Author Question: Many organizations rely on a firewall to prevent or deter threats to information security that arise ... (Read 59 times)

Alygatorr01285

  • Hero Member
  • *****
  • Posts: 564
Many organizations rely on a firewall to prevent or deter threats to information security that arise from outside the organization. Using your favorite search engine or the resources of your library, identify firewall issues that can arise when companies use cloud computing as part of their online sales systems. In about 100 words, summarize your findings in terms of the perimeter expansion problem.

Question 2

Wilderness Trailhead, Inc. (WTI) is a retailer that offers hiking, rock-climbing, and survival gear for sale on its Web site. WTI offers about 1200 different items for sale and has about 1000 visitors per day at its Web site. The company makes about 200 sales each day on its site, with an average transaction value of 372. WTI sells products primarily through its Web site to customers in the United States and Canada. WTI ships orders from its two warehouses: one in Vancouver, British Columbia, and another in Shoreline, Washington. WTI accepts four major credit cards and processes its own credit card transactions. It stores records of all transactions on a database server that shares a small room with the Web server computer at WTIs main offices in a small industrial park just outside Bellingham, Washington. In about 500 words, outline a security policy for the WTI database server. Be sure to consider the threats that exist because that server stores customer credit card numbers. Use the Web Links for this exercise to find samples of security policies and detailed guidelines for creating them.



essyface1

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

As more organizations rely on cloud computing for crucial production systems, the need for security in cloud environments is increasing. The development of firewalls that work with cloud computing is advancing rapidly but has lagged behind the need for these products. Instead of establishing security policies for each server, these firewalls must enforce a single set of policies across all of the servers in the cloud. One problem with cloud environments is that the servers and databases in the cloud are started up and wound down as needed. Thus, the type of identifiable servers that most firewall products are designed to protect does not exist in the same form in cloud server environments.

Answer to Question 2

You should consider the use of:


  • Database encryption systems

  • Intrusion detection systems

  • Database activity monitors, audit, and database vulnerability scanners




Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

It is difficult to obtain enough calcium without consuming milk or other dairy foods.

Did you know?

People with high total cholesterol have about two times the risk for heart disease as people with ideal levels.

Did you know?

As of mid-2016, 18.2 million people were receiving advanced retroviral therapy (ART) worldwide. This represents between 43–50% of the 34–39.8 million people living with HIV.

Did you know?

About 60% of newborn infants in the United States are jaundiced; that is, they look yellow. Kernicterus is a form of brain damage caused by excessive jaundice. When babies begin to be affected by excessive jaundice and begin to have brain damage, they become excessively lethargic.

Did you know?

Famous people who died from poisoning or drug overdose include, Adolf Hitler, Socrates, Juan Ponce de Leon, Marilyn Monroe, Judy Garland, and John Belushi.

For a complete list of videos, visit our video library