What could you do to protect the web server

Assignment Help Computer Network Security
Reference no: EM131093713

E-Commerce Your Company Security Concerns For this assignment you will look at some of the security concerns for your proposed company and countermeasures you could use to help prevent the risks. Write up a one to two page summary of the needs.

Start by looking at what the company assets that you need to protect. Next looked at who has access to the assets, what risks make these assets vulnerable and methods to make the assets secure. Do not forget about physical security of the assets.

Some items to help you think about coverage include:

What could you do to protect the web server, communication channels and databases? What company proprietary information needs to be protected? Does the company develop new software, patent medicine, copyrighted materials such as training, documents, etc? Where do you need to use encryption? What should be included in the acceptable use policy for employees, customers, and business partners? What about the email system? What about workstations, customer computers, etc?

Reference no: EM131093713

Questions Cloud

Zara company strategic retailing plan : When it comes to success in fashion retailing Zara comes in the top ranks. The company has its operations in more than 59 countries. The idea behind this paper is to plug the loopholes that have been there in the literature written earlier.
Friedel crafts alkylation of p xylene : Experimental procedure : Friedel-Crafts Alkylation of p- Xylene Experimental procedure : (Students on Front Bench, closest to clock)
Planning an experiment comparing three fertilizers : We are planning an experiment comparing three fertilizers. We will have six experimental units per fertilizer and will do our test at the 5% level. One of the fertilizers is the standard and the other two are new;
Derive the new zero-sum restrictions : Suppose that we use the same idea, but instead of ordinary averages we use weighted averages with  as the weight for the th factor-level combination. Derive the new zero-sum restrictions for these weighted averages.
What could you do to protect the web server : What could you do to protect the web server, communication channels and databases? What company proprietary information needs to be protected?
Production function is the following : Suppose XYZ Corporation has a technology that uses only labor (L) and the production function is the following: one unit of labor will produce one unit of output (x), i.e., x=L. Also suppose that the firm can buy as much labor as it would ever wan..
Find the mean and standard deviation : Click on the Data Analysis tab at the top right. Click on Descriptive Statistics in the analysis tool list. Find the mean and standard deviation of the data sets.
What are the lengths of the line segments on the surface : What percentage of the total incoming radiation is concentrated in each of the following zones? What are the lengths of the line segments on the surface covered by the Sun beam at point A and point B?
Probability that the stock price : Consider a stock XYZ, whose price either goes up or down by exactly $1 each day. Suppose that XYZ's price goes up $1 with probability p and that XYZ's daily price changes are independent across days. What is value p that makes the probability that..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Description of the task the pseudo-code

Create a Word document. The document should contain: a brief description of the task the pseudo-code associated with the task. Create a Visual Logic file to execute each of the tasks

  Best practices for securing the laptops and tablets

Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Specification of a software design

List the four design models required for a complete specification of a software design and the role of each.

  How does csma-ca in dcf handle media contention

How does the WiMAX privacy sublayer provide security for a WiMAX network? How does CSMA/CA in DCF handle media contention?

  Write down a class code that outputs a security code the

question 1 write a class called message that prompts the user to enter a message of three words as one string where

  Defines five it security positions

Create a 1-page outline to be included with your audit that defines five IT security positions that will add significant expertise and experience to your security audit.

  Design effective organization cybersecurity standards

Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer.

  Describe the properties and usage of digital signatures

Describe the properties and usage of digital signatures. Evaluate digital signatures based on their legal ability to stand up in court

  Prepare a graph of the storage requirements

Prepare a graph of the storage requirements for the project.

  Explore and analyse information security threats

Assessment Three - Cyber intelligence is the ability to define, explore and analyse information security threats. Advanced adversaries accomplish their goals using advanced tools

  Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd