1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
2 years ago
15

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security

services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.
About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data
Computers and Technology
1 answer:
a_sh-v [17]2 years ago
7 0

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

<h3>How to explain the information?</h3>

Authentication works as follows:  

  • Prompting the user to enter the credentials.  
  • Send credentials to the authentication server.  
  • Match the credentials.  
  • Authorize the user and grants the acces

<u>External Website security:  </u>

  • Use of firewall.  
  • Implement the access control.  
  • Use of MVC (Model View Controller)
  • Use of encryption.  
  • Use of SSL certificate.
  • Use of security plugins.  
  • Use of network monitoring team.  

<u>Internal Website security:  </u>

  • Use of authentication to identify the user identity.  
  • Use of authorization to provide different user with the specific privileges and access.  
  • Encrypt or hide sensitive web pages.  
  • By implementing IT policies.  
  • Educate the user about the website.  

<u>Remote Access Solution</u>:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

<u>Firewall and Basic rules recommendations</u>:  

  • Firewall is important for managing the traffic and providing external website security.  
  • Rules to prevent SQL injection and XSS.  
  • Allow only the specific type of traffic.  
  • Use access rules for IP security.  
  • Implement certain IT policies.  

<u>Wireless Security:  </u>

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

<u>VLAN configuration:  </u>

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

<u>Laptop Security Configuration:  </u>

Use of password, VPN and the registering the laptop will provide laptop security. .  

<u>Application policy recommendations</u>:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

<u>Security and privacy policy recommendations:  </u>

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

<u>Intrusion detection or prevention for systems containing customer data:  </u>

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

brainly.com/question/5939963

#SPJ1

You might be interested in
What is analog computer? where is it used​
hichkok12 [17]

Explanation:

analogue computer is in computer which is used to process analogue data.

Analogue computer were widely used in scientific and industrial application

3 0
3 years ago
Read 2 more answers
Can someone explain to me the process of inserting fonts into pdf, please? Also, related to this topic, metadata about a font th
andreyandreev [35.5K]

Answer:

what is inserting fonts into pdf:Font embedding is the inclusion of font files inside an electronic document. Font embedding is controversial because it allows licensed fonts to be freely distributed.

4 0
3 years ago
Say you find a module in a package that does a lot of awesomely useful things, but the name of it is module_that_does_many_aweso
Ber [7]

Answer:

IDRK rename it!

3 0
4 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Write a statement that calls a function named IncreaseItemQty, passing the variable addStock. Assign mugInfo with the value retu
PolarNik [594]

Answer:

Explanation:

#include <stdio.h>

#include <string.h>

typedef struct ProductInfo_struct {

char itemName[30];

int itemQty;

} ProductInfo;

ProductInfo IncreaseItemQty (ProductInfo productToStock, int increaseValue) {

productToStock.itemQty = productToStock.itemQty + increaseValue;

return productToStock;

}

int main(void) {

ProductInfo mugInfo;

int addStock;

addStock = 10;

scanf("%s", mugInfo.itemName);

scanf("%d", &mugInfo.itemQty);

**** /* Your solution goes here */ ****

printf("Name: %s, stock: %d\n", mugInfo.itemName, mugInfo.itemQty);

return 0;

}

8 0
3 years ago
Other questions:
  • Which type of energy conversion is an electric generator designed to perform?
    8·1 answer
  • ( answer goes here) are pictures that you can click on to tell your computer what to do.
    10·2 answers
  • Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work
    13·2 answers
  • Why is it more important now than ever before to know how to evaluate websites and other online sources of information?
    7·1 answer
  • Which is most likely a presentation file?
    8·1 answer
  • A device which lets you interact with the computer
    6·2 answers
  • _____ are the most fundamental components of designing a training program that determine the amount of stress placed on the body
    6·1 answer
  • ICT 10
    8·1 answer
  • Does watching Beastars make me a furry? ​
    12·1 answer
  • An outpatient provides the following id: barbara jones, birth date 8/15/63. should a specimen be collected for this lab order?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!