answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella
1 month ago
9

In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and

tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape. Organization requirements: As the security consultant, the company needs you to add security measures to the following systems: An external website permitting users to browse and purchase widgets An internal intranet website for employees to use Secure remote access for engineering employees Reasonable, basic firewall rules Wireless coverage in the office Reasonably secure configurations for laptops.
The following elements should be incorporated into your plan:
Authentication system
External website security
Internal website security
Remote access solution
Firewall and basic rules recommendations
Wireless security
VLAN configuration recommendations
Laptop security configuration
Application policy recommendations
Security and privacy policy recommendations
Intrusion detection or prevention for systems containing customer data
Computers and Technology
1 answer:
ivann1987 [930]1 month ago
6 0

Answer and explanation:

Authentication:

Authentication is achieved by entering a user ID and password, utilizing social sign-ins, or employing biometric methods. It serves to confirm the identity of the user and allow them access.

Here’s how authentication functions:

Prompt the user to provide their credentials.

Transmit these credentials to the authentication server.

Verify the credentials.

Grant access to the user upon successful match.

External Website Security:

It is crucial to safeguard the website from hackers and unauthorized users to avert any security issues.

Implement firewalls.

Establish access controls.

Utilize MVC (Model View Controller) to create different views tailored for various user types.

Employ encryption techniques.

Utilize SSL certificates.

Employ security plugins.

Adopt strategies for backup and disaster recovery.

Engage a network monitoring team.

Internal Website Security:

Use authentication to verify user identities.

Utilize authorization to assign specific privileges and access to different users.

Conceal or encrypt sensitive web pages.

Implement IT policy frameworks.

Educate users about the website.

Remote Access Solution:

Remote access enhances security, cost-effectiveness, management simplicity, and availability.

This can be set up using RAS gateways (either single or multi-tenant):

Remote access options include VPN (Virtual Private Network), BGP (Border Gateway Protocol), and Hyper-V networks.

This access can be configured simply. It includes enabling users, managing their access, securing assets, using remote desktop protocols, and overseeing sessions including RemoteApp and both personal and pooled desktops.

Firewall and Basic Rules Recommendations:

Firewalls are essential for traffic management and securing external websites.

Establish rules to prevent SQL injection and XSS.

Permit only specific traffic types.

Apply access rules for IP security.

Implement defined IT policies.

Users can create custom rules.

Wireless Security:

In today's landscape, Wi-Fi is prevalent in organizations and protects the network from harmful and unauthorized access.

Wireless security can be enhanced through encryption, decryption, and processes for authentication and authorization.

VLAN Configuration:

VLANs are critical for filtering traffic and logically dividing the network.

VLANs can be configured for web interfaces, facilitating web filtering.

The configuration for VLANs in a web interface can be done as follows:

Switching => VLAN => Advanced => VLAN Membership

Switching => VLAN > Advanced => Port PVID Configuration.

For VLAN web filtering:

VLANs can be interconnected between routers, firewalls, or switches to filter web traffic traversing the network.

Laptop Security Configuration:

Security for laptops can be achieved using passwords, VPNs, and MAC address registration. Employing security tools on local machines is also advisable. Device-level authentication via local usernames and passwords is a beneficial approach.

Application Policy Recommendations:

Application policies encompass the use of cookies, social media integration, access control, notification generation, and adherence to other organizational and IT guidelines.

Security and Privacy Policy Recommendations:

This includes a catalogue of security methods necessary for managing traffic filtering, IP spoofing, user authentication, and other specific website policies.

Intrusion Detection or Prevention for Systems with Customer Data:

IPS operates behind firewalls and reviews incoming traffic against security policies, matching signatures and managing any incidents while generating logs and alerts. The goal of IDS is to detect harmful traffic ahead of it penetrating further into the network, providing necessary alerts and notifications to the monitoring team. Opting for anomaly-based detection and prevention systems is recommended.

You might be interested in
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
8_murik_8 [892]

Answer:

The appropriate answer to the question is option A, Wired Equivalent Privacy (WEP).

Explanation:

WEP (Wired Equivalent Privacy) is the security protocol detailed in the IEEE Wi-Fi (Wireless Fidelity) standard 802.11b, which aims to offer a Wireless Local Area Network (WLAN) with adequate security and privacy.

Wardriving refers to the practice in which individuals search for Wi-Fi (Wireless Fidelity) networks while traveling in a vehicle using devices like PDAs (Personal Digital Assistants), smartphones, or portable computers.

7 0
14 days ago
Read 2 more answers
Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve thi
8_murik_8 [892]

Answer:

It can be accessed via the View tab.

Explanation:

The view tab in Microsoft PowerPoint ranks as the 9th tab when counted from the left side. Upon being clicked, it reveals a variety of tools tailored to help visualize slide appearances.

The ruler function is included among these tools and ensures precise placement of objects within slides. This ruler tool can be found in the Show Box, which is the third section from the left following Presentation View and Master View.

8 0
1 month ago
Read 2 more answers
Assign to avg_owls the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4 3
zubka84 [942]

Answer:

Explanation:

For this illustration, I'll provide a Python program step-by-step:

  • We define four variables regarding our zoo, including the zoo count and the average.
  • The average is calculated by summing the totals of owls and dividing by the number of zoos.
  • Finally, we display the value stored in avg_owls.

num_owls_zoo1 = 1

num_owls_zoo2 = 2

num_owls_zoo3 = 3

num_owls_zoo4 = 4

zoos = 4

avg_owls = 0.0

avg_owls=(num_owls_zoo1+num_owls_zoo2+num_owls_zoo3+num_owls_zoo4)/zoos

print('Average owls per zoo:', int(avg_owls))

6 0
16 days ago
How to code 2.9.5: Four colored triangles {Code HS}
zubka84 [942]

Response: penup()

backward(100)

for i in range(4):

pensize(5)

pendown()

left(60)

color("green")

forward(50)

right(120)

color("blue")

forward(50)

color("red")

right(120)

forward(50)

penup()

left(180)

forward(50)

Clarification:

L

6 0
1 month ago
Q2 - Square Everything (0.25 points) Write a function called square_all that takes an input called collection that you assume to
zubka84 [942]
Refer to the explanation Define the function square_all() that receives a list of integers. This function should return a new list containing the square values of all integers found within the provided list. def square_all(num_list): #Initiate an empty list to store results. sq_list = [] #Iterate through the length of the list. for index in range(0, len(num_list)): #Calculate the square of the current value and add it to the result list sq_list. sq_list.append(num_list[index] * num_list[index]) #Return the squared values of all integers in num_list. return sq_list #Declare and initialize a list of integers. intList = [2, 4] #Invoke the square_all() function and pass the above list as an argument. Show the returned list. print(square_all(intList))
4 0
20 days ago
Other questions:
  • The compare_strings function is supposed to compare just the alphanumeric content of two strings, ignoring upper vs lower case a
    15·1 answer
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    9·2 answers
  • Which of the following type of online advertising intermediaries decide the placement and pricing of online display ads by using
    9·1 answer
  • Edhesive 2.3 code practice question 1​
    11·1 answer
  • Until 2015, each new Roblox user automatically had one friend. What was he called?
    12·2 answers
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 the output is
    5·1 answer
  • This question involves a simulation of a two-player game. In the game, two simulated players each start out with an equal number
    7·1 answer
  • RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
    15·1 answer
  • What is the other name designated to a game master of multiplayer online games (MMOs)?
    11·2 answers
  • James is an intern in a film production company. On his first day, James’ boss, Monica, tells him, “Before anything else, let me
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!