Preview

Case Study: Bibliofind

Satisfactory Essays
Open Document
Open Document
987 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: Bibliofind
Week 6 Assignment: “Case Study #C1: Bibliofind”
ECOM544: Electronic Commerce Strategy Management

1. Explain how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers.

Firewalls need to be placed at a company’s Internet entry point as a first layer of protection in a company’s IT security system, so, however many entry points, Bibliofind may have had, they should have had a firewall installed on each one. A firewall could have helped Bibliofind in preventing crackers from accessing their network and their customers personal data, but may not have eliminated it altogether; firewalls use a combination of tools, including encryption, and intrusion detection systems which are the next layers of protection.
Had Bibliofind used firewalls to prevent intruders they would have chosen between one or more of the three types of methods which include packet filtering, proxy service or stateful inspection (a combination of sorts of packet filtering and gateway service). With packet filtering, the packets are small chunks of data that are analyzed against a set of filters, and if those packets make it through the filters, they are sent to the requesting system and the rest are discarded. With a proxy service, information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. With a stateful inspection, there is no examination of the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a reasonable match, the information is allowed through, but if not, it’s discarded.
But even, with the use of these methods, Bibliofind should also have customized their firewalls and configured them specifically to protect

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Bus615 Midterm

    • 951 Words
    • 4 Pages

    10. A firewall scrambles information into an alternative form that requires a key or password to decrypt.…

    • 951 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The most ideal method for diminishing dangers against a server is by part the web server from the server database and other application servers. Since the web server has a direct association with the web makes it the principle focus to obtain entrance to the network. Touchy data, similar to customer records, passwords, charge card numbers, and government disability numbers ought not be put away on the web server. Switches permit data to go forward and backward between networks. Having a switch at every area will permit information to stream between all areas. Switches inspect each bundle of data on the network and figure out where it ought to be sent and guides it there. Switches utilize a setup table to figure out where associations strive for steering information, needs for directing information to specific associations, and principles for taking care of the information. Firewalls are likewise added or joined with switches to give more security to the network and information put away. Firewalls act like a channel between a network, or a PC, and the Internet. Firewalls can be arranged to keep representatives from sending particular sorts of messages and exchanging information off the network. They can likewise be set up to wipe out access to certain sites on the Internet, for instance any informal communication locales like Facebook and Twitter. One vital occupation they perform is halting PCs outside the network from getting to PCs on the network.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    D. Firewalls are used to protect information in transit. Question 6 2 points Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine. Save…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Small businesses, all organizations should begin investing in new technology to protect their databases and information. Horton’s article goes over multiple different options to avoid cyber-intrusions. For example “layering” encryption and tokenization, updated POS systems, and contracted penetration tests. By focusing on these three areas of a company’s information security infrastructure, you…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    Question: How do you think this situation could have been prevented? Could the IT department have conducted regular inventories of the software on each computer to identify missing patches? Could the IT department have implemented a process to ensure that no computer is moved outside the boundaries of the firewall?…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The network was up and running and it was secure and reliable, but the speed was slow and the interface clumsy. The applications around the database were old, out of date and were only in batch-mode with fixed-transaction access. The system were complex and when user tried to get something out of the ordinary, they had to wait for days or weeks for the mainframe programmers developing what was needed. The system is equipped with a firewall to prevent unauthorized access, by analyzing and controlling the incoming and outgoing data network traffic, it is a software or hardware-based network security but it “blocks” all network traffic, slowing and causing inconvenience.…

    • 676 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    H., E. "How Does China Censor the Internet?" The Economist. The Economist Newspaper, 21 Apr. 2013. Web. 14 Feb. 2017.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ashford Library

    • 357 Words
    • 2 Pages

    Of the several databases included in the Ashford Library, I would like to focus on EBSCOHost. EBSCO is one of the world’s leading search tools for electronic journals and books (p. 162). There are over 4,200 journals in here with over 3,900 being peer-reviewed (or properly vetted), which make this a great asset when conducting quality research. While in this database or any of the databases within the library, try to remember different techniques of Boolean searching. This will allow you to narrow the scope of your search. At work we use databases to conduct research and this is a very helpful tool, as it allows it to limit our searches to specifics. The most common, for us, is listing a keep word with quotation marks to find an exact phrase or…

    • 357 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Czarny, Matthew J., Ruth R. Faden, Marie T. Nolan, Edwin Bodensiek, and Jeremy Sugarman. "Medical and Nursing Students' Television Viewing Habits: Potential Implications for Bioethics." The American Journal of Bioethics 8.12 (2008): 1-8. Web.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Accepted and approved in Partial Fulfilment of the Requirements for Bachelor of Science in Information Technology (BSIT).…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Online Grade Inquiry

    • 381 Words
    • 2 Pages

    There are 5000 books available out of which 1000 books are for reference and cannot be issued. These records contain details about the publisher, author, subject, language etc. There are suppliers that supply books to the library. There are other problems also that the library staff is facing. Like in case of issue of duplicate cards to a member when member or library staff loses the card. It is very difficult to check the genuinity of the problem. Sometimes the library staff needs to know about the status of a book as to whether it is issued or not. So to perform this kind of search is very difficult in a manual system. Also management requires reports for books issued, books in the library, members, and accounts. Manually producing the reports is a cumbersome job when there are hundreds and thousands of records.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Library management System is a small program to manage library which includes the task of:-…

    • 989 Words
    • 10 Pages
    Better Essays