Author Question: Many organizations rely on a firewall to prevent or deter threats to information security that arise ... (Read 49 times)

Alygatorr01285

  • Hero Member
  • *****
  • Posts: 564
Many organizations rely on a firewall to prevent or deter threats to information security that arise from outside the organization. Using your favorite search engine or the resources of your library, identify firewall issues that can arise when companies use cloud computing as part of their online sales systems. In about 100 words, summarize your findings in terms of the perimeter expansion problem.

Question 2

Wilderness Trailhead, Inc. (WTI) is a retailer that offers hiking, rock-climbing, and survival gear for sale on its Web site. WTI offers about 1200 different items for sale and has about 1000 visitors per day at its Web site. The company makes about 200 sales each day on its site, with an average transaction value of 372. WTI sells products primarily through its Web site to customers in the United States and Canada. WTI ships orders from its two warehouses: one in Vancouver, British Columbia, and another in Shoreline, Washington. WTI accepts four major credit cards and processes its own credit card transactions. It stores records of all transactions on a database server that shares a small room with the Web server computer at WTIs main offices in a small industrial park just outside Bellingham, Washington. In about 500 words, outline a security policy for the WTI database server. Be sure to consider the threats that exist because that server stores customer credit card numbers. Use the Web Links for this exercise to find samples of security policies and detailed guidelines for creating them.



essyface1

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

As more organizations rely on cloud computing for crucial production systems, the need for security in cloud environments is increasing. The development of firewalls that work with cloud computing is advancing rapidly but has lagged behind the need for these products. Instead of establishing security policies for each server, these firewalls must enforce a single set of policies across all of the servers in the cloud. One problem with cloud environments is that the servers and databases in the cloud are started up and wound down as needed. Thus, the type of identifiable servers that most firewall products are designed to protect does not exist in the same form in cloud server environments.

Answer to Question 2

You should consider the use of:


  • Database encryption systems

  • Intrusion detection systems

  • Database activity monitors, audit, and database vulnerability scanners




Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Signs and symptoms that may signify an eye tumor include general blurred vision, bulging eye(s), double vision, a sensation of a foreign body in the eye(s), iris defects, limited ability to move the eyelid(s), limited ability to move the eye(s), pain or discomfort in or around the eyes or eyelids, red or pink eyes, white or cloud spots on the eye(s), colored spots on the eyelid(s), swelling around the eyes, swollen eyelid(s), and general vision loss.

Did you know?

Critical care patients are twice as likely to receive the wrong medication. Of these errors, 20% are life-threatening, and 42% require additional life-sustaining treatments.

Did you know?

People with high total cholesterol have about two times the risk for heart disease as people with ideal levels.

Did you know?

In inpatient settings, adverse drug events account for an estimated one in three of all hospital adverse events. They affect approximately 2 million hospital stays every year, and prolong hospital stays by between one and five days.

Did you know?

Most childhood vaccines are 90–99% effective in preventing disease. Side effects are rarely serious.

For a complete list of videos, visit our video library