Eicon Networks S92 Bedienungsanleitung Seite 9

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 8
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 9
Introduction
Asecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevelopatruly
effectivesecuritysolution,thepoliciesmustfirstbeclearlydefined.Forthisproject,
thesecuritypoliciesareintroducedinAssignment2–Part1.
BusinessRequirement
ThedesignoftheGIACsecurityarchitecturehastosatisfytherequirementslisted
below:
n Externalcustomersarebuyinggoodsandmakingpaymentsonlinesecurely.
n Externalpartnersandsuppliersareaccessingandupdatingtheecommerce
resourcedatabasesecurely.BOTHtheexternalpartnersandthesuppliers
collaboratewithGIACviatheuseoftheGIACcriticaldatabaseapplication.
Thisapplicationprovidesastandardizedwebbasedinterface,andeachpartner/
supplierisassignedasetofuniqueloginprofileandprivileges.
n Companystaffsoccasionallyneedtoaccessinhouseserverresourcesfrom
home.
n Internalstaffsfrequentlyneedtoaccesstheinternet.
n GIACisexperiencingtremendousbusinessgrowththesedays.
Techn icalRequirement
Weneedto translateGIACsbusinessrequirementsintoasetoftechnical
requirements.Theserequirementsaredefinedbasedonthefourmajortrafficstreams:
B2C,B2B,INET andRAS.
Seitenansicht 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare