Explore ings solution for providing security

Assignment Help Computer Network Security
Reference no: EM131744145

Case Study Assignment

Read the case study titled "ING Life" found below.

Write a three to four page paper in which you:

1. Assess the probable difficulties and risks associated with using a public infrastructure such as the Internet as part of a business solution.
2. Analyze ING's solution for providing security to determine if the solution is adequate or inadequate. Provide a rationale for your answer.
3. Critique the extranet solution and recommend one change to the solution to provide better connectivity to brokers.
4. Use at least two quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format.

The specific course learning outcomes associated with this assignment are:

• Compare and contrast among local area and wide area network technologies and architectures.

• Compare and contrast among data communication technologies that include transmission media, data link control protocols, and multiplexing.

• Use technology and information resources to research issues in communication networks.

• Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions.

Case Study 3 ING Life

ING Life (formerly NN Financial) is a leading provider of life insurance products in Canada. The company is based in Ontario and operates out of three regional offices. Over 2000 brokerage partners market its products [BRUN99, IBM00]. In 1997 most of the brokers relied on fax, phone, and postal services to request policy information. Response times could sometimes be measured in hours. The company did have a 56-kbps frame relay wide area network, but that only connected the Ontario headquarters to 70 managing general agent offices (Figure III.1). The systems in Ontario converted the frame relay requests to SNA from TCP/IP and routed them to the corporate mainframe in Connecticut.

In December of 1997, ING decided it had to reduce response times to remain competitive and attract new brokers. The company wanted a cost-effective solution that could provide its brokers fast access to mainframe data and scale to accommodate new partners. ING investigated extending the existing frame relay network and estimated the cost at a prohibitive $3.3 million.

307_ING Life Network before Using Internet and ING Life Network with Extranet.jpg
Figure III.1 ING Life Network before Using Internet and Figure III.2 ING Life Network with Extranet

Instead, the company decided to build an extranet and offer a Web-to-host service that would allow partners to access mainframe data directly via the Internet. ING estimated the annual cost of extranet services for 2000 brokers at $70,000. The annual cost of maintaining the existing WAN for 70 brokers was $750,000.

Besides reducing maintenance costs, the Web-to-host solution offered other benefits. The client software installed automatically as a browser applet, thereby reducing administrative costs. Also, using a browser as an interface meant that brokers were no longer tied to a specific workstation or PC.

The new solution would include two NT servers, a new SNA gateway (to translate between SNA and IP), and a Cisco Pix firewall connected to the Internet via a leased T-1 line (Figure III.2). The NT servers would run Lotus Notes, IBM Host on Demand (Web-to-host software), and Web server software. Because this service would send private data over the public Internet, security was a concern. The Pix firewall would prevent unauthorized access to the data. In addition, the Web-to-host software used an SSL (secure sockets layer) connection (described in Chapter 18). Before bringing the service on line, ING had security consultants probe the system for vulnerabilities.

By July of 1999, ING had 350 brokers connected to the extranet and plans to connect the remaining brokers by sometime in 2000. To use the new service, brokers connect to the Internet using dial-up and point their browser at the Web server. The Host on Demand client loads automatically as a browser applet. The applet provides TN3270 emulation services. After the applet has loaded, the broker can access the corporate mainframe as if he is using a directly connected TN3270 terminal. Response times for extranet requests are less than one minute.

Reference no: EM131744145

Questions Cloud

Calculate activity rate for packing based on packing orders : Rizzo Manufacturing produces two types of cameras: 35mm and digital. The cameras are produced using one continuous process.
How to solve hacker problems from russia and china : How to solve hacker problems from Russia and China? Please explain is it a threaten for U.S and how to deal with that problem.
About collaborative planning and forecasting : Which of the following is NOT one of the important points to remember about collaborative planning, forecasting, and replenishment (CPFR)?
Irs and attorneys who collect debts on behalf of clients : It applies to agencies whose primary business is collecting consumer debts for others. Also applies to IRS and attorneys who collect debts on behalf of clients.
Explore ings solution for providing security : Explore ING's solution for providing security to determine if the solution is adequate or inadequate. Provide a rationale for your answer.
Compute the asset turnover ratio for the year end : What was the amount of depreciation and amortization for the year end? Compute the asset turnover ratio for the year end
Discuss the role of the faa and ntsb in the accident : Discuss the role of the FAA and NTSB in the accident investigation process for aviation accidents involving aircraft weighing less
Impact the use of information systems : Describe how computer ethics impact the use of information systems and discuss the ethical concerns associated with information privacy and intellectual.
Best represents the key assumption of process control : Which of the following regarding linear regression is correct? Which statement best represents the key assumption(s) of process control?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd