A business wants to share its customer account database

Assignment Help Computer Network Security
Reference no: EM13464170

A business wants to share its customer account database with its trading partners and customers, while at the same time providing prospective buyers with access to marketing materials on its Web site. Assuming that the business is responsible for running all these network components, what types of security components (for example, firewalls, VPN, etc.) could be used to ensure that the partners and customers have access to the account information and others do not? What type of network configuration (for example, bastion gateway server) will provide the appropriate security? Be sure to include your rationale for each security component as well as the type of network. The post should be a minimum of 200 words.

The following plagerized paper is similar to the following:

Your businesses network border is the point where your organizations managed network interfaces with un-trusted networks. From a defense in depth perspective, the network perimeter encompasses every point where the internal network is connected to networks and hosts that are not managed by the organization's IT team. This includes connections to the Internet, business partners, virtual private networks (VPN), and dial-up connections. The types of devices found in the perimeter include VPN clients and VPN servers, remote access servers (RAS) and RAS clients, border routers, firewalls, network intrusion detection systems (NIDS), and proxy servers. To allow partners access to the information, the company would probably set up a virtual private network (VPN). This reduces the chances of hackers obtaining access to the communications between the companies. (Turban, King, & Lang, 2011) Well-designed and properly implemented network architecture provides highly available, secure, scalable, manageable, and reliable services. A network segment consists of two or more devices that communicate with each other on the same physical or logical section of the network. Organizations can take a number of steps to protect their internal network by using a defense-in-depth approach. Techniques include securing wireless LANs, Internet Protocol Security (IPSec), and network segmentation.

Access control defines which users should have access to certain resources and how they can use those resources (Turban, King, & Lang, 2011).

Reference no: EM13464170

Questions Cloud

You may use various sources be sure to cite any sources : create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources. be
Describe the trade-offs between circuit switching virtual : q1. discuss the trade-offs between circuit switching virtual circuit switching and packet switching.q2. answer the
Search the web for information on the issue of usability : search the web for information on the issue of usability and making the ehr more user friendly. what are some of the
An art museum that needs to track the artwork artists and : write a 750- to 1050-word paper in which you complete the followingmiddot choose a database environment from the
A business wants to share its customer account database : a business wants to share its customer account database with its trading partners and customers while at the same time
This project allows students to demonstrate their skills : this project allows students to demonstrate their skills in the area of designing relational databases to satisfy
Define and explain in your own words the primary challenges : you have been hired as the cio of a large multinational internet advertising company. the president of the company is
List five journals that you found related to the key words : search the following key wordserp architectureerp moduleserpenterprise resource planning systemslist five journals
Write down the differences between physiological and : 1. what are the differences between physiological and psychological needs? provide examples of each in your

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security and privacy in cloud computing

Prepare a report on the following scenario about security and privacy in cloud computing - Recently increased use of mobile devices and the growth of the Internet in current business practices have led to the provision of Cloud Computing

  Discuss the risks of having a single root user

Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems. Include a sample generic policy for a limited user from which a configuration could be written. (500 words..

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  Computer communications are typically classified as either

computer communications are typically classified as either client-server or peer-to-peer. identify a distributed

  What is the purpose of the random nonces in ssl handshake

What is the difference between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Please be specific and justify your answer.

  Concept of subletting in v6

small package routing is more efficient in IPV6 than in IPV4, increase the hacking factor, network security model (NSM), ACL, VLAN, war dialing

  What are some of the concerns of mobile device users

Microsoft has announced its Surface tablets, due out late this year, at a time when security is a growing concern for users of mobile devices. What are some of the concerns of mobile device users? What are some of their options to ease their con..

  Assume a propagation speed

Review the car-caravan analogy in Section 1.4. Again assume a propagation speed of 100km/hour

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  How has the role of private security changed since the 911

1. how has the role of private security changed since the 911 attacks?what are some of the roles that private

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd