Securing owa

Assignment Help Basic Computer Science
Reference no: EM13825435

Securing OWA
In order to effectively implement Outlook Web Access (OWA) and allow employees to have seamless access to email, you must provide external access to users. This, of course, creates a security weakness in your network because of open ports. Your senior administrator wants you to analyze the advantages and disadvantages of implementing OWA and answer the following questions:

  • Do the benefits of implementing OWA outweigh the security concerns? Why or Why not?
  • What port does OWA use by default? Can this port be changed? What issues may arise from changing the port? What measures do you recommend to mitigate the issues?
  • What are your thoughts on the implementation of a Demilitarized Zone (DMZ) to limit remote access?
  •  Include references

 

 

Reference no: EM13825435

Questions Cloud

Advantages and disadvantages of using software as a service : Discuss the fundamental advantages and disadvantages of using software as a service (SaaS) within organizations. Next, give your opinion as to why SaaS has become a common delivery model for many business applications.
Claiming damages and compensation for tort of negligence : Joe Student had been drinking heavily one winter's night at The Plaza, a popular campus bar. Student got involved in an argument with Bob Bartender, an employee of 011ie Owner, owner of the bar, when Bartender refused to serve Joe Student any more..
Currently use expert systems : Select two (2) companies that currently use expert systems. Then, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your..
Determine the inns break-even point in dollars : The Green Acres Inn is trying to determine its break-even point. The inn has 155 rooms that it rents at $186 a night. Operating costs are as follows. Determine the inn’s break-even point in number of rented rooms per month. Determine the inn's break-..
Securing owa : In order to effectively implement Outlook Web Access (OWA) and allow employees to have seamless access to email, you must provide external access to users. This, of course, creates a security weakness in your network because of open ports. Your senio..
Write anb essay that discussing the concept of elasticity : The problem belongs to Economics, mainly to Microeconomics and it is about writing an essay discussing the concept of elasticity being inherently associated with price.
About equal to the current ratio indicates that : A quick ratio that is about equal to the current ratio indicates that
Software package recommendatins for erp- mrp and crp : Software Package Recommendatins for ERP, MRP and CRP
Secure encrypted communications : Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbe..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Packet-switched and circuit-switched

Packet-switched and circuit-switched are two standards utilized by wide area networks. In your Discussion Board posting of 4-6 paragraphs, address the following:

  What is your all-time favorite linux-related website

What is your all-time favorite Linux-related website? Why is it your favorite (reference, utility, comic relief, etc.)?

  Why an organization prefer one approach over the other

As a system analyst, which would you prefer? Why? Can the two approaches be successfully combined? Explain. In all cases, support your analysis with specific examples from your readings, research, and professional experience (if applicable).

  What is the asymptotic complexity of the following function

What is the asymptotic complexity of the following function and how did you arrive to this answer.

  Explain the three main channels

Explain the three main channels (not the Fed's tools: omo, rr, dr) through which the Fed can influence economic activity. Specifically explain the ways that Fed policy can influence consumption and investment.

  How has the progression of communication technology

How has the progression of communication technology affected the business environment?

  Slugworth candies

Slugworth Candies, LLC, is a candy maker company that employs 450 people. The company is composed of six departments: Executive Staff (20), Human Relations (6), Finance and Accounting (15), Marketing and Sales (15), Factory (150), and Research & D..

  Decryption algorithm: reverse the encryption algorithm

Decryption algorithm: Reverse the encryption algorithm. The permutation, however, should (circular) shift the bit pattern by 1 bit to the right

  Evaluation process to seven-step acquisition model

Discuss in scholarly detail the acquisition evaluation process to the Seven-Step Acquisition Model.

  Design a class named clock that contains private data fields

Design a class named Clock that contains private data fields for startTime and endTime, no argument constructor that initializes the startTime to the current time, a method named start() that resets the startTime to the given time, a stop() me..

  How many types of datastores are present in data services

How many types of datastores are present in Data services?

  Identity tangible and intangible benefits of the new payroll

suppose you own a travel agency in a large city you have many clients but growth has slowed somewhat. some long term employees are getting discouraged, but feels that there might be a way to make technology work in favor. use your imagination and sug..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd