Classic Catalog Company runs a small but rapidly growing catalog sales business. It outsourced its Web operations to a local ISP for several years but as the Web have become a larger portion of its business, it has decided to move its Web sites onto its own internal computer systems. It has also decided to undertake a major upgrade of its own internal networks. The company has two buildings, an office complex, and a warehouse. The two-story office building has 60 computers. The first floor has 40 computers, 30 of which are devoted to telephone sales. The warehouse, located 400 feet across the company's parking lot from the office building, has about 100,000 square feet, all on one floor. The warehouse has 15 computers in the shipping department located at one end of the warehouse. The company is about to experiment with using wireless handheld computers to help employees more quickly locate and pick products for customer orders, Based on traffic projections for the coming year, the company plans to use a T1 connection from its office to its ISP. It has three servers: the main Web server, and email server, and an internal application server for its application systems (e.g., orders, payroll). Perform a risk assessment.© BrainMass Inc. brainmass.com October 16, 2018, 11:11 pm ad1c9bdddf
Please find the design and explnation of the network required in the attached file.
Please let me know, if you have any further query.
Risk Assessment of three servers for a Catalog Company:
In the given scenario we have to secure basically three servers and we have to perform the risk assessment for these servers as listed below:
Web server is an important part of any network as it is hosting the websites. For security point of view we must take care that the person outside our network can access only those sites which are not restricted i.e. we have kept them under our public folder of web server directory. Here is a small example of configuration of the script for the web server:
Server Name www.xyz.com
Deny from all
Network security, design and management is examined.
Emergency evacuation plans and security management
Answer 5 of the 8 questions presented. Please answer your selected questions fully and completely. Please insert page breaks between each question. List questions in order by their assigned question number.
Instructions: Use original thought. Be creative; do not limit yourself to conventional thinking. Learn to think out of the box and expand your answers and solutions.
Covers all Chapters in Introduction to Security, 8th Edition, by Robert J. Fischer and Gion Green, Answer 5 of the 8 questions presented. This is an essay your response to each question should be 1-2 pages, double spaced, in length. Start each new question at the top of a new page. Please answer your selected questions fully and completely.
Assessment: You are evaluated on how well you present your work and how clear you express the basic guidelines and philosophical approached to study of security management.
1. When management is developing a plan for emergency evacuations, what things need to be considered?
2. What are the legal implications that accompany the arrest of a shoplifter?
3. In context of security management discuss and define controlled areas, limited areas and exclusion areas?
4. How are local area networks (LANs) and the World Wide Web (WWW) security issues?
5. Why is total evacuation of a facility a drastic reaction to a bomb threat? Discuss potential hazards of evacuation.
6. Discuss intervention and the various steps necessary in preventing and responding to workplace violence.
7. In regards to management, discuss the hiring process and three important items that an employer should look for in a perspective employee?
8. List several major trends for security in the 21st century. Discuss their significance from a management perspective?View Full Posting Details