1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
2 years ago
15

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security

services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.
About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data
Computers and Technology
1 answer:
a_sh-v [17]2 years ago
7 0

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

<h3>How to explain the information?</h3>

Authentication works as follows:  

  • Prompting the user to enter the credentials.  
  • Send credentials to the authentication server.  
  • Match the credentials.  
  • Authorize the user and grants the acces

<u>External Website security:  </u>

  • Use of firewall.  
  • Implement the access control.  
  • Use of MVC (Model View Controller)
  • Use of encryption.  
  • Use of SSL certificate.
  • Use of security plugins.  
  • Use of network monitoring team.  

<u>Internal Website security:  </u>

  • Use of authentication to identify the user identity.  
  • Use of authorization to provide different user with the specific privileges and access.  
  • Encrypt or hide sensitive web pages.  
  • By implementing IT policies.  
  • Educate the user about the website.  

<u>Remote Access Solution</u>:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

<u>Firewall and Basic rules recommendations</u>:  

  • Firewall is important for managing the traffic and providing external website security.  
  • Rules to prevent SQL injection and XSS.  
  • Allow only the specific type of traffic.  
  • Use access rules for IP security.  
  • Implement certain IT policies.  

<u>Wireless Security:  </u>

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

<u>VLAN configuration:  </u>

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

<u>Laptop Security Configuration:  </u>

Use of password, VPN and the registering the laptop will provide laptop security. .  

<u>Application policy recommendations</u>:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

<u>Security and privacy policy recommendations:  </u>

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

<u>Intrusion detection or prevention for systems containing customer data:  </u>

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

brainly.com/question/5939963

#SPJ1

You might be interested in
1. asynchronous_communication
algol [13]
Communications in which data can be transmitted intermittently rather than in a steady stream.
3 0
4 years ago
A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act
Juli2301 [7.4K]

Answer

Digital Millennium Act

Explanation

The Digital Millennium Copyright Act  is a United States copyright law that implements two  treaties of the World Intellectual Property Organization . The aim of this ACT is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization  Copyright. The law has two basic functions. First, it protects copyright owners by providing them with a mechanism to enforce their rights without having to directly sue the infringer

7 0
3 years ago
Read 2 more answers
Do you think that the TV set has outlived its utility as a household appliance? Research how convergence with internet technolog
kherson [118]

Answer:

What is Computer? & technology

7 0
2 years ago
What is computer science​
adell [148]

Answer:

computer science is the study of computer and computing as well as theoretical and practical applications.

pls give me thanks ☺️☺️

7 0
3 years ago
The procurement department of an organization helps to program software. <br> A)True<br> B)False
valina [46]
I think it is true absolutely
8 0
3 years ago
Read 2 more answers
Other questions:
  • A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right. For example, we can shift the
    12·1 answer
  • HELP I don't understand this
    14·2 answers
  • The HR department of a company wants to send out an email informing its employees about an upcoming social event. Which email ap
    11·2 answers
  • What are the differences in LAN and WAN and how they are used to Increase Cybersecurity
    7·1 answer
  • Apple's macOS and Microsoft Windows are examples of ________ software. utility application communication operating system
    13·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • Is anyone else having issues with brainly not working? Everytime I click on a answer it only comes up with the 7 month trail thi
    12·1 answer
  • I am booooooored any one want to join
    5·2 answers
  • Which device allows users to directly hear data from a computer
    5·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!