CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 283 Weeks Ago, 2 Days Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > Computer Science Posted 26 Dec 2017 My Price 10.00

Securing Personal Data - Privacy

Securing Personal Data - Privacy

You want to deploy a Web business application for your company’s extranet. The extranet consists of your employees, client’s privileged customers, industry partners, Suppliers and subcontractors. Access to certain files and folders is controlled internally by your company’s network administrators, and communication is through emails, chat messages and discussion forums.  Your company does tendering processes and Supply Chain Management on behalf of Medium to Large Organisations. However, there have been reports of escalating Social engineering attacks on some of the (e.g. Phishing) applications on the Web. The primary security mechanisms you are looking out for is an application that will secure email messages and personal data. The application should also provide User Authentication, in conjunction with the company firewall.

Which security mechanisms will you deploy to ensure the integrity of your emails and personal data once the system is in use? In your report, state reasons why you chose it?                      [30]

Give a detailed description of how internal users and the extranet community (i.e. contractors) do not gain access to confidential files and folders? And that the entire extranet infrastructure is secure? [10]

Describe in detail how you going to ensure that users do not fall prey to Social Engineering attack? [10]

Answers

(12)
Status NEW Posted 26 Dec 2017 03:12 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------s. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill-----------

Not Rated(0)