential open doors. Nevertheless, remote access has become very popular in recent years with the advance of the technology system.