Question and answer
Where should Biliofind have placed firewall in its network and what kind of rules they should have used tofilter network traffic?
The computers we use in today’s society are advancing every day. Every child and adult can operate or manipulate most home computers. [ We are being taught that to succeed in today’s electronic world, the computer will help in providing all the answers. One of the problems we face with the computer is that there are so many rights versus wrong, or good versus bad things that can be done using a computer. In this report we will discuss how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, how encryption might have helped prevent or
lessen the effects of Bibliofind’s security breach, and the California law requiring companies to inform customers when private information might have been exposed during a security breach. How Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, where the firewalls should have been placed in the network, and what kinds of rules they should have used to filter network traffic at each point. For people who are not familiar with a lot of computer terms, “a firewall is software or a hardware-software combination that is installed in a network to control the packet traffic moving through it. The firewall provides a defense between a network and the Internet or between a network and any other network that could pose a problem (Schneider, 2011, p.479)”. If Bibliofind had wanted to prevent intruders from gaining access to its transaction servers they should have used “trusted” networks where they had the client information. It is known that networks outside the firewall are unreliable (untrusted) and could cause a problem. The firewall acts as a filter to allow selected messages to flow in and out of the network. The firewall should not stop people who want to do business with Bibliofind, but restrict any and all (employees included) ]
s
Expert answered|selymi|Points 8872|
Question
Asked 9/16/2012 7:47:23 AM
0 Answers/Comments
This answer has been confirmed as correct and helpful.
Get an answer
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
explain how encryption might have helped prevent or lessen the effects of Bibliofind's security breach.
Weegy: If Bibliofind used secure sockets layer (SSL) encryption to transmit data over secure sockets, the security breach would have failed, or at least would have been less severe. [ Had the data been encrypted, the hackers would have ended up with MD5 hash, or some other form of encrypted values that they could not decrypt without the server-side keys. The architecture of the Bibliofind database should have had encrypted fields that could only be decrypted with the server-side encryption keys. The cost of this would have been very minimal as we can get SSL keys from various providers (ie – Verisign) for very cheap. Data encryption does not stop intruders from opening or exposing security holes on a server, however encryption makes it very difficult to render stolen data in to any kind of usable format. If Bibliofind did utilize data encryption, the intruders would have either spent a lot of time trying to break the encryption keys, but more than likely moved on to another site that did not have any encryption. From this we learn how important data encryption is any time we conduct e-business. Unfortunately it sometimes takes these breaches in order make our technologies stronger, but we learn lessons and learn to become more effective in future projects. ] (More)
Question
Expert Answered
Asked 9/18/2012 8:42:02 AM
0 Answers/Comments
32,540,733
questions answered
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
Popular Conversations
An ocean wave is an example of a(n) _____ wave form.
Weegy: An ocean waves are examples of surface wave. User: primary wave Weegy: In physics, a wave is disturbance or ...
10/26/2020 2:20:04 PM| 5 Answers
What is wailing?
10/27/2020 3:43:18 AM| 4 Answers
Write the following equation in the general form Ax + By + C = 0. 2x ...
Weegy: 2x + y = 6 in general form is 2x + y - 6 = 0 User: Write the following equation in the general form Ax + By + ...
10/19/2020 9:42:21 PM| 4 Answers
An athlete's arousel level refers to
10/18/2020 2:09:45 AM| 4 Answers
There are twelve months in year.
Weegy: 12+12 = 24 User: Approximately how many hours does she play soccer in a year?
10/26/2020 3:19:01 PM| 3 Answers
Amendment two
Weegy: An amendment is a formal or official change made to a law, contract, constitution, or other legal document. ...
10/21/2020 3:13:51 PM| 3 Answers
Practice and specific training can improve components of ...
Weegy: Practice and specific training can improve components of skill-related fitness limited by heredity. TRUE. ...
10/28/2020 12:20:02 AM| 2 Answers
S
L
L
Points 1969 [Total 6703] Ratings 0 Comments 1959 Invitations 1 Offline
S
L
L
1
Points 1793 [Total 8555] Ratings 14 Comments 1653 Invitations 0 Offline
S
L
P
R
P
R
L
P
P
C
R
P
R
L
P
R
P
R
P
R
Points 1255 [Total 16929] Ratings 4 Comments 1035 Invitations 18 Offline
S
L
R
Points 1188 [Total 1522] Ratings 0 Comments 1188 Invitations 0 Offline
S
L
Points 947 [Total 1115] Ratings 1 Comments 937 Invitations 0 Offline
S
L
P
P
P
1
P
L
1
Points 442 [Total 8593] Ratings 6 Comments 382 Invitations 0 Offline
S
L
P
1
L
Points 376 [Total 5912] Ratings 4 Comments 336 Invitations 0 Online
S
L
Points 350 [Total 381] Ratings 0 Comments 350 Invitations 0 Offline
S
L
Points 203 [Total 203] Ratings 0 Comments 203 Invitations 0 Offline
S
L
Points 184 [Total 3011] Ratings 5 Comments 134 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.