Define the given term and describe relevance

Assignment Help Computer Engineering
Reference no: EM132013560

Assignment 2: LASA 2: Kenne Jarson Laboratories: Phase 2

This assignment builds upon LASA 1. Please review the initial scenario and company background provided in LASA 1.

You will complete phase 2 of the web application portal project for Kenne Jarson Laboratories.

In a Microsoft PowerPoint presentation with speaker notes, you will provide security recommendations that describe the authentication, access control, and encryption or cryptography utilized to ensure security of confidential information.

Tasks: 1. Security Control Overview: The first 7-8 slides will introduce and describe the importance of security controls and mechanism for the new web application portal. In particular, the following items should be covered:

• Authentication: Define the term and describe its relevance and usage in maintaining security in a web application portal.

• Access Control: Describe the term and explain how access control will be provided or limited for those using the web application portal.

• Cryptography and Encryption: The web application portal will share confidential and highly sensitive information between the company and its wholesalers or distributors. Describe how cryptography and encryption can help provide secure communications.

2. Security Comparison of Authentication Technologies: The next 3-4 slides should describe various authentication tools or technologies that can be used in an online or a web setting to authenticate users. Provide a recommendation, along with a justification, for your selection that aligns with the requirements of the organization.

3. Access Control Plan: You should include 3-4 slides on how user access control will be maintained for the web application portal. Suggest potential security groupings and techniques to maintain user access control.

4. Cryptography and Encryption: The final 5-6 slides should discuss the security measures that will be used to ensure secure communications between the company's web application portal and that of its partners or distributors. Describe what cryptography and encryption schemes should be used to secure the web application portal.

Submission Details: • Save the presentation as M5_A2_Lastname_Firstname.ppt.

• By the due date assigned, submit your presentation to the Submissions Area.

Reference no: EM132013560

Questions Cloud

What can be done to better manage stress : What can be done to better manage stress at the individual level? What can organizations do to help employees better manage stress?
What are marketing variances : Research the topic of marketing variances. What are marketing variances? What is the relationship between sales price and quantity variances
Four out of six water heaters will be defective : Suppose a quality check was conducted on a sample of six water heaters. What is the probability that four out of six water heaters will be defective?
Employer benefits to unraveling regulations : What are the employee and employer benefits to unraveling regulations? What are the potential problems?
Define the given term and describe relevance : Define the term and describe its relevance and usage in maintaining security in a web application portal. Describe the term and explain how access control.
Lucrative opportunity for an expatriate assignment : You you have been offered a reasonably lucrative opportunity for an expatriate assignment for the next three years
Prepare Samson journal entry : Assuming that the conditions for treatment as a sale are met, prepare Samson's journal entry to record the factoring of $400,000 of receivables
What facts would be necessary for bob to be liable to jan : Are there theories of recovery that Jan can assert that might make Bob liable? What facts would be necessary for Bob to be liable to Jan?
How a swot analysis can be used by an entrepreneur : Tutors thoughts on how a SWOT analysis can be used by an entrepreneur either at the pre-start-up stage or within the actual start-up of the company.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd