Author Question: Many organizations rely on a firewall to prevent or deter threats to information security that arise ... (Read 58 times)

Alygatorr01285

  • Hero Member
  • *****
  • Posts: 564
Many organizations rely on a firewall to prevent or deter threats to information security that arise from outside the organization. Using your favorite search engine or the resources of your library, identify firewall issues that can arise when companies use cloud computing as part of their online sales systems. In about 100 words, summarize your findings in terms of the perimeter expansion problem.

Question 2

Wilderness Trailhead, Inc. (WTI) is a retailer that offers hiking, rock-climbing, and survival gear for sale on its Web site. WTI offers about 1200 different items for sale and has about 1000 visitors per day at its Web site. The company makes about 200 sales each day on its site, with an average transaction value of 372. WTI sells products primarily through its Web site to customers in the United States and Canada. WTI ships orders from its two warehouses: one in Vancouver, British Columbia, and another in Shoreline, Washington. WTI accepts four major credit cards and processes its own credit card transactions. It stores records of all transactions on a database server that shares a small room with the Web server computer at WTIs main offices in a small industrial park just outside Bellingham, Washington. In about 500 words, outline a security policy for the WTI database server. Be sure to consider the threats that exist because that server stores customer credit card numbers. Use the Web Links for this exercise to find samples of security policies and detailed guidelines for creating them.



essyface1

  • Sr. Member
  • ****
  • Posts: 347
Answer to Question 1

As more organizations rely on cloud computing for crucial production systems, the need for security in cloud environments is increasing. The development of firewalls that work with cloud computing is advancing rapidly but has lagged behind the need for these products. Instead of establishing security policies for each server, these firewalls must enforce a single set of policies across all of the servers in the cloud. One problem with cloud environments is that the servers and databases in the cloud are started up and wound down as needed. Thus, the type of identifiable servers that most firewall products are designed to protect does not exist in the same form in cloud server environments.

Answer to Question 2

You should consider the use of:


  • Database encryption systems

  • Intrusion detection systems

  • Database activity monitors, audit, and database vulnerability scanners




Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Allergies play a major part in the health of children. The most prevalent childhood allergies are milk, egg, soy, wheat, peanuts, tree nuts, and seafood.

Did you know?

Vaccines prevent between 2.5 and 4 million deaths every year.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

Did you know?

Green tea is able to stop the scent of garlic or onion from causing bad breath.

Did you know?

People with high total cholesterol have about two times the risk for heart disease as people with ideal levels.

For a complete list of videos, visit our video library