summary week 5

.docx

School

Brigham Young University *

*We aren’t endorsed by this school

Course

108X

Subject

Information Systems

Date

May 13, 2024

Type

docx

Pages

1

Uploaded by ChefInternetRat23

Report
Yarissa Diaz 5/21/2023 Summary The reason to use access control list is to restrict unauthorized users from accessing business-sensitive information, control network traffic by limiting the number of users accessing files, information’s, and systems. PromisedLand.com should use it to protect itself from unauthorized users and control access to the Data more securely. Network Intrusion Detention Systems is a system that analyzes incoming network traffic. Is a device or software app that monitors a network for malicious activity or policy violations. I would place on HR location in promisedLand.com to protect all the personal information. Lightweight Directory Access Protocol (LDAP) uses a relatively simple, string-based query to extract information from active directory. Is a protocol that helps users find Data about organizations, persons, and more. LDAP used port TCP 636. Private keys can be used for both encryption and decryption, while public keys are used only for the purpose of encrypting sensitive data. PromisedLand.com could use digital certificates using badge to access the Data and to exit, I think it a safe way to protect the data of each user. Two reasons why I think VPN are useful to PromisedLand.com because VPN creates a secure online connection to another computer, protect privacy and increase security. VLANs help improve security because users can access only the networks that apply to their roles. Improve security by reducing both internal and external threats.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help