SOLUTION: IT 407 Saudi Electronic University Algorithms & Data Structures Questions
SOLUTION: IT 407 Saudi Electronic University Algorithms & Data Structures Questions.
View attached explanation and answer. Let me know if you have any questions.
IT Professional Issues
Case Scenario
Suppose that you are a Software Developer, and you own a startup company. You and
your team are working now to develop a shopping website. For a great shopping experience,
your website should track some private information about customers. Such information can be
either provided by customers or collected automatically by using some technologies.
By considering the given scenario, please answer the following questions:
1. Your shopping website collects and stores customers’ personal information such
as credit card information, email, addresses, etc. Explain in detail how you can
protect your customers’ privacy?
The website owner is morally and legally liable to ensure customer privacy. There are
various ways to protect customer privacy. First, the shopping website must only collect data it
will use. Collecting data just because it is possible increases liability if it is lost. Most online
stores landing pages are CTA (call to action) optimized; therefore, collecting personally
identifiable data is easy (Parikh, 2017). But first, the website owner should conduct a data
audit to comprehend the business-relevant data, what is being collected and how data is
secured after storage. Notably, legal obligations should be addressed if the website handles
financial, medical, and minors’ data.
Customer names and credit card information are vital in facilitating fast checkouts.
However, it is not necessary to use online servers to store them. Suppose such information is
stored online, the cybersecurity wager doubles. Besides, it goes against the Peripheral
Component Interconnect (PCI) principles (Singh, 2014). Instead, the software developer may
consider offline storage far from hacker privy or outsource payment facilitation from Stripe
or Paypal to handle all transactions related to credit cards.
In addition, the software developer may consider the Secured Sockets Layer (SSL)
encryption to ensure online security for the consumers. Turnkey solutions such as SSL
Certificates encrypt any data exchanged between servers (Parikh, 2017). Apart from adding a
security layer above and over the firewall, it amplifies the website’s trustworthiness of the
shopping website. After the website is configured with an SSL certificate, the online store’s
address bar will include a highlighted URL alongside a padlock symbol, all in green. The
website owner must consider the PCI Standards for Data Safety (PCI DSS). Any website
transacting money must ensure compliance with PCI DSS because it is a universal ecommerce security benchmark that determines a safe website to transact money (Singh,
2014).
Noteworthily, outdated software and applications are prone to hacks. Hackers exploit
older version vulnerabilities (Singh, 2014). Therefore, as hackers develop better software to
penetrate systems, software developers must be at the top of …
15 Million Students Helped!
Sign up to view the full answer
SOLUTION: IT 407 Saudi Electronic University Algorithms & Data Structures Questions