Eicon Networks S92 Uživatelský manuál Strana 9

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 8
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 9
Introduction
Asecurityarchitectureenforcesanorganization’ssecuritypolicies.Todevelopatruly
effectivesecuritysolution,thepoliciesmustfirstbeclearlydefined.Forthisproject,
thesecuritypoliciesareintroducedinAssignment2–Part1.
BusinessRequirement
ThedesignoftheGIACsecurityarchitecturehastosatisfytherequirementslisted
below:
n Externalcustomersarebuyinggoodsandmakingpaymentsonlinesecurely.
n Externalpartnersandsuppliersareaccessingandupdatingtheecommerce
resourcedatabasesecurely.BOTHtheexternalpartnersandthesuppliers
collaboratewithGIACviatheuseoftheGIACcriticaldatabaseapplication.
Thisapplicationprovidesastandardizedwebbasedinterface,andeachpartner/
supplierisassignedasetofuniqueloginprofileandprivileges.
n Companystaffsoccasionallyneedtoaccessinhouseserverresourcesfrom
home.
n Internalstaffsfrequentlyneedtoaccesstheinternet.
n GIACisexperiencingtremendousbusinessgrowththesedays.
Techn icalRequirement
Weneedto translateGIACsbusinessrequirementsintoasetoftechnical
requirements.Theserequirementsaredefinedbasedonthefourmajortrafficstreams:
B2C,B2B,INET andRAS.
Zobrazit stránku 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 208 209

Komentáře k této Příručce

Žádné komentáře