After evaluating the business needs of First World Bank Savings and Loan (FWBSL) and the use of secure open source software to enhance security and reduce business costs, I have concluded that the best option would be to introduce Centos to the network. The reason I chose this is because they offer free software and it also mirrors Red Hat Enterprise Linux (RHEL).
Centos offer many online support options and can be updated regularly. Listed below are the server options that I suggest are the best option for FWBSL: Database Server:MySQL Web Server:Apache File Server:Samba Mail Server:Simple Mail Transfer Protocol (SMTP)
LDAP Server:Open LDAP First World Bank Savings and Loan will need to implement a three tier platform architecture that will offer more security for their clients and business needs. Implementing this type of platform will ensure that FWBSL will not be in trouble with GLBA and will keep them compliant with PCI DSS. Tier OneClient Side Tier TwoApplications Tier ThreeServers I hope this give First World Bank Savings and Loan a brief description of what needs to be implemented within the company in order to offer better services and still stay compliant with the State and Federal Regulations. Thank you,
Project Part 1 Task 1 First World Bank Savings and Loan (FWBSL) needs to consider the increased revenue and cost that will be present if they decide to offer secure services to their clients. With them expecting to have over $100,000,000 a year for online credit cards and loan applications together with other banking services, they are also expected to provide this service while paying close attention to the three security priorities which are: confidentiality, integrity, and availability. Customers expect FWBSL to be diligent when it comes to protecting their accounts and Nonpublic Personal Information.
The Essay on What Technology Offers Movies World People
Books and Technology: Is the Future of Printed Books in Jeopardy? Technology has impacted our lives in innumerable ways. It is so implemented into our daily lives, that not a thought crosses our minds about how easily we are living. Technology has changed our world significantly. Are television, movies and news broadcasts corrupting the youth of society? This paper examines the issues surrounding ...
If something were to go wrong they could lose credibility with their current and potential customers. To properly implement a security control system FWBSL has enlisted a network engineer for their networking design. There has also been a lot of discussion about the banking needs for the online transaction that will need to implement a good transaction infrastructure. The following lists what should be determined for the proper implementation of the infrastructure: •A Database Server •A Web Server •A File Server •A Simple Mail Transfer Protocol (SMTP) Server •An LDAP Server
There also needs to be a three tier architecture implemented that will offer security and scalability to FWBSL and their customers. Tier one would involve the client end of the architecture. Tier two will be the business side and the third tier will protect the servers that will be implemented for the running of the company. These servers will be located off the facilities at a secure third party location. Also, FWBSL needs to remain in compliance with the Gramm-Leach-Bliley Act (GLBA) which states that the customer’s privacy and security are of the most importance to any business.
There needs to be encryption for the data transactions as well as encrypted logins and an access policy. The best practice is to implement an authentication that requires a username, security question, and a password that involves the use of numbers, letters, capital letters and characters. If the GLBA is not followed and there is a security breach than FWBSL will come under scrutiny and the Federal Trade Commission (FTC) will start to investigate and could impose strict penalties and fines as well as the loss of customer’s.
The Term Paper on Information System Security Principles
Availability Availability assures that a system’s authorized users have timely and uninterrupted access to the information in the system and to the network. Other important terms Also important to network security are the following four C-I-A–related terms: ? Identification—The act of a user professing an identity to the system, such as a logon ID ? Authentication—Verification that the user’s ...
Since a version of Linux has been chosen it is best to understand why. Mainly because it will cut down the costs but also it is a secure platform. I would personally recommend Centos because it mirrors Red Hat Enterprise Linux and is more flexible than Windows or Macintosh and offers more security to the banking industry which is a very valuable asset to the company. I would recommend that the personnel of First Bank Savings and Loan be taught how to use Linux so that they can become more proficient but also know when updates will be made available. Task 2
After spending some time researching the different open source software options that are made available to First World Bank Savings and Loan, I have concluded that Centos is the best solution. Centos are free open software and will offer the same options as Red Hat Enterprise Linux (RHEL).
It also offers regular updates that the IT staff will need to understand and know in order to properly get them installed and pushed out to the users. I also think that the employees will also need to know how to operate Centos as it is completely different than any Windows or Macintosh software.
There are also many online support options readily available to the user and is very reliable. Centos are always being tested to make sure that it is secure and there won’t be any problems down the road. After the implementation of Centos, the following servers will be used and supported: Database ServerMySQLProvides fast backend solutions and can be used on multiple operating systems File ServerSambaUses SMB protocol to share files and printers and can also share between Linux and Windows OS Web ServerApacheMost popular.
Uses SSL to encrypt data transfers across the web Task 3 First World Bank Savings and Loans will need to set up an account policy for the users and groups within the company. The policy will implement permissions to the Web Administrator, Linux Administrators, Security Analysts, IT, and employees. There will be five groups that will be given the permissions that they need perform their jobs and special permissions will be given to the department heads for each group.
The users will be trained in the proper security protocols and will be required to sign an Acceptable User Policy (AUP) that will stay in their file and updated yearly. These policies are crucial for FWBSL to maintain security and avoid the possibilities of violations. •Web Administrators: The permissions for the Apache Web server administrator will be set at 755 and will give full access to the owner, read and execute to the group, and read and execute to others.
The Essay on Nds Security Users Effective
NDS Object and Property Rights NDS security is similar in many ways the file system security. The file system security is controlled through access rights given through trustee assignments to directories and through directory and file attributes. NDS security uses an Access Control List (ACL) to give trustee assignments to objects on the NDS tree. This access control consists of two categories of ...
•Linux Administrators: will have 755 for the AD, database server, file server, SMTP server, and the LDAP server to be able to manage user accounts and maintenance on the system. This will give full access to the owner, read and execute to the group, and read and execute to others. •Security Analyst: The permissions for the Security Analyst should be set to 640 and will give the owner read and write, the group read only, and no one else should have access. •IT: The permissions will be same as the Web and Linux Administrators. •Employees: Will have basic read, write, and execute privileges.