Securing owa

Assignment Help Basic Computer Science
Reference no: EM13825435

Securing OWA
In order to effectively implement Outlook Web Access (OWA) and allow employees to have seamless access to email, you must provide external access to users. This, of course, creates a security weakness in your network because of open ports. Your senior administrator wants you to analyze the advantages and disadvantages of implementing OWA and answer the following questions:

  • Do the benefits of implementing OWA outweigh the security concerns? Why or Why not?
  • What port does OWA use by default? Can this port be changed? What issues may arise from changing the port? What measures do you recommend to mitigate the issues?
  • What are your thoughts on the implementation of a Demilitarized Zone (DMZ) to limit remote access?
  •  Include references

 

 

Reference no: EM13825435

Questions Cloud

Advantages and disadvantages of using software as a service : Discuss the fundamental advantages and disadvantages of using software as a service (SaaS) within organizations. Next, give your opinion as to why SaaS has become a common delivery model for many business applications.
Claiming damages and compensation for tort of negligence : Joe Student had been drinking heavily one winter's night at The Plaza, a popular campus bar. Student got involved in an argument with Bob Bartender, an employee of 011ie Owner, owner of the bar, when Bartender refused to serve Joe Student any more..
Currently use expert systems : Select two (2) companies that currently use expert systems. Then, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your..
Determine the inns break-even point in dollars : The Green Acres Inn is trying to determine its break-even point. The inn has 155 rooms that it rents at $186 a night. Operating costs are as follows. Determine the inn’s break-even point in number of rented rooms per month. Determine the inn's break-..
Securing owa : In order to effectively implement Outlook Web Access (OWA) and allow employees to have seamless access to email, you must provide external access to users. This, of course, creates a security weakness in your network because of open ports. Your senio..
Write anb essay that discussing the concept of elasticity : The problem belongs to Economics, mainly to Microeconomics and it is about writing an essay discussing the concept of elasticity being inherently associated with price.
About equal to the current ratio indicates that : A quick ratio that is about equal to the current ratio indicates that
Software package recommendatins for erp- mrp and crp : Software Package Recommendatins for ERP, MRP and CRP
Secure encrypted communications : Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbe..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Writing a homework using functions to get a list of integers

Writing a homework using functions to get a list of integers from a user and then find statistics of the given list of integers. You are not allowed to use any built in functions for finding the calculations in this assignment.

  Create function that accepts one input parameter

Using Pseudocode, create your own function that accepts one input parameter and returns a float number. You decide the theme.

  What is the total cost for replacement

If you cannot find a good match for your current system, what might have to be purchased (processor, memory, etc.)? What is the total cost for replacement?

  Explaining organization management responsibilities

Describe in scholarly detail common organization management responsibilities.

  Discussion builds upon the role-play conducted

Discussion builds upon the role-play conducted in the Roles section of this lesson. In the role-play, you were the systems administrator for a for-profit educational institution. The institution's library provides Internet access, in particular..

  Write an application that reads a series of pairs of numbers

A website sells three products whose retail prices are as follows: product 1, $2.98; product 2 $4.50; and product 3, $9.98. Write an application that reads a series of pairs of numbers.

  Database and data warehousing design

Assignment consists of two (2) sections: a design document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is ..

  From time to time words become obsolete

One more requirement, from time to time words become obsolete. When this happens, such word must be removed from the dictionary. Your program must account for this also.

  Design the redo log groups

Discuss the thought process of DBAs as they design the redo log groups and members for a database. Analyze and comment on the different factors that will affect their decision.

  Explain the three general sources of security threats

Explain the three general sources of security threats

  Selecting a windows 7 edition

Selecting a Windows 7 Edition

  Describe a pipelined datapath needed to support

Describe a pipelined datapath needed to support the following instruction. Also specify the values of control signals using the diagram in the text book.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd