Author Question: Many organizations rely on a firewall to prevent or deter threats to information security that arise ... (Read 88 times)

Alygatorr01285

  • Hero Member
  • *****
  • Posts: 564
Many organizations rely on a firewall to prevent or deter threats to information security that arise from outside the organization. Using your favorite search engine or the resources of your library, identify firewall issues that can arise when companies use cloud computing as part of their online sales systems. In about 100 words, summarize your findings in terms of the perimeter expansion problem.

Question 2

Wilderness Trailhead, Inc. (WTI) is a retailer that offers hiking, rock-climbing, and survival gear for sale on its Web site. WTI offers about 1200 different items for sale and has about 1000 visitors per day at its Web site. The company makes about 200 sales each day on its site, with an average transaction value of 372. WTI sells products primarily through its Web site to customers in the United States and Canada. WTI ships orders from its two warehouses: one in Vancouver, British Columbia, and another in Shoreline, Washington. WTI accepts four major credit cards and processes its own credit card transactions. It stores records of all transactions on a database server that shares a small room with the Web server computer at WTIs main offices in a small industrial park just outside Bellingham, Washington. In about 500 words, outline a security policy for the WTI database server. Be sure to consider the threats that exist because that server stores customer credit card numbers. Use the Web Links for this exercise to find samples of security policies and detailed guidelines for creating them.



essyface1

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

As more organizations rely on cloud computing for crucial production systems, the need for security in cloud environments is increasing. The development of firewalls that work with cloud computing is advancing rapidly but has lagged behind the need for these products. Instead of establishing security policies for each server, these firewalls must enforce a single set of policies across all of the servers in the cloud. One problem with cloud environments is that the servers and databases in the cloud are started up and wound down as needed. Thus, the type of identifiable servers that most firewall products are designed to protect does not exist in the same form in cloud server environments.

Answer to Question 2

You should consider the use of:


  • Database encryption systems

  • Intrusion detection systems

  • Database activity monitors, audit, and database vulnerability scanners




Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Illness; diuretics; laxative abuse; hot weather; exercise; sweating; caffeine; alcoholic beverages; starvation diets; inadequate carbohydrate consumption; and diets high in protein, salt, or fiber can cause people to become dehydrated.

Did you know?

Automated pill dispensing systems have alarms to alert patients when the correct dosing time has arrived. Most systems work with many varieties of medications, so patients who are taking a variety of drugs can still be in control of their dose regimen.

Did you know?

Recent studies have shown that the number of medication errors increases in relation to the number of orders that are verified per pharmacist, per work shift.

Did you know?

There are over 65,000 known species of protozoa. About 10,000 species are parasitic.

Did you know?

Medications that are definitely not safe to take when breastfeeding include radioactive drugs, antimetabolites, some cancer (chemotherapy) agents, bromocriptine, ergotamine, methotrexate, and cyclosporine.

For a complete list of videos, visit our video library