Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Consider the following scenario: In this assignment, you will consider the need

ID: 3874345 • Letter: C

Question

Consider the following scenario:

In this assignment, you will consider the need for security controls to protect the availability, confidentiality, and integrity of electronic data. Continuing with the scenario, every registered user of Paul Gray's online share trading company is required to read the safety and privacy page of the portal. As a secure portal, it has Secure Socket Layer (SSL) as a security measure. Gray has asked you to help him with this aspect of security as well.
As many of Gray's clients would also like to know about tax saving measures when they trade, Gray has hired Steve Davis as a tax consultant. Davis works from home and travels to his clients all over the country. Occasionally, he visits client sites, and takes his laptop with him on all such trips.
Gray has asked for recommendations on his current system and for Davis and his setup.

Answer the following questions:

On Gray’s portal, what security measures in addition to SSL can be deployed to ensure the privacy of users in an online environment? Provide at least two security measures and explain why they would be beneficial. What benefit does each provide to the user? How can the user be sure it is working properly?

For Davis, which top two security measures should he take to ensure that his data and the connection to Gray's network are best protected against attack? Describe the security provided by each measure and explain why it is important. Defend your choice of measures in the discussions that follow. Are these two measures sufficient to call the laptop secure? Why or why not? If not, what aspect of security is still missing?

Explanation / Answer

As the same information is stored in one particular office network so we have to enable strong firewall system in network like firewall same as Cisco pix, software firewall and antispyware like Symantec endpoint protection, payment gateway protection like Norton secured. If we implement network security so user data will be secured. We can also enable OTP system which will generate and delivered to user only. For Davis we can enable checkpoint encryption software so his laptop will be encrypted and only Davis is able to open it. Also we have to install one antivirus in Davis laptop and need to enable strong proxy settings as well as strong firewall rules so no unauthorised access can be happen.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote