Define the given term and describe relevance

Assignment Help Computer Engineering
Reference no: EM132013560

Assignment 2: LASA 2: Kenne Jarson Laboratories: Phase 2

This assignment builds upon LASA 1. Please review the initial scenario and company background provided in LASA 1.

You will complete phase 2 of the web application portal project for Kenne Jarson Laboratories.

In a Microsoft PowerPoint presentation with speaker notes, you will provide security recommendations that describe the authentication, access control, and encryption or cryptography utilized to ensure security of confidential information.

Tasks: 1. Security Control Overview: The first 7-8 slides will introduce and describe the importance of security controls and mechanism for the new web application portal. In particular, the following items should be covered:

• Authentication: Define the term and describe its relevance and usage in maintaining security in a web application portal.

• Access Control: Describe the term and explain how access control will be provided or limited for those using the web application portal.

• Cryptography and Encryption: The web application portal will share confidential and highly sensitive information between the company and its wholesalers or distributors. Describe how cryptography and encryption can help provide secure communications.

2. Security Comparison of Authentication Technologies: The next 3-4 slides should describe various authentication tools or technologies that can be used in an online or a web setting to authenticate users. Provide a recommendation, along with a justification, for your selection that aligns with the requirements of the organization.

3. Access Control Plan: You should include 3-4 slides on how user access control will be maintained for the web application portal. Suggest potential security groupings and techniques to maintain user access control.

4. Cryptography and Encryption: The final 5-6 slides should discuss the security measures that will be used to ensure secure communications between the company's web application portal and that of its partners or distributors. Describe what cryptography and encryption schemes should be used to secure the web application portal.

Submission Details: • Save the presentation as M5_A2_Lastname_Firstname.ppt.

• By the due date assigned, submit your presentation to the Submissions Area.

Reference no: EM132013560

Questions Cloud

What can be done to better manage stress : What can be done to better manage stress at the individual level? What can organizations do to help employees better manage stress?
What are marketing variances : Research the topic of marketing variances. What are marketing variances? What is the relationship between sales price and quantity variances
Four out of six water heaters will be defective : Suppose a quality check was conducted on a sample of six water heaters. What is the probability that four out of six water heaters will be defective?
Employer benefits to unraveling regulations : What are the employee and employer benefits to unraveling regulations? What are the potential problems?
Define the given term and describe relevance : Define the term and describe its relevance and usage in maintaining security in a web application portal. Describe the term and explain how access control.
Lucrative opportunity for an expatriate assignment : You you have been offered a reasonably lucrative opportunity for an expatriate assignment for the next three years
Prepare Samson journal entry : Assuming that the conditions for treatment as a sale are met, prepare Samson's journal entry to record the factoring of $400,000 of receivables
What facts would be necessary for bob to be liable to jan : Are there theories of recovery that Jan can assert that might make Bob liable? What facts would be necessary for Bob to be liable to Jan?
How a swot analysis can be used by an entrepreneur : Tutors thoughts on how a SWOT analysis can be used by an entrepreneur either at the pre-start-up stage or within the actual start-up of the company.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Show the configuration of all the variables and the output

In the following program, show the configuration of all the variables and the output.

  Develop a schedule that meets the daily employee requirement

Develop a schedule that meets the daily employee requirements and satisfices the following three weighted goals: Goal 1: Use at most 27 total employees weight.

  Which of the following demotes a bullet point from the

1 two information systems that support the entire organization area. enterprise resource planning systems and

  Describe another example where percent denial

a serious problem to that user. Describe another example where 10 percent denial of service to a user

  Explain the impact of the encountered threat

Share an experience in which you or someone you know has encountered one of these threats. express the impact of the encountered threat and how it was resolved.

  Two bluetooth modules to control an led

I am trying to do use two bluetooth modules to control an LEDs. I am using HC05 as master and another as slave. I can get the two bluetooth module to pair up and communicate with one another using a serial communication in the Arduino IDE.

  Write a computer program using q basic

You need to write a computer program using q basic with the subsequent information. We just started learning about loop commands but I'm completely lost.

  List nine input devices you might find in a future wal-mart

List nine input devices you might find in a future Wal-Mart. The input devices you choose MUST be described in the textbook.

  Describe where sequential file processing might be used

Develop an case to illustrate your definition. (The example does not have to be as elaborate. Just a record with a simple explanation)

  Write a program that lists from the current directory

Write a program that lists from the current directory all ordinary filenames whose size exceeds 100,000 bytes. It should also remove all zero-sized files.

  What are the criteria by which address decoders are judged

What does primary address range mean when it is applied to a system using partial address decoding?

  Find out a sequence of activities

Outline the considerations for systems investigation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd