Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Many of your customers and sales representatives have asked for a web-based on-line ordering system. Bering is reviewing the possibility and have asked you to

Many of your customers and sales representatives have asked for a web-based on-line ordering system. Bering is reviewing the possibility and have asked you to review and make recommendations regarding the security of such a venture.

Specifically, your companys Board of Directors has requested a detailed forward-looking plan with emphasis on securing your proposed web presence assets.

You need to consider the following:

Securing the customers private information and their access to the customer database.

Securing the companys databases and proprietary information.

Securing the companys internal network from any outside vulnerabilities.

Review current Information Technology of e-Commerce, including the techniques used to secure e-Commerce. Describe some of the drawbacks as they relate to security. Consider:

What type of attacks need to be considered?

How will you protect against them?

What do you need to consider regarding malicious code?

This assignment focuses on attacks to a web-based network infrastructure: malicious code, social engineering, and intrusion prevention and protection.

For this project, create a design plan in which you:

Summarize the advantages and disadvantages of creating a web based application with regard to security.

Describe the techniques and technologies you would use to implement in order to mitigate these security challenges and explain why you chose these techniques and technologies.

Describe the resources you would use for your organization in order to monitor and address Web application security threats.

Analyze the internal security procedures and practices you will use to validate the security of your enterprises Web applications.

Provide a brief Executive Summary of how your design is meeting the strategic goals of the company outlined in the Course Project Introduction, as applicable.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2010 Barcelona Spain September 2010 Proceedings Part 2 Lnai 6322

Authors: Jose L. Balcazar ,Francesco Bonchi ,Aristides Gionis ,Michele Sebag

2010th Edition

364215882X, 978-3642158827

More Books

Students also viewed these Databases questions

Question

1. Does your voice project confidence? Authority?

Answered: 1 week ago