Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Topic - Sentinel Defense Technologies ( Internal Operations Database ) First we would need a Customer Management System containing the customer s contact information, items

Topic - Sentinel Defense Technologies
(Internal Operations Database)
First we would need a Customer Management System containing the customers contact information, items purchased, quantity, and what model number/sku, customer location specifications(sqft of premises, with schematics of their building))
Next we would need a Vendor Database containing the Vendor information.
Vendor Profile contains: Vendor data contains name, contact details, address, the types of goods they sell (electronic security or physical barriers), Bank account info for billing.
Performance Metric tracking: (Tracking relationship with vendors, quality ratings....... Contract Management (Copies of all agreements, regulatory compliance... important for audit trails/compliance checks.
Communications Logs: Tracks all interactions with vendors (emails calls and meetings ensuring theres a history of comms for reference
Finally a Financial System that would interface with the Customer Management System, and the Vendor Database, that would store Customer Credit Card Information and Vendor Payment Information.
(External Operations Database)
This would contain the client facing Product Display showing the products offered (Cameras, alarms, sensors, etc), and detailed specifications for potential customers
Features: Includes product descriptions, etc....
(Regulations to keep in mind): GDPR, CCPA, NIST, PCI-DSS)
Overview of key elements of regulations that are to be kept in mind in the utilized systems by our engineer:
In countries belonging to the European Union, adherence to GDPR, defined by asserting legalities, and acquiring the consent of users for the usage of data such as data transference to any type of entity, consent for our right to access said data
NIST: Creating a framework to bolster our ability to manage risks to be incurred, and incident response
#######GIVE ME OWASP REPORT ON THIS TOPIC#####

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Genomes Browsers And Databases Data Mining Tools For Integrated Genomic Databases

Authors: Peter Schattner

1st Edition

0521711320, 978-0521711326

More Books

Students also viewed these Databases questions

Question

Explain why PPP does not hold.

Answered: 1 week ago