- a secretary to do administrative work such as write letters and memos
- ten data entry operators to enter phone wagers
- five sports analysts to analyse the various sporting events, set the odds and enter this data into the sports database
- a web designer to create the web interface for internet betting.
Task 1
Trevor's first task for you is to draw an annotated diagram showing how all the computers will be networked and identify communications equipment needed for this. Trevor would like to host the web site at his secret location as opposed to hosting it at an ISP. The betting system will contain lots of confidential data such as client names and credit card numbers. He would also like the diagram to address the following security issues:
- loss of data due to hardware failure
- loss of confidential data due to external intrusion
- information theft due to interception of wireless transmission
Task 2
Trevor is very concerned about computer viruses, worms, trojan horses and spyware. He would like you to explain the difference between each of these and propose a company policy to prevent company problems due to them.
Task 3
Although your network diagram addressed the issue of unauthorised access from external sources (hacker/ cracker), Trevor is worried that some of his employees may access information (such as credit card numbers) and steal them. Identify what access controls are and how they can be used to secure confidential data internally.
Task 4
Loss of laptops has lead to the loss of confidential information in a number of organisations. Trevor would like you identify and describe three measures you would recommend that would recommend that would keep confidential information private even if a laptop containing confidential information was lost or stolen.
Task 5
Some clients may want to email their betting information to Trevor's Tips. Describe and recommend a system that will keep this information secure.
2 comments:
mr mcwilliams,
i feel like we haven't learnt what we should know to finish this project to the best of our abilities. im stuck. maybe we can go over it on friday?
diana.
Task 1
This is a synthesis of what you have learned. Chapter 9 has several diagrams that should help - such as in the "Connecting Networks" section. Chapter 11 has several ideas that you will want to incorporate as well to address Trevor's concerns.
Task 2
See Chapter 11 of your text book and the blog post titled computer security.
Task 3
Chapter 11 - Unanauthorised access and use section and Information Theft section
Task 4
Computer security blog post and Chapter 11 Information Theft section and High Tech Talk
Task 5
Computer Security blog post, Chapter 11 Internet Security risks and High Tech Talk
Post a Comment