The authentication can be done by using user id and password, social sign-in or by using the biometrics.
<h3>How to explain the information?</h3>
Authentication works as follows:
- Prompting the user to enter the credentials.
- Send credentials to the authentication server.
- Match the credentials.
- Authorize the user and grants the acces
<u>External Website security: </u>
- Use of firewall.
- Implement the access control.
- Use of MVC (Model View Controller)
- Use of encryption.
- Use of SSL certificate.
- Use of security plugins.
- Use of network monitoring team.
<u>Internal Website security: </u>
- Use of authentication to identify the user identity.
- Use of authorization to provide different user with the specific privileges and access.
- Encrypt or hide sensitive web pages.
- By implementing IT policies.
- Educate the user about the website.
<u>Remote Access Solution</u>:
Remote access provides better security, cost efficiency, ease of management, and increased availability.
Remote access can be deployed by using the RAS gateway.
<u>Firewall and Basic rules recommendations</u>:
- Firewall is important for managing the traffic and providing external website security.
- Rules to prevent SQL injection and XSS.
- Allow only the specific type of traffic.
- Use access rules for IP security.
- Implement certain IT policies.
<u>Wireless Security: </u>
Wifi is being used in every organization and it prevents the network from malicious access.
Wireless security can be provided by usin encryption, decryption, and authorization.
<u>VLAN configuration: </u>
VLAN are important for traffic filtering and providing the logical division of the network.
VLAN can be configured for web interface and can provide web filtering.
VLAN can be configured between router and firewall that passes the network.
<u>Laptop Security Configuration: </u>
Use of password, VPN and the registering the laptop will provide laptop security. .
<u>Application policy recommendations</u>:
Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.
<u>Security and privacy policy recommendations: </u>
It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.
<u>Intrusion detection or prevention for systems containing customer data: </u>
IPS is implemented behind firewall and it matches the incoming traffic against the security policies.
Learn more about security infrastructure on:
brainly.com/question/5939963
#SPJ1