Author Question: Many organizations rely on a firewall to prevent or deter threats to information security that arise ... (Read 57 times)

Alygatorr01285

  • Hero Member
  • *****
  • Posts: 564
Many organizations rely on a firewall to prevent or deter threats to information security that arise from outside the organization. Using your favorite search engine or the resources of your library, identify firewall issues that can arise when companies use cloud computing as part of their online sales systems. In about 100 words, summarize your findings in terms of the perimeter expansion problem.

Question 2

Wilderness Trailhead, Inc. (WTI) is a retailer that offers hiking, rock-climbing, and survival gear for sale on its Web site. WTI offers about 1200 different items for sale and has about 1000 visitors per day at its Web site. The company makes about 200 sales each day on its site, with an average transaction value of 372. WTI sells products primarily through its Web site to customers in the United States and Canada. WTI ships orders from its two warehouses: one in Vancouver, British Columbia, and another in Shoreline, Washington. WTI accepts four major credit cards and processes its own credit card transactions. It stores records of all transactions on a database server that shares a small room with the Web server computer at WTIs main offices in a small industrial park just outside Bellingham, Washington. In about 500 words, outline a security policy for the WTI database server. Be sure to consider the threats that exist because that server stores customer credit card numbers. Use the Web Links for this exercise to find samples of security policies and detailed guidelines for creating them.



essyface1

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

As more organizations rely on cloud computing for crucial production systems, the need for security in cloud environments is increasing. The development of firewalls that work with cloud computing is advancing rapidly but has lagged behind the need for these products. Instead of establishing security policies for each server, these firewalls must enforce a single set of policies across all of the servers in the cloud. One problem with cloud environments is that the servers and databases in the cloud are started up and wound down as needed. Thus, the type of identifiable servers that most firewall products are designed to protect does not exist in the same form in cloud server environments.

Answer to Question 2

You should consider the use of:


  • Database encryption systems

  • Intrusion detection systems

  • Database activity monitors, audit, and database vulnerability scanners




Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Most women experience menopause in their 50s. However, in 1994, an Italian woman gave birth to a baby boy when she was 61 years old.

Did you know?

To prove that stomach ulcers were caused by bacteria and not by stress, a researcher consumed an entire laboratory beaker full of bacterial culture. After this, he did indeed develop stomach ulcers, and won the Nobel Prize for his discovery.

Did you know?

Bacteria have been found alive in a lake buried one half mile under ice in Antarctica.

Did you know?

Though methadone is often used to treat dependency on other opioids, the drug itself can be abused. Crushing or snorting methadone can achieve the opiate "rush" desired by addicts. Improper use such as these can lead to a dangerous dependency on methadone. This drug now accounts for nearly one-third of opioid-related deaths.

Did you know?

About 3% of all pregnant women will give birth to twins, which is an increase in rate of nearly 60% since the early 1980s.

For a complete list of videos, visit our video library