Conducting Online Investigations Essay

Total Length: 2512 words ( 8 double-spaced pages)

Total Sources: 7

Page 1 of 8

Online Investigations for Website Management

When it comes to investigating and implementing tools for website management, there are so many things that can be applied. It is important to appreciate the different types of tools appropriate because there is no such thing as one size fits all. It is also clear that the diversity of proprietary and open source applications available over the Internet is increasing every day. Numerous of these can be of assistance to the website manager. Also, as consumers access websites that are from a growing diversity of devices, receptive Web design turn out to be more and more important. Implementing tools for website management is about building a Web manifestation that scales and purposes well on desktop, mobile devices and tablet. The inspecting size of each device is dissimilar, which generates challenges for Web designers, not only on account of the designs themselves but also by reason of the need to manage website constituents as they scale from one device to another. With that said, this essay will examine the tools for website management.

Intranet and Extranet

The intranet is essentially a small-scale version of the internet, operating with similar functionality, but existing solely within the firm. Like the internet, the intranet uses network technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP). It allows for the creation of internal networks with common internet applications that can allow them to communicate with different operating systems (Newell et al. 2000). Intranets serve an organization's digital communications needs. They also provide a secure space for storing, accessing and developing electronic materials. Using intranets to replace older business solutions can produce big gains in efficiency by speeding up workflows and reducing errors. Some specific intranet applications include network folders where multiple employees can access the same files, offline websites that can be tested for functionality before going live, digital reference databases for looking up facts and figures, internal email systems and instant messaging software.

Rocktime is an internet tool used to implement Intranet and Extranet. The Rocktime intranet platform allows organizations to control a diverse range of information efficiently, and most importantly communicate, manage and share this information internally between relevant staff. The Rocktime extranet is where this functionality is extended to include access for 'external' people, for example customers, suppliers and partners. Rocktime's intranet and extranet platforms allow your business to implement varying levels of access and user rights e.g. defining what each person can see and whether they can make changes to such information. In addition both platforms can be accessible securely over the internet via a web browser, consequently removing the constrictions of site-specific geography. As long as staff and users are connected to the internet they can securely access the company intranet or extranet.

Web Analytics OR SEO

When considering the different web analytics tools that your business requires, the plethora of available options can be overwhelming for businesses that may not understand how to use them. And that's where hiring someone to really dig into all of the reports can be vital. One tool is the Web analytics 2.0 is a three-tiered data delivery and analysis service for small and big businesses. The first is the data itself, as it measures the traffic, page views, clicks and more for both your website and for your direct competition.

Google Analytics is another good tool to use. A completely free service that generates detailed statistics about visitors to your website, Google Analytics is the simplest and most robust web analytics offering. Currently used by over 50% of the top 10,000 websites in the world, according to the site's usage statistics, you can find out where your visitors are coming from, what they're doing while on your site and how often they come back, among many other things.

Yahoo Web Analytics

Once you've mastered Google Analytics, Yahoo's similar offering gives you a little more depth in your surveying. It offers better access control options and a simpler approach to multi-site analytics, raw and real time data collection (unlike Google, you can import cost of goods data), visitor behavior and demographics reports and customized options as well. Yahoo Analytics is a bit of a step up from Google in terms of profiling, filtering and customization, so for those looking to dig a little deeper, it's a great option.

Security backups and penetration testing

Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process.
Unlike other scanners, Arachni takes into account the dynamic nature of web applications and can detect changes caused while travelling through the paths of a web application's cyclomatic complexity.

This way attack/input vectors that would otherwise be undetectable by non-humans are seamlessly handled by Arachni. Finally, Arachni yields great performance due to its asynchronous HTTP model (courtesy of Typhoeus). Thus, you'll only be limited by the responsiveness of the server under audit and your available bandwidth.

The Zed Attack Proxy (ZAP) is considered to be an easy tool to for finding susceptibilities in web applications. This device is intended to be used by individuals with a wide variety of security experience and as such is perfect for functional and developer testers who are new to diffusion analysis. ZAP offers automatic scanners in addition to a set of tools that permit you to find security vulnerabilities by hand. Another tool is the w3af which is an Audit Framework Web and Application Attack. The project's goal is to generate a framework to exploit and find web application weaknesses that is easy to extend and use.

Another tool that is effective is called the Vega. This device is considered to be an open source stage that is used so that it can test the safety of web applications. However, Vega can help a business find and authenticate Cross-Site Scripting (XSS), and SQL Injections, unintentionally unveiled sensitive information, and other weaknesses. This tool is written in GUI based, Java, and also runs on OS X, Linux, and Windows. This device does consist of a very effective computerized scanner which is used for quick tests and a diverting alternative for strategic review. One of the most interesting thing about this tool is that it can be drawn-out using a powerful API in the language of the web.

Social Media

Even social media can be looked at as one of the most effective ways a business to get more new leads and generate traffic. It is important to understand that having the right social media management tools and an attendance on all the major networks such as Twitter, Facebook, LinkedIn, and Google+ is a requirement these days for any big business. Nevertheless what type of publishing tools dashboards and marketing software, are the social media manager experts really using to juggle these numerous accounts?

One of these is the HootSuite for big businesses it is most popular social media management tool to collaboratively perform campaigns across numerous social networks such as LinkedIn and Twitter from one web-based dashboard (Morningstar, 2014). Hootsuite has turned out to be a vital tool for tracking conversations, handling social media, and determining campaign outcomes via mobile devices or web. Hootsuite provides a free, pro and creativity answer for managing limitless social profiles, improved analytics, cutting-edge message scheduling, Facebook insights integration and Google Analytics.

Buffer is an east and smart way to program content through social media. When a company thinks of Buffer it is much similar to a virtual queue the business is able to use in order to fill with content and then amazing posting times during the course of the day. This lets the company keep to an ongoing social media schedule that goes every day without being concerned in regards to micro-managing every one of the delivery times. Another interesting thing is that this device gives out analytics concerning the arrangement and reach of the business posts.

Big businesses can use IFTTT. This is a powerful Internet robotics site that can save a business a lot of time handling social media and other responsibilities through procedures. A business can basically attach any channel or major network together to systematize sharing on sites like LinkedIn, Twitter, Facebook, and more based on any action a business desire. Like directing out a tweet routinely every time a business publish a new blog post or receiving an email when your preferred periodical has something new to say. In addition to all of this, it works well with Hootsuite and Buffer and just improves those tools even more and is a must use for any serious social media expert.

Recommendations for Big Businesses

CoTweet is an outstanding instrument for small businesses or even divisions of superior businesses that extend social media responsibilities among team members and have a customer-service method to commitment. Similar to countless SMM services, CoTweet brings everything up-to-date automatically and follow-up messages are robotically dispensed….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Conducting Online Investigations" (2015, April 19) Retrieved May 21, 2024, from
https://www.aceyourpaper.com/essays/conducting-online-investigations-2150341

Latest MLA Format (8th edition)

Copy Reference
"Conducting Online Investigations" 19 April 2015. Web.21 May. 2024. <
https://www.aceyourpaper.com/essays/conducting-online-investigations-2150341>

Latest Chicago Format (16th edition)

Copy Reference
"Conducting Online Investigations", 19 April 2015, Accessed.21 May. 2024,
https://www.aceyourpaper.com/essays/conducting-online-investigations-2150341