The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 283 Weeks Ago, 2 Days Ago |
| Questions Answered: | 27237 |
| Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
Securing Personal Data - Privacy
You want to deploy a Web business application for your company’s extranet. The extranet consists of your employees, client’s privileged customers, industry partners, Suppliers and subcontractors. Access to certain files and folders is controlled internally by your company’s network administrators, and communication is through emails, chat messages and discussion forums. Your company does tendering processes and Supply Chain Management on behalf of Medium to Large Organisations. However, there have been reports of escalating Social engineering attacks on some of the (e.g. Phishing) applications on the Web. The primary security mechanisms you are looking out for is an application that will secure email messages and personal data. The application should also provide User Authentication, in conjunction with the company firewall.
Which security mechanisms will you deploy to ensure the integrity of your emails and personal data once the system is in use? In your report, state reasons why you chose it? Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â [30]
Give a detailed description of how internal users and the extranet community (i.e. contractors) do not gain access to confidential files and folders? And that the entire extranet infrastructure is secure? [10]
Describe in detail how you going to ensure that users do not fall prey to Social Engineering attack? [10]
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------s. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill-----------