1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
4 years ago
5

In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and

tools you describe in the document must be able to meet the needs of the organization. As the security consultant, the company needs you to add security measures to the following systems:
a. An external website permitting users to browse and purchase widgets
b. An internal intranet website for employees to use
c. Secure remote access for engineering employees
d. Reasonable, basic firewall rules
e. Wireless coverage in the office
f. Reasonably secure configurations for laptops
Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices. Engineers will require access to internal websites, along with remote, command line access to their workstations.
Computers and Technology
1 answer:
irina [24]4 years ago
4 0

Answer:

Explanation:

It is very important for the organisation to implement maximum security to the infrastructure. The main data totally belongs to the customers which mainly has customers' personal information and bank details. So, here are few things that needs to be look at as a security expert:

Encryption: the implementation of encryption tool to encrypt the data especially passwords and card details of the customer will be help in securing the infrastructure. Encryption makes it hard for anyone to be able decrypt the actual data.

Firewall: This is the beginning stage of implementing security to an infrastructure. Firewall will help greatly in blocking traffic that are unwanted from entering into the infrastructure. This also blocks untrusted traffic to the application server too.

SSL certificate: Implementation of SSL certificate to the website or the application will help greatly in securing and protecting the application for you against online hackers.

Every device belongs to your system must be implemented with anti-malware softwares that can able to detect malware present in the system.

You might be interested in
Using complete sentences post a detailed response to the following.
laiz [17]

Answer:

some advantages of top down is that you can start off from what you know and figure out what you need to complete it, advantages to bottom up is that you can make something new . if you are starting something from scratch and you dont know what the end goal might be you would use bottom up but if you already have an idea or the final product of what you want you would go the top down approach.

Explanation: just saying you shouldnt just copy and paste my response but rather pick out what you want to say and use this to complete what ever your working on. hope i helped :)

6 0
3 years ago
Read 2 more answers
The best way to help people in the contemplation stage of change is to:
Lelechka [254]

Answer:

D. Point out the negative consequences of the behavior, so they see that the negative aspects do outweigh the positive aspects​

Explanation:

7 0
2 years ago
Read 2 more answers
write a 2d array c program that can capture marks of 15 students and display the maximum mark, the sum and average​
bekas [8.4K]

Answer:

#include <stdio.h>  

int MaxMark(int* arr, int size) {

   int maxMark = 0;

   if (size > 0) {

       maxMark = arr[0];

   }

   for (int i = 0; i < size; i++) {

       if (arr[i] > maxMark) {

           maxMark = arr[i];

       }

   }

   return maxMark;

}

int SumMarks(int* arr, int size) {

   int sum = 0;

   for (int i = 0; i < size; i++) {

       sum += arr[i];

   }

   return sum;

}

float AvgMark(int* arr, int size) {

   int sum = SumMarks(arr, size);

   return (float)sum / size;

}

int main()

{

   int student0[] = { 7, 5, 6, 9 };

   int student1[] = { 3, 7, 7 };

   int student2[] = { 2, 8, 6, 1, 6 };

   int* marks[] = { student0, student1, student2 };

   int nrMarks[] = { 4, 3, 5 };

   int nrStudents = sizeof(marks) / sizeof(marks[0]);

   for (int student = 0; student < nrStudents; student++) {              

       printf("Student %d: max=%d, sum=%d, avg=%.1f\n",  

           student,

           MaxMark(marks[student], nrMarks[student]),

           SumMarks(marks[student], nrMarks[student]),

           AvgMark(marks[student], nrMarks[student]));

   }

   return 0;

}

Explanation:

Here is an example using a jagged array. Extend it to 15 students yourself. One weak spot is counting the number of marks, you have to keep it in sync with the array size. This is always a problem in C and would better be solved with a more dynamic data structure.

If you need the marks to be float, you can change the types.

3 0
3 years ago
In an advertisement, a speed specification, such as 2.66 ghz, indicates the speed of the microprocessor?
Ray Of Light [21]

Answer:

yes / true

Explanation:

it is one of the factors in determining the speed of the microprocessor

5 0
2 years ago
According to the semantic network model, it would take less time to answer "true" to which sentence?
-Dominant- [34]

Answer:

The answer is "salmon is a fish".

Explanation:

In the given question some information is missing, that is the option of the question, which can be described as follows:

a) salmon is a fish.

b) salmon is an animal.

c) canary is an animal.

d) They all take a certain amount of time.

The Semantic Network Model is the network model, that uses the data nodes, which are connected by negative and positive links with one another. It permits their memory to retrieve ready related data, that's why in this question option a is correct, and other choices were wrong, that can be defined as follows:

  • In option b, It's not a animal, it is a salt-water fish.
  • In option c, It is a bird, that's why it is wrong.
  • In option d, When we read-option a, it takes less time to read, that's why it is wrong.

5 0
3 years ago
Other questions:
  • Which is an example of an input device?
    15·2 answers
  • A modern information-processing model that views memories as emerging from particular activation patterns within neural networks
    6·1 answer
  • Which does the histogram resemble the most?
    10·1 answer
  • Which type of password would be considered secure
    13·2 answers
  • What is the definition of D1-D4?
    14·1 answer
  • What is also known as a visual aid in presentation
    15·1 answer
  • A Raycast returns a float that tells you how far away an Object is
    8·1 answer
  • When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re
    11·1 answer
  • Write the definition of a function that takes as input three numbers. The function returns true if the floor of the product of t
    11·1 answer
  • Which artificial intelligence term is used to describe extracting information from unstructured text.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!