Eicon Networks S92 Manual de usuario Pagina 9

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 8
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 9
Introduction
Asecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevelopatruly
effectivesecuritysolution,thepoliciesmustfirstbeclearlydefined.Forthisproject,
thesecuritypoliciesareintroducedinAssignment2–Part1.
BusinessRequirement
ThedesignoftheGIACsecurityarchitecturehastosatisfytherequirementslisted
below:
n Externalcustomersarebuyinggoodsandmakingpaymentsonlinesecurely.
n Externalpartnersandsuppliersareaccessingandupdatingtheecommerce
resourcedatabasesecurely.BOTHtheexternalpartnersandthesuppliers
collaboratewithGIACviatheuseoftheGIACcriticaldatabaseapplication.
Thisapplicationprovidesastandardizedwebbasedinterface,andeachpartner/
supplierisassignedasetofuniqueloginprofileandprivileges.
n Companystaffsoccasionallyneedtoaccessinhouseserverresourcesfrom
home.
n Internalstaffsfrequentlyneedtoaccesstheinternet.
n GIACisexperiencingtremendousbusinessgrowththesedays.
Techn icalRequirement
Weneedto translateGIACsbusinessrequirementsintoasetoftechnical
requirements.Theserequirementsaredefinedbasedonthefourmajortrafficstreams:
B2C,B2B,INET andRAS.
Vista de pagina 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 208 209

Comentarios a estos manuales

Sin comentarios