.

Saturday, June 22, 2019

Literature review for online booking system for dry cleaners

For online booking system for run dry cleaners - Literature review Exampleundry, ironing, dry cleaning and shoe repair to residents of east, west, north and south Belfast the system is user-friendly and easy to use for clients. It contains pages about the all washed up backwash and dry cleaning company, delivery service which includes the online booking service, prices, frequently asked questions, where to find them and the their contacts. In addition, they have also created pages that be in line with the services that they offer, these are domestic laundry services, commercial laundry services, dry cleaning services, ironing services, tailoring and shoe repair service.The visibility of similar websites that are available online is not at its best since it requires a lot of effort before one can locate a laundry and dry cleaning business that is online. The some common places that an individual can find such businesses is in online directories and even in such places, services suc h as online booking are absent. barely like other websites, the most common security threat for such websites is hacking to steal the clients credit card information or other crucial data. agree to Morgan (2006), the most common attack will be on SQL databases through the SQL direct injection attack this injection attack occurs where the cyber-terrorist gains access to a website and alter the databases either by deleting records in the datable or entire tables of data the method they do this is through making use of the weak points in the website code especially the way the website code queries the database. However this can be solved through keeping databases error quiet this means that when a hacker tries to detect vulnerabilities to exploit he will only find friendly messages that do not expose the vulnerabilities (Fernandez, Abraho & Insfran, 2011, p 118). The other solution is to take care all the data that is entered through form is checked and sanitized for any malicious c ontent before being entered in to the database (Aggarwal et al, 2005, p97).

No comments:

Post a Comment