PROMOTE MY BLOG: JUST CLICK BELOW BUTTON

Search Any Paper On This Blog

Wednesday, June 29, 2011

::: vuaskari.com ::: CS507_FALL 2011 IDEA SOLUTION


CS507_IDEA SOLUTION

 

 

Question:

A famous boutique in Lahore is going to launch a website to introduce online shopping facility for its customers.

What kind of preventive measures can be adopted to save the website from the expected threats?

Answer:

 

 

• Keep the password secret – do not reveal it to anyone

• Do not write it down if it is complex, people prefer to save it in their cell phone memory, or

write on a piece of paper, both of these are not preferred practices.

 

• Changing password regularly – Passwords should be associated with users not machines.

Password generation program can also be used for this purpose.

• Be discreet it is easy for the onlookers to see which keys are being used, care should be taken while entering the password.

• Do not use obvious password – best approach is to use a combination of letters, numbers,

upper case and lower case. Change passes word immediately if you suspect that anyone else

knows it

 

There is not asingle control available to cater for the risk of vulnerabilities associated with web (Internet). Someof the solutions are:

 

• Firewall Security Systems

 

• Intrusion Detection Systems

 

• Encryption

build firewalls as one means of perimeter security for their networks. Likewise, this same principle holds true for very sensitive or critical systems that need to be protected from entrusted users inside the corporate network

 

Generally, most organizations can follow any of the two philosophies

 

Deny-all philosophy -- which means that access to a given recourses will be denied unless

a user can provide a specific business reason or need for access to the information

resource.

Accept All Philosophy -- under which everyone is allowed access unless someone can

provide a reason for denying access.

 

 

Intrusion Detection Systems (IDS)

Another element to securing networks is an intrusion detection system (IDS). IDS is used in

complement to firewalls. An IDS works in conjunction with routers and firewalls by monitoring

network usage anomalies. It protects a company's information systems resources from external aswell as internal misuse.

 

• Signature-based: These IDS systems protect against detected intrusion patterns. The

intrusive patterns they can identify are stored in the form of signatures.

• Statistical-based: These systems need a comprehensive definition of the known and

expected behaviour of systems.

• Neural networks: An IDS with this feature monitors the general patterns of activity and

traffic on the network and creates a database.

 

Web Server Logs

System and network logs can alert the Web administrator that a suspicious

event has occurred and requires further investigation. Web server software can provide additional

log data relevant to Web-specific events. If the Web administrator does not take advantage of these capabilities, Web-relevant log data may not be visible or may require a significant effort to access.

 

Also explain the technique used to make your electronic documents (such as email, text files) secured? [10 marks]

.

 

Biometrics

Identification of an individual through unique physical characteristics is proving to be quite safe

and secure for allowing access. The study of personal characteristics has been extensively used

for identification purposes. Biometrics can be defined as study of automated methods for

uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.

 

Passwords

"Password is the secret character string that is required to log onto a computer system, thus

preventing unauthorized persons from obtaining access to the computer. Computer users may

password-protect their files in some systems."

 

Cryptography

In literal terms, cryptography means science of coded writing. It is a security safeguard to render

information unintelligible if unauthorized individuals intercept the transmission. When the

information is to be used, it can be decoded. "The conversion of data into a secret code for the

secure transmission over a public network is called cryptography.

 

--
 ●●Gяєу_Fєяяy ●●
Bloom Box Wiki

--
We say, "Be one as Pakistani Nation and grow up for Pakistan's Future". Wish you all the best. Join www.vuaskari.com,
To post to this group, send email to vuaskari_com@googlegroups.com
Visit these groups:
This (Main) Group:http://groups.google.com/group/vuaskari_com?hl=en?hl=en
MIT/MCS Group: http://groups.google.com/group/vu_askarimit?hl=en?hl=en
HRM Group: http://groups.google.com/group/askari_hrm?hl=en?hl=en
Banking Group: http://groups.google.com/group/askari_banking?hl=en?hl=en
Management: https://groups.google.com/group/vuaskari_mgt?hl=en
Marketing: https://groups.google.com/group/vuaskari_mkt?hl=en
MIS Group: http://groups.google.com/group/askari_mis?hl=en

No comments:

Post a Comment

PLEASE COMMENT ABOUT YOUR VISIT AND MY SITE

Note: Only a member of this blog may post a comment.