In around 300 words describe how bibliofind might have used

Assignment Help Computer Engineering
Reference no: EM13469688

Bibliofind was one of the first Web sites to specialize in hard-to-find and collectible books. The site featured a powerful search engine for used and rare books. The search engine's database was populated with the results of Bibliofind's daily surveys of a worldwide network of suppliers. Registered site visitors could specify the title for which they were searching, a price range, and whether they were seeking a first edition. The site also allowed visitors to build a wish list that would trigger an e-mail when a specific book on the list became available.

Bibliofind had developed a large customer list, an excellent reputation, and a solid network of rare book dealers, all of which made the company an attractive acquisition for other online bookstores. In 1999, Amazon.com bought Bibliofind, but Bibliofind continued to operate its own Web site and conduct its business as it had before the acquisition.

Several years after the Amazon.com acquisition, Bibliofind's Web site was hacked. The cracker had gained access to the company's Web server and replaced the company's Web pages with defaced versions. Bibliofind shut down its Web site for several days and undertook a complete review of its Web site's security. When the company's IT staff examined the server logs carefully, they found that the Web page hacking was only the tip of the iceberg. Entries in the logs showed that attackers had been accessing Bibliofind's computers for more than four months. Even worse, some of the crackers had been able to go through the Web servers to gain access to the computers that held Bibliofind customer information, including names, addresses, and credit card numbers. That information had been stored in plain text files on Bibliofind's transaction servers.

Bibliofind called in state and federal law enforcement officials to investigate the hacking incidents and sent an e-mail notification to the 98,000 customers whose private information might have been obtained by the crackers. The investigation did not result in any arrests, nor did it determine the identity of the intruders. Many of Bibliofind's customers were very upset when they learned what had happened.

A month after the hacking incident, Amazon.com moved Bibliofind into its zShops online mall (zShops was the original name of Amazon Marketplace). As an Amazon zShop, Bibliofind could process its transactions through Amazon's system and no longer needed to maintain private information about its customers on its computers; however, the company had seen its reputation seriously damaged and eventually was closed down. A successful business was ended in large part because had it failed to maintain adequate security over the customer information it had gathered.

Required:

1. In about 300 words, explain how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers. Be specific about where the firewalls should have been placed in the network and what kinds of rules they should have used to filter network traffic at each point.

2. California has a law that requires companies to inform customers whose private information might have been exposed during a security breach like the one that Bibliofind experienced. Before California enacted this law, businesses argued that the law would encourage nuisance lawsuits. In about 300 words, present arguments for and against this type of legislation.

Reference no: EM13469688

Questions Cloud

If 200 of adults surveyed were in the age category of 24 : based on a survey of 1000 adults by greenfield online and reported in a may 2009 usa today snapshot adults 24 years of
Write a report on a special probationparole client and : write a report on a special probationparole client and programs that have been established to address this problem
When 150 g of steam drops in temperature from 2750 degc to : when 15.0 g of steam drops in temperature from 275.0 degc to 250.0 degc how much heat energy is released? cp of h2o
Sync computers inc makes computer-related products under : sync computers inc. makes computer-related products under the brand name sync which the company registers as a
In around 300 words describe how bibliofind might have used : bibliofind was one of the first web sites to specialize in hard-to-find and collectible books. the site featured a
Yun tung chow tried to unclog a floor drain in the kitchen : yun tung chow tried to unclog a floor drain in the kitchen of the restaurant where he worked. he used a drain cleaner
Many scholars politicians and everyday people have : many scholars politicians and everyday people have disputed the value of criminal laws sentencing laws and
Compute concentration of hydrochloric acid find the ph at : during an acid-base titration 23.3 ml of hcl completely neutralized 19.5 ml of potassium hydroxide 0.315 m. calculate
In 2004 and 2005 kent avery on behalf of his law firm-the : in 2004 and 2005 kent avery on behalf of his law firm-the law office of kent avery llc-con-tracted with marlin

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd