Tuesday, May 14, 2019

Literature review for online booking system for dry cleaners

For online booking frame for dry cleaners - Literature review Exampleundry, ironing, dry cleaning and shoe repair to residents of east, west, northern and south Belfast the system is user-friendly and easy to use for clients. It contains pages about the all washed up wash and dry cleaning company, delivery service which includes the online booking service, prices, frequently asked questions, where to pay back them and the their contacts. In addition, they fox also created pages that ar in line with the services that they offer, these are domestic laundry services, commercial laundry services, dry cleaning services, ironing services, tailoring and shoe repair service.The visibility of similar websites that are available online is non at its best since it requires a lot of effort before one can lay a laundry and dry cleaning business that is online. The most common places that an individual can find such businesses is in online directories and even in such places, services suc h as online booking are absent.Just like other websites, the most common security threat for such websites is hacking to steal the clients deferred payment card in fixation or other crucial data. According to Morgan (2006), the most common attack forget be on SQL databases through the SQL direct injection attack this injection attack occurs where the hacker gains glide path to a website and alter the databases either by deleting records in the datable or entire tables of data the regularity they do this is through making use of the weak points in the website encrypt especially the way the website code queries the database. However this can be solved through keeping databases error quiet this means that when a hacker tries to detect vulnerabilities to exploit he will only find friendly messages that do not expose the vulnerabilities (Fernandez, Abraho & Insfran, 2011, p 118). The other solution is to ensure all the data that is entered through form is checked and sanitized for a ny malicious content before being entered in to the database (Aggarwal et al, 2005, p97).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.