Draw a network mode of the Quicken Bill Pay service

Assignment Help Computer Network Security
Reference no: EM132314265

Assignment - MSDL Security Architecture and Design

Problems -

1. Consider an electronic bill paying system (such as Quicken Bill Pay), The key features of this system is that a customer using Quicken (on their own computer) can pay bills using their computer's app (the Quicken program). Paying a bill with such a system directs the customer's bank to send money electronically to pay the bill. You can imagine that the bank just sends a check instead of the person writing the check themselves, but the payments are done electronically between the customer's bank and the payee's bank (and that transaction is outside the scope of our analysis).

To make communication between customers and the service more efficient, the service itself maintains an account for each customer. Also, for each customer, the service maintains records of the customer's bank and the customer's account for each payee. Such records include the customer's own account number for that payee and the local address of the payee.

a. Draw a network mode of the Quicken Bill Pay service. Use design/drawing tool (e.g. MS Visio, etc.). Remember, convert your final drawing to a PDF file. Make sure that your work is neat, lines are correct, and you use the correct design shapes (any shape will not work). Label each shape. (Refer Threat Modelling for more information)

b. From the point of view of the Quicken Bill Pay service, what are the assets to be protected in such a system? (Only consider the part of the service that allows bill payments and queries about bill payments by customers). [Do not other services such as transferring money between accounts]). You should list at least five.

c. From the point of view of the Quicken Bill Pay service, what are the threats for the service? List and explain five threats to the system.

Attachment:- Assignment File.rar

Verified Expert

In this assignment, we have designed a Security Architecture and Design for bill payment of an organization where we have shown all the required steps for the system.

Reference no: EM132314265

Questions Cloud

How may this lend itself to improved forecasting for bose : Some companies such as Bose, which manufactures audio components, have further uti­lized vendor managed inventory by having personnel
Discuss the stage of human growth and development : At 6 years old, children will exhibit a wide range of new physical skills,some may show natural athleticism while other will work an accomplishing simple skill.
What is the role of the national context : 1. What is the role of the national context in regard to competitive advantage?
Academic background and your motivation for selecting : Academic background and your motivation for selecting and attending GCU. Although this course may not have necessarily aligned with your field of study
Draw a network mode of the Quicken Bill Pay service : MSDL Security Architecture and Design- Consider an electronic bill paying system (such as Quicken Bill Pay), Draw a network mode of the Quicken Bill Pay service
Discuss an ethical theory that would take different approach : Discuss an ethical theory that would take a different approach. Be sure to explain and discuss any key ideas with supporting citations to the textbook.
Evaluate ethical practices of financial policy on taxes : Assess internal/external opportunities and challenges of revenue sources. Evaluate ethical practices of financial policy on taxes, fees, and charges.
What are the most effective methods of educating employees : What are the most effective methods of educating and developing employees? Why are those methods particularly effective? Share specific companies who have done.
Describe value chain analysis : 1. Describe value chain analysis? 2. Can a firm use cost leadership and differentiation simultaneously?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd