Eicon Networks S92 Instrukcja Użytkownika Strona 9

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 209
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 8
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 9
Introduction
Asecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevelopatruly
effectivesecuritysolution,thepoliciesmustfirstbeclearlydefined.Forthisproject,
thesecuritypoliciesareintroducedinAssignment2–Part1.
BusinessRequirement
ThedesignoftheGIACsecurityarchitecturehastosatisfytherequirementslisted
below:
n Externalcustomersarebuyinggoodsandmakingpaymentsonlinesecurely.
n Externalpartnersandsuppliersareaccessingandupdatingtheecommerce
resourcedatabasesecurely.BOTHtheexternalpartnersandthesuppliers
collaboratewithGIACviatheuseoftheGIACcriticaldatabaseapplication.
Thisapplicationprovidesastandardizedwebbasedinterface,andeachpartner/
supplierisassignedasetofuniqueloginprofileandprivileges.
n Companystaffsoccasionallyneedtoaccessinhouseserverresourcesfrom
home.
n Internalstaffsfrequentlyneedtoaccesstheinternet.
n GIACisexperiencingtremendousbusinessgrowththesedays.
Techn icalRequirement
Weneedto translateGIACsbusinessrequirementsintoasetoftechnical
requirements.Theserequirementsaredefinedbasedonthefourmajortrafficstreams:
B2C,B2B,INET andRAS.
Przeglądanie stron 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 208 209

Komentarze do niniejszej Instrukcji

Brak uwag