Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Company XYZ is a software company which consists of 1 5 0 0 total staff, employed at the headquarters and other branches across the country.
Company XYZ is a software company which consists of total staff, employed at the headquarters and other branches across the country. Its business model relies on electronic transactions with key customers and suppliers. Company XYZ uses a BizTalk Server implementation for its transactions. Company XYZ uses BizTalk Server to manage transactions and communications between internal and external applications. Company XYZ communicates with approximately internal applications and trading partners. It currently processes approximately million documents per month, and estimates that it will process million documents per month by the end of
Company XYZ has installed all the products from Microsoft, which includes domain controllers, file servers, print servers and exchange server. All products are licensed and number of licensed purchased are enough for the company employee strength. Company XYZ uses BizTalk Server as a message broker to communicate between internal applications and to process, send, and receive correctly formatted messages to and from its suppliers and customers. Company XYZ has to process internal and external documents in different formats. This includes flat files and XML documents. Company XYZ uses a single firewall to separate its corporate computers from the Internet. As an added layer of security, Company XYZ incorporates Internet Protocol security IPsec communication between all its corporate servers and workstations that reside within the corporate network. Company XYZ uses IPsec to encrypt all communications within its internal domain. Company XYZ uses a file share server to receive flat files. This file share server resides outside its corporate network and domain. A firewall separates the file share server from the corporate network. Company XYZs external partners post their flat file documents on this file share server, and they communicate with the file share server through an encrypted PointtoPoint Tunneling Protocol PPTP pipeline. Company XYZ protects access to the file share server by partner passwords that expire every days. Company XYZ has created a custom filemovement application that retrieves the flat file documents from the file share server and sends them to BizTalk Server for additional processing. The internal applications for Company XYZ also use the custom filemovement application to pass flat files to Application Server, transforms these documents and sends them to Company XYZs trading partners.
the servers to make sure they have the correct security settings. Company XYZ logs all exceptions for review. Company XYZ uses a Microsoft Exchange server to exchange emails internally and externally. A mail exchange relay is installed outside the firewall to receive emails, check for any virus infection and then move the message to the internal exchange server. An antivirus software is installed on the exchange relay to do the virus check. Outlook web access OWA is provided to all the internal users to use the email system outside the company using Microsoft Outlook software installed on their laptops.
## Potential Threats and Security Concerns
Company XYZ wants to make sure that it receives and processes only messages from authenticated sources. Company XYZ also wants to make sure that it can receive and retrieve documents from outside its corporate network as safely as possible. The firewall that separates Company XYZs corporate network from the Internet only lets through traffic from port and port The firewall rejects all other traffic. Company XYZ also wants to make sure that their email system is not hacked or cracked because they heavily rely on the email messages from clients to process their transactions. Company XYZ also want to protect its data regarding its employees, customers, transactions, financial and other documents related to business. Company XYZ wants to make sure that the employees use encrypted USBs only, they would like to distribute the digital certificate using the domain controllers. Company XYZ also wants to implement backup process to secure all critical data of the business. Company XYZ is also looking into Cloud Computing and Virtualization solutions to protect their data from disaster. Company XYZ would like to implement physical security as well and central monitoring system. Company XYZ would also like to implement VoIP system and record all the official callsto protect against any espionage.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started