This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Dance

Mobile Website

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Mobile Website

Evernote’s ecosystem

Evernote is an application by the Evernote Corporation launched in 2008. It is designed for note-taking, storage of images, notes, and articles from the web, organizing, and managing tasks. Based on the fact that Evernote users use the application on different devices, the company ensured that these users have a friendly interface to work with, from whichever device. Its services include taking notes, storing them, saving web articles and images, and sharing files. The application’s overall design is quite simple, and the refined graphic affordances guide the operators to start using the application. The application also has a practical onboarding experience that focuses on creating notes, saving files, images, and notes from the internet and turning on notifications (Douglas, 2018). The search UI is very user friendly as it is fast and powerful, irrespective of the plan you’re using. Evernote has a free-tier plan, and two paid tiers – premium and business, that allows all users, whether paying or not, to have a pleasant experience with the application. Ideally, the topography of the UI is legible and beautiful due to the color differentiators; thus, making Evernote’s user interface very user friendly.

Development of best practices for mobile cloud

Evernote offers a cloud-based service that allows users to store data to be accessed from any device that is connecter to the web (Landesman, 2019). Firstly, Evernote’s security mechanism on the user interface is the username and the password, which protects the user’s data from malicious people. However, with the current technological advancements, this system could be breached easily. Secondly, the company uses the SSL encryption for data being transmitted and AES-256 encryption for protecting the data stored by users (Landesman, 2019). Users are encouraged to avoid storing relevant confidential data on the application and employ the two-step verification and one-note encryption (Finbråten, 2018).

Despite AES-256 encryption being strong for protecting stored data, it is not the strongest. Being symmetrical, it would need an asymmetrical algorithm to make it stronger. Thus, Evernote developers should adopt the new RSA encryption that supports lengthy keys of 2048- and 4096- bit keys (Butler & Vatu, 2018). Despite RSA being slow, it could be used to encrypt the keys for a symmetrical algorithm such as AES (Butler & Vatu, 2018). Additionally, with the emerging trends in technology, SSL encryptions are being faced with several vulnerabilities (Kinsta, 2020). Thus, Evernote could adapt the emerging TLS encryption, which is secure and well-performing compared to its predecessor, the SSL encryption (Kinsta, 2020).

Implementing Internal controls

Internal controls are policies that an organization sets up to ensure that it is protected from financial, strategic, and reputational risks while ensuring the organization remains resourceful and effective in its operations (Walsh, 2020). An example of internal control is monitoring, with which Evernote could implement. Monitoring is an effective way to ensure that control activities are performed as expected while at the same time doing controlling the existent and potential risks iteratively (Walsh, 2020). Ideally, as much as an organization has its internal control mechanisms in order, constant monitoring is essential to ensure efficient operations of the set controls.

References

Butler, S., & Vatu, G. (2018, August 8). What is the Strongest Encryption Today? Retrieved from https://www.technadu.com/strongest-encryption/37596/

Douglas, S. (2018, September 25). UX case study: Evernote for iOS. Retrieved from https://www.justinmind.com/blog/ux-case-study-evernote-for-ios/

Finbråten, C. (2018, February 5). How to make Evernote secure. Retrieved from https://www.dandywithlens.com/how-to-make-evernote-secure/

Kinsta. (2020, March 18). TLS vs. SSL: What’s the Difference? Which One Should You Use? Retrieved from https://kinsta.com/knowledgebase/tls-vs-ssl/

Landesman, M. (2019, June 24). 7 Things You Should Never Do in Evernote. Retrieved from https://www.lifewire.com/evernote-tips-you-should-avoid-153286

Walsh, K. (2020, May 11). Internal Controls: What Are They & Why You Should Care. Retrieved from https://reciprocitylabs.com/what-are-internal-controls-and-why-are-they-so-important/

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask