Eicon Networks S92 Manuel d'utilisateur Page 9

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 8
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 9
Introduction
Asecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevelopatruly
effectivesecuritysolution,thepoliciesmustfirstbeclearlydefined.Forthisproject,
thesecuritypoliciesareintroducedinAssignment2–Part1.
BusinessRequirement
ThedesignoftheGIACsecurityarchitecturehastosatisfytherequirementslisted
below:
n Externalcustomersarebuyinggoodsandmakingpaymentsonlinesecurely.
n Externalpartnersandsuppliersareaccessingandupdatingtheecommerce
resourcedatabasesecurely.BOTHtheexternalpartnersandthesuppliers
collaboratewithGIACviatheuseoftheGIACcriticaldatabaseapplication.
Thisapplicationprovidesastandardizedwebbasedinterface,andeachpartner/
supplierisassignedasetofuniqueloginprofileandprivileges.
n Companystaffsoccasionallyneedtoaccessinhouseserverresourcesfrom
home.
n Internalstaffsfrequentlyneedtoaccesstheinternet.
n GIACisexperiencingtremendousbusinessgrowththesedays.
Techn icalRequirement
Weneedto translateGIACsbusinessrequirementsintoasetoftechnical
requirements.Theserequirementsaredefinedbasedonthefourmajortrafficstreams:
B2C,B2B,INET andRAS.
Vue de la page 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 208 209

Commentaires sur ces manuels

Pas de commentaire