Define the given term and describe relevance

Assignment Help Computer Engineering
Reference no: EM132013560

Assignment 2: LASA 2: Kenne Jarson Laboratories: Phase 2

This assignment builds upon LASA 1. Please review the initial scenario and company background provided in LASA 1.

You will complete phase 2 of the web application portal project for Kenne Jarson Laboratories.

In a Microsoft PowerPoint presentation with speaker notes, you will provide security recommendations that describe the authentication, access control, and encryption or cryptography utilized to ensure security of confidential information.

Tasks: 1. Security Control Overview: The first 7-8 slides will introduce and describe the importance of security controls and mechanism for the new web application portal. In particular, the following items should be covered:

• Authentication: Define the term and describe its relevance and usage in maintaining security in a web application portal.

• Access Control: Describe the term and explain how access control will be provided or limited for those using the web application portal.

• Cryptography and Encryption: The web application portal will share confidential and highly sensitive information between the company and its wholesalers or distributors. Describe how cryptography and encryption can help provide secure communications.

2. Security Comparison of Authentication Technologies: The next 3-4 slides should describe various authentication tools or technologies that can be used in an online or a web setting to authenticate users. Provide a recommendation, along with a justification, for your selection that aligns with the requirements of the organization.

3. Access Control Plan: You should include 3-4 slides on how user access control will be maintained for the web application portal. Suggest potential security groupings and techniques to maintain user access control.

4. Cryptography and Encryption: The final 5-6 slides should discuss the security measures that will be used to ensure secure communications between the company's web application portal and that of its partners or distributors. Describe what cryptography and encryption schemes should be used to secure the web application portal.

Submission Details: • Save the presentation as M5_A2_Lastname_Firstname.ppt.

• By the due date assigned, submit your presentation to the Submissions Area.

Reference no: EM132013560

Questions Cloud

What can be done to better manage stress : What can be done to better manage stress at the individual level? What can organizations do to help employees better manage stress?
What are marketing variances : Research the topic of marketing variances. What are marketing variances? What is the relationship between sales price and quantity variances
Four out of six water heaters will be defective : Suppose a quality check was conducted on a sample of six water heaters. What is the probability that four out of six water heaters will be defective?
Employer benefits to unraveling regulations : What are the employee and employer benefits to unraveling regulations? What are the potential problems?
Define the given term and describe relevance : Define the term and describe its relevance and usage in maintaining security in a web application portal. Describe the term and explain how access control.
Lucrative opportunity for an expatriate assignment : You you have been offered a reasonably lucrative opportunity for an expatriate assignment for the next three years
Prepare Samson journal entry : Assuming that the conditions for treatment as a sale are met, prepare Samson's journal entry to record the factoring of $400,000 of receivables
What facts would be necessary for bob to be liable to jan : Are there theories of recovery that Jan can assert that might make Bob liable? What facts would be necessary for Bob to be liable to Jan?
How a swot analysis can be used by an entrepreneur : Tutors thoughts on how a SWOT analysis can be used by an entrepreneur either at the pre-start-up stage or within the actual start-up of the company.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many solutions are there with the first queen

Why does j begin at i + 1 in the examine method? Continue tracing the four queens problem as How many solutions are there with the first queen in position a2?

  Write a program that can be used to convert meters

Write a program that can be used to convert meters to feet and inches. Allow the user to enter a metric meter value in a method.

  Design a combinational logic circuit

Design a combinational logic circuit that displays the hexadecimal value of a gray code input according to the specifications.

  Discuss the advantages and disadvantages of given approaches

The MC68000 and the SRC take different approaches to implementing condition-al branches. Discuss the advantages and disadvantages of these two approaches.

  Draw the truth table and design an octal to binary encoder

What is the advantage of using multiplexers to implement logic functions?

  Discuss two major issues involved with acquiring systems

discuss two major issues involved with acquiring systems and two major issues commonly faced when maintaining them.

  Design a function that uses nested for loops

Design a function that uses nested for loops that transforms a color image into gray scale using the technique described earlier.

  Write the assignment statements necessary to store the time

Write the assignment statements necessary to store the time 7:12:44 into the Past component of Channel_Crossing.

  Write down a simple c++ cash register program

The program must ask for the customer's first name and last name initials. Use 2 different variables, one for the first name and one for the last name.

  Analyze security requirements and develop a security policy

analyze security requirements and develop a security policy that fully addresses them. the project will enable the

  Design a combinational circuit that converts a binary number

Design a combinational circuit that converts a binary number of four bits to a decimal number in BCD. Note that the BCD number is the same as the binary number as long as the input is less than or equal to 9.

  While assisting the coding manager in preparing for the

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd