1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
4 years ago
5

In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and

tools you describe in the document must be able to meet the needs of the organization. As the security consultant, the company needs you to add security measures to the following systems:
a. An external website permitting users to browse and purchase widgets
b. An internal intranet website for employees to use
c. Secure remote access for engineering employees
d. Reasonable, basic firewall rules
e. Wireless coverage in the office
f. Reasonably secure configurations for laptops
Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices. Engineers will require access to internal websites, along with remote, command line access to their workstations.
Computers and Technology
1 answer:
irina [24]4 years ago
4 0

Answer:

Explanation:

It is very important for the organisation to implement maximum security to the infrastructure. The main data totally belongs to the customers which mainly has customers' personal information and bank details. So, here are few things that needs to be look at as a security expert:

Encryption: the implementation of encryption tool to encrypt the data especially passwords and card details of the customer will be help in securing the infrastructure. Encryption makes it hard for anyone to be able decrypt the actual data.

Firewall: This is the beginning stage of implementing security to an infrastructure. Firewall will help greatly in blocking traffic that are unwanted from entering into the infrastructure. This also blocks untrusted traffic to the application server too.

SSL certificate: Implementation of SSL certificate to the website or the application will help greatly in securing and protecting the application for you against online hackers.

Every device belongs to your system must be implemented with anti-malware softwares that can able to detect malware present in the system.

You might be interested in
Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should
vivado [14]

Rajesh might want to avoid the use of a web app for the project due to connectivity issues. Hence, one reason he might want to avoid using the Webb app is slow or poor internet connection.

Collaborating on a web application relies very heavily on network connectivity which is the what establishes the link ms allows the apllications to achieve optimum performance.

Therefore, slow internet connection is a major reason whuhe might want to avoid using a web app.

Learn more : brainly.com/question/25531734

6 0
3 years ago
What is the working principle of computer?
ankoles [38]
The CPU is the working principle
8 0
4 years ago
Identify the command on a local desktop CMD that will verify which group policies have been applied to the workstation. SELECT T
fomenos

Answer:

The answer is gpupdate

Explanation:

gpupdate command is used to update Group policies in Windows operating system Domain.

There are different options to use with the gpupdate but one of the most used option is the '/force' which will reapply all policy settings

8 0
3 years ago
The machine should not be oiled until the
kicyunya [14]
<span>The machine should not be oiled until the recommended time between oilings is up.</span>
6 0
4 years ago
You're creating a presentation to promote a new product. If you wanted to add a square to your slide to serve as a backdrop behi
MAVERICK [17]
<h2>Answer:</h2>

<u>The correct answer is  </u><u>B. Insert Shapes</u>

<h2>Explanation:</h2>

Slides and presentations are always created in Microsoft Power Point and we know that it is the key application under the package of Microsoft Office. It gives us the option of inserting various shapes in our slides that could be used in a lot of ways depending upon the requirements. To insert shape in the slides of Microsoft Power Point we just click on the Home tab, under Insert, click Shape, point to any shape type, and then click the shape that we want.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Widgets are ___________ a. objects b. icons c. functions d. components
    11·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
    7·1 answer
  • Which solution eliminates the need for dedicated high-speed WAN connections between sites
    11·1 answer
  • What translates binary data into images on a monitor?
    8·1 answer
  • Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
    12·1 answer
  • The SPF strategy can be proven to be optimal in the sense that it minimizes average response times. In this problem, you will de
    10·1 answer
  • Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and
    10·1 answer
  • Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
    7·1 answer
  • FREEEEE 100 POINTS COME TAKE COME COME COME<br><br> only if u like da black panther
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!