StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Answers question based on - Case Study Example

Cite this document
Summary
This entity provides a mechanism where one party can make cross-border payments through the internet. TradeCard provides more secure, easier, and cheaper payment alternatives for international…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Answers question based on case study
Read Text Preview

Extract of sample "Answers question based on"

Case Study Case Study Introduction TradeCard facilitates electronic commercial transaction from one business to another. This entity provides a mechanism where one party can make cross-border payments through the internet. TradeCard provides more secure, easier, and cheaper payment alternatives for international trade. 1 Main elements of security protocol of trade card systemAuthenticationUser authentication is primarily handled through a combination of a username, password, and a smart card system.

A Global secure site certificate ensures that user utilizes only the valid TradeCard system in the TradeCard website. Authentication of electronic data in TradeCard is done using digital signatures that accurately verifies whether a certain user has an existing electronic document (Farhoomand & McCauley, 2008, p. 6). ConfidentialityTradeCard is very strict never to disclose private information, confidential transaction data, or business details to external parties without permission from the users.

Members’ personal identifiable information and confidential transaction data are only shared with other participating business partners and with TradeCard’s coalition partners. TradeCard uses a Global secure site that ensures the client browsers are highly confidential. The server certificates in this site have a strong (a 128-bit) encryption on all transactions between a client’s browser and TradeCard system servers (Farhoomand & McCauley, 2008, p. 7).Integrity Data integrity in any transaction is very important to people involved.

That is the reason TradeCard system provides a high-level of assurance that unauthorized person cannot alter any data in a transaction. Digital signatures protect integrity of user’s documents in the system. The Global site system can prove the integrity of a document in future by passing the document information and public key into a digital signature verification algorithm. In case of any type of data manipulation, the verification process will be unsuccessful (Farhoomand & McCauley, 2008, p. 11). 2 Levels of security built into the system architecture at TradeCardIn its effort to provide secure means of conducting global transactions, beside from the strict application procedures and verifications followed via Thomas Cook and Coface, TradeCard has created a complex security system.

The architecture of the system has three built levels of security; these are, 2-factor user authentication, server authentication, and digital signaturesServer authentication (128-bit Digital Server ID)The Global Secure Site Certificate secures TradeCard system, where by the Secure site ID ensures the user’s browser is encrypted with the communications encryption of 128 bit for US web browser and 40 bit for an exportable Web browser. Each server is protected by a user ID password to enter to the machine, double layers ensures only verified transactions enters under set protocols.

Direct access to the database is forbidden and all information passes via the application server for extra security (Farhoomand & McCauley, 2008, p. 20). 2-Factor User Authentication: Consists of,an authorized login or ID and password andan authentication code A smart card technology consisting of a wireless reader is used to match a test code before accessing the system during user authentication. When a user login into the business site, the system uses short text file found temporarily on a member’s browser to preserve user session records.

These cookies are immediately destroyed after a log out and cannot be used as a means to access any information about the user or his computer.Digital signaturesDigital signatures are necessary for one to login the TradeCard system. These Signatures validate electronic data and verify that a particular user has a valid electronic document. A false digital signature blocks any transaction and further effort to go ahead with the transaction is aborted (Farhoomand & McCauley, 2008). 3 How the TradeCard ensured physical security of its infrastructureTwo-factor authentication is used to ensure physical security of TradeCard’s system infrastructure.

Users can only change their passwords upon initial login and once in a while afterward. Strong passwords are highly recommended ensuring a minimal length that consists of digits, both common and special characters. Member’s login is protected by the 128-bit encryption in the Secure Socket Layer part found between the server and the browser. Protection of the user ID and password however is not guaranteed as someone can obtain them by looking if the user is not careful (Farhoomand & McCauley, 2008, p. 30).TradeCard gives additional security to all verified members through the TradeCard e-identity protection system, which provides a one-time access code.

This information cannot be accessed by TradeCard‘s employees and only the user knows the login details. User’s database contains only puzzling values hence it is difficult for a third party to interpret. The user has an inactive time-out that requires re-entry of ID and password to re-authenticate identity during login session (Farhoomand & McCauley, 2008, p. 32). ReferenceFarhoomand, A. & McCauley, M., 2008. TRADECARD: BUILDING A GLOBAL TRADING. Communications of AIS, 7(18), pp. 1-34.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Answers question based on case study Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1622846-answers-question-based-on-case-study
(Answers Question Based on Case Study Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1622846-answers-question-based-on-case-study.
“Answers Question Based on Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1622846-answers-question-based-on-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Answers question based on case study

Relaxing & Energizing

George has trouble getting psyched up effectively for workouts, particularly when he knows that the coach has a tough… Conversely, he is often too psyched up for races, wasting a lot of energy worrying about how he'll perform, and getting so nervous at the start of races that he often goes out at too fast of a pace and has no energy left to PE 305: APPLIED SPORT PSYCHOLOGY case study 9 –Relaxing & Energizing Our Way to Success Psyched Out Runner -- George is a collegiate distance runner who has problems practicing and competing at his best because he is often under or overaroused....
2 Pages (500 words) Case Study

Perspectives on Early Education

Some experts have warned about the negative effects associated with learning a foreign language at an early age based on several reported cases.... The paper "Perspectives on Early Education" says that with the increasing globalization the ability to speak other languages is becoming a necessary and important factor for success in the present days....
6 Pages (1500 words) Case Study

OD ethics and values,

When it comes to the case of Northern Country Legal Service, it has been providing OD consultancy service with the help of its director, Julie.... The NCLS staff members ask these questions to clients in order them to be ready to provide proper answers.... In recent years, many organizations have been employing professional OD consultants in order to get them assisting in bringing change more effectively....
4 Pages (1000 words) Case Study

Are traffic fatalities another consequence

hellip; The researchers do not state, explicitly, their research questions but the title of the article and the scope of the study suggest the following research question.... The researchers do not state, explicitly, their research questions but the title of the article and the scope of the study suggest the following research question.... The inferred research question is important because it clarifies the problem of the study and the basis for developing research methodology....
2 Pages (500 words) Case Study

Attributes of Venture Teamwork in Tertiary Entrepreneurship Programs

The author of the case study "Attributes of Venture Teamwork in Tertiary Entrepreneurship Programs " states: As we have decided as group members after our first meeting to write about group work, setting the main lines and structuring down the workshop, it was missing a guideline to follow.... To start with the process that we went thru as follow 1- documenting the problem as in our case when we asked the student the impacts of this problem over them groups and why its important that they should train and get over this problem 2- we should investigate the problem as we have done searching and collecting data from different sources thru good references and highly used websites of an international college well recognized in communication context 3- plan the need analysis where we have identified the urgency of our workshop and when to set the agenda based in our turn in week 13 , and for our next meeting to distributed the work over the whole group to collect the data and consider which is the appropriate source....
10 Pages (2500 words) Case Study

Human Behavior Theory - a Diversity Framework

The study "Human Behavior Theory - a Diversity Framework" states that the learning theory by Bandura, Watson, and Skinner, goes in line in line with psychodynamic theory by Erikson and other behaviorist theories and applies to children's development and day-to-day activity.... In states learning determines one's behavior, in our case, little Jomana is a child that is eager to explore thus explaining the brightness of the child.... In our case, Jomana stamps her foot and discovers it emits sound....
9 Pages (2250 words) Case Study

Brown v. Swett & Crawford of Texas

To answer the question in the case study, Brown did not have a partnership claim because initially IBS asked Galtney to operate the office not Brown and it was Galtney who wanted Brown to join them so no official agreement was signed, only an oral statement of sharing of profits.... Bechtel National case study This case study deals with the at-will-employment concept in the USA.... National Resources Defense Council case study The Clean Air Act Amendments of 1977 (Amendments) made requirements implementable to states that had not acquired the national air quality standards established by the Environmental Protection Agency (EPA) in earlier rules....
3 Pages (750 words) Case Study

Layout and Configurations of the Building

… The paper "Illustrating the Layout and Configurations of the Building " is an outstanding example of a case study on engineering and construction.... nbsp; The paper "Illustrating the Layout and Configurations of the Building " is an outstanding example of a case study on engineering and construction.... The layout of the building is based on the concept that the visitors will directly report to the reception area and their further movements will be channelized as per their respective needs as are associated with the appropriate usage of the building....
17 Pages (4250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us