1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
1 year ago
15

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security

services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.
About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data
Computers and Technology
1 answer:
a_sh-v [17]1 year ago
7 0

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

<h3>How to explain the information?</h3>

Authentication works as follows:  

  • Prompting the user to enter the credentials.  
  • Send credentials to the authentication server.  
  • Match the credentials.  
  • Authorize the user and grants the acces

<u>External Website security:  </u>

  • Use of firewall.  
  • Implement the access control.  
  • Use of MVC (Model View Controller)
  • Use of encryption.  
  • Use of SSL certificate.
  • Use of security plugins.  
  • Use of network monitoring team.  

<u>Internal Website security:  </u>

  • Use of authentication to identify the user identity.  
  • Use of authorization to provide different user with the specific privileges and access.  
  • Encrypt or hide sensitive web pages.  
  • By implementing IT policies.  
  • Educate the user about the website.  

<u>Remote Access Solution</u>:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

<u>Firewall and Basic rules recommendations</u>:  

  • Firewall is important for managing the traffic and providing external website security.  
  • Rules to prevent SQL injection and XSS.  
  • Allow only the specific type of traffic.  
  • Use access rules for IP security.  
  • Implement certain IT policies.  

<u>Wireless Security:  </u>

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

<u>VLAN configuration:  </u>

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

<u>Laptop Security Configuration:  </u>

Use of password, VPN and the registering the laptop will provide laptop security. .  

<u>Application policy recommendations</u>:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

<u>Security and privacy policy recommendations:  </u>

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

<u>Intrusion detection or prevention for systems containing customer data:  </u>

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

brainly.com/question/5939963

#SPJ1

You might be interested in
Greg is the purchasing manager at a jeans-manufacturing company. He knows he could save his company money by using cheaper, thin
olasank [31]

Answer: B) Character

Explanation:

According to the question, character of Greg is depicted through the scenario as he is displaying his moral quality ,honesty and mind integrity through not providing low-quality product to his customers even though he has chance to save company money through buying shape material  .

Thus, he has good character to provide quality product and maintaining reputation and company as well as valuing his customers.                      

Other options are incorrect because fairness, community, expertise and competence are not the quality trait depicted through question's scenario. Thus, the correct option is option(B).

4 0
3 years ago
What is the definition of Graphic AIDS?.
V125BC [204]

Any image that helps you, the reader, understand the text that the visual aid is accompanied with is referred to as a visual graphic or graphic aid.

Too frequently, readers lazily scan or entirely ignore graphs, diagrams, charts, and tables. Grid graphs, tables, bar charts, flow charts, maps, pie diagrams, and drawings and sketches are the most popular. Relationships are displayed using grid graphs. A visual aid should always be used in conjunction with preparation to interest the audience, improve their comprehension of your message, elicit an emotional response, and assist you in communicating it effectively. Charts, diagrams, graphs, maps, flashcards, posters, images, photos, booklets, folders, pamphlets, cartoons, and comics are examples of graphic aids.

Learn more about graphic here-

brainly.com/question/1169945

#SPJ4

5 0
1 year ago
When light hits an opaque object it will be _______________.
nikklg [1K]
None of it passes through. Most of the light is either reflected by the object or absorbed and converted to heat. Materials such as wood, stone, and metals are opaque to visible light.

Good luck
7 0
2 years ago
1. Answer the following questions: a. What are the different types of number system? Name them.​
BigorU [14]

Answer:

binary,decimal, hexadecimal and octal number system

5 0
3 years ago
Give a recursive version of the algorithm Insertion-Sort (refer to page 18 in the textbook) that works as follows: To sort A[1..
Inga [223]

Answer:

see explaination

Explanation:

void insertion( int e,int *x, int start, int end)

{

if (e >= x[end])

x[end+1] = e;

else if (start < end)

{

x[end+1] = x[end];

insertion(e, x, start, end-1);

}

else

{

x[end+1] = x[end];

x[end] = e;

}

}

void insertion_recurssion(int *b, int start, int end)

{

if(start < end)

{

insertion_sort_recur(b, start, end-1);

insertion(b[end], b, start, end-1);

}

}

void main()

{

insertion_recurssion(x,0,5);

}

3 0
3 years ago
Other questions:
  • Variable costs are __________.<br><br> A. decreasing<br> B. increasing<br> C. static
    10·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • When replacing a system board in a laptop, which feature is a must?
    10·1 answer
  • If you want to present slides to fellow students your coworkers which productivity software should you use to create them
    15·2 answers
  • A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriv
    11·1 answer
  • Which of the following data structures can erase from its beginning or its end in O(1) time?
    10·1 answer
  • . A store offers a deposit of 6% on the cash price of $462. The deposit amount is?​
    6·1 answer
  • Consider the following method, which is intended to return the index of the first negative integer in a given array of integers.
    14·1 answer
  • I Previous
    6·1 answer
  • Wendell notices that the company's top executives share a belief that managers are directly responsible for the organization's s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!