ssuthur versty edu divle content SOS2 view - PC South University Camp... (Data S
ID: 3898324 • Letter: S
Question
ssuthur versty edu divle content SOS2 view - PC South University Camp... (Data Structures - In.South University lav C E ersity Camp le Data Structures . ?531 South University Jav Tools Help n this assignment, you will consider the need for security controls to protect the availability confidentiality, and integrity of electronic data. Continuing with the scenario from Week 2 Discussion, every registered user of Paul Gray's online share trading company is required to read the safety and privacy page of the portal. As a secure portal, it has Secure Socket Layer (SSL) as a security measure. Gray has asked you to help him with this aspect of security as well. As many of Gray's clients would also like to know about tax saving measures when they trade, Gray has hired Steve Davis as a tax consultant. Davis works from home and travels to his clients all over the country. Occasionally, he visits client sites, and takes his laptop with him on all such trips Gray has asked for recommendations on his current system and for Davis and his setup. Answer the following questions: . On Gray's portal, what security measures in addition to SSL can be deployed to ensure the privacy of users in an online environment? Provide at leastltwo security measures and explain why they would be beneficial. What benefit does each provide to the user? How can the user be sure it is working properly? For Davis, which top two security measures should he take to ensure that his data and the connection to Gray's network are best protected against attack? Describe the security provided by each measure and explain why it is important. Defend your choice of measures in the discussions that follow. Are these two measures sufficient to call the laptop secure? Why or why not? If not, what aspect of security is still missing? Post to the Discussion Area by the due date assigned Start a New Thread 0Explanation / Answer
Apart from SSL ,we can protect our online data with help of some securtiy measures which are being explained below-
1-Set up a password policy-
Creating a strong password policy is key to safeguard private information such as log-in credentials, address, and payment information.
The following policies must be followed for password securtiy-
2-Firewalls Security-A properly configured firewall will restrict access to everything except the specific services you need to remain open. Exposing only a few pieces of software reduces the attack surface of your server, limiting the components that are vulnerable to exploitation.
To implement firewall security we can use-
UFW firewall. Other options are to use iptables or the CSF firewall.
For Davis- Other Securities Can be used to protect from Attacks-
Powerful antivirus-He must select the best antivirus they can afford, even if it costs a little extra. Various parameters such as the geographical spread of work force, the movement of people within and outside the network (such as remote working), hosting environment (in house or cloud or third party hosting) will form the key parameters to select the optimum antivirus software for your particular needs.
Secure all end points-With increasing number of mobile devices, the number of endpoints that can be used to access or hack into company data has increased Each device carries at least 3 to 4 endpoints each. Due to a variety of device models and configurations, each end point is different from the others. Irrespective of the differences, each end point must be secured. A comprehensive end point management software has become a mandatory requirement for today’s mobile, geographically spread and high productivity work force.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.