1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
4 years ago
5

In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and

tools you describe in the document must be able to meet the needs of the organization. As the security consultant, the company needs you to add security measures to the following systems:
a. An external website permitting users to browse and purchase widgets
b. An internal intranet website for employees to use
c. Secure remote access for engineering employees
d. Reasonable, basic firewall rules
e. Wireless coverage in the office
f. Reasonably secure configurations for laptops
Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices. Engineers will require access to internal websites, along with remote, command line access to their workstations.
Computers and Technology
1 answer:
irina [24]4 years ago
4 0

Answer:

Explanation:

It is very important for the organisation to implement maximum security to the infrastructure. The main data totally belongs to the customers which mainly has customers' personal information and bank details. So, here are few things that needs to be look at as a security expert:

Encryption: the implementation of encryption tool to encrypt the data especially passwords and card details of the customer will be help in securing the infrastructure. Encryption makes it hard for anyone to be able decrypt the actual data.

Firewall: This is the beginning stage of implementing security to an infrastructure. Firewall will help greatly in blocking traffic that are unwanted from entering into the infrastructure. This also blocks untrusted traffic to the application server too.

SSL certificate: Implementation of SSL certificate to the website or the application will help greatly in securing and protecting the application for you against online hackers.

Every device belongs to your system must be implemented with anti-malware softwares that can able to detect malware present in the system.

You might be interested in
Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
SVEN [57.7K]

ALTER TABLE customer ADD CONSTRAINT customer_number_unique UNIQUE (customer_number);

5 0
2 years ago
To make your brand colors stand out, it is important to implement what with your color scheme?
qaws [65]

Answer:

All of the above

Explanation:

It's better to have a pattern of colors than one single color in you color scheme.

6 0
3 years ago
Read 2 more answers
Alicia spends all day at work on the Internet and then all night on social networking sites looking at the many interesting thin
Stels [109]

Answer:

Better regulate time spent on internet

Explanation:

Because of the time Alicia is spending on the internet, seeing interesting things that her friends are doing, and perhaps her life has been boring, this tend to play with her psychology and she will begin to become depressed and start disliking her life. In this case, the main mediator is the internet, and the best way she can deal with depression at this level is to reduce or regulate the amount of time that she spends on the internet.

4 0
3 years ago
Which steps would you take to track accounts payables at a business? Select all that apply.
soldier1979 [14.2K]

Answer:

a,c,e and f

Explanation:

7 0
3 years ago
What is the term for the case that contains the same adapters found on a motherboard?
victus00 [196]
The answer is
Enclosure
5 0
3 years ago
Other questions:
  • How do you uninstall a program using the Control Panel?
    10·1 answer
  • You are doing research for a current event report on smartphone technology. You do a web search for information that includes se
    5·2 answers
  • When should an individual consider entering parenthood?
    5·1 answer
  • Basic fortran c++ c# and java are all ____ languages
    11·1 answer
  • The _______ is a small program run by a computer when first powered on. its primary function is to stabilize the machine and dev
    11·1 answer
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • A celebrity blogger you have followed for years advises readers to try a new beauty product. Before purchasing the product, a sa
    10·1 answer
  • HELP ASAP!!!!<br> I don't know the code to these images and I need that code now.
    12·1 answer
  • What defines interactive media? The user must play a role in writing the content of the media. The user must do something that d
    6·2 answers
  • Straight dinosaur walks out of woods : RAWWRRRR
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!