Question

In: Computer Science

How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from...

How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from accessing the network without an antivirus scan.

Solutions

Expert Solution

As we know there are some basic criteria by which our major previous documents got leak whether it’s our database information regarding any client or whether our personal banking documents even our credit card debit card also, and the main way of that is the internet. Now a day, when the use of the internet is developing like hell, we all got directly connected to it on our daily bases, whatever we have done in today’s world from taking our personal government id’s via open our bank account or share our finance stocks to giving any tiny pic to some else we all use the internet in a wide amount. Because of which the malware or spyware or any kind of unwanted or unauthorized thing just enters in our daily bases internet depending routine and ruined it from the root by don’t even give us a single waring. Nowadays when we are surrounded by many advanced security futures to protect our internet existing the thief is also getting sharper and smarter they also start using new and advanced methods to just take an entry into our database. To prevent all these issues we use various algorithms, software, methods, and many many things but what is it got failed because we all know that every software is having some weaknesses. Right? So it gives you a daily bases headache right. Don’t worry there are 2 ways by which you can directly prevent your personal and secure your daily internet bases life, from your identity to the bank account details and many more. 

Gather Requirements:- This is the way in which the organization deal with the clients according to their will. All deals will be open and transparent to both the client and the organization.because by which the concept in the client’s mind as well as in the organization’s mind will be cleared. In this method, we follow some basic steps. Like first we have to understand the perspective behind the client’s idea of making things so that we can split up and give them the right thing on time. Second, after knowing the actual perspective we will move forward for documentation because of which only selective persons are able to get proper access to the projects or system. Third, we will move forward for our next step that is to talk with the right person for the proper and private documentation for the particular system project. After this, we have to clear the assumption of our mind regarding the project. And give the final output to the client. Because of that gathering method, no outsider can interfere in our workspace and our documents and personal space will be safe without even doing any use of antivirus and all software.

Identify unauthorized access attempts:- In this, we will fix some step like giving the password patter which will be in the mixed character pattern so no one can guess it easily, by installing the binary lock in the system, to not give accesses to the system to everyone in the organization, to check all the mails attachments and file sending by the outsiders and from the organization insiders. By using the perfect firewall installation so that by hardware or by software no one can enter your zone without your permission. As we know every software is having its weaknesses so to compensate this we will directly connect with the interface designer or developer. We can also use alternative browsers for it. And you have to make your system up to date. And by using the popper server within different layers of firewalls can also help the organization to secure their main identity and their precious documents.

Related Solutions

QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
How does the cloud consumer interact with the appropriate systems to gain access to the required...
How does the cloud consumer interact with the appropriate systems to gain access to the required services. What different portals help the consumer to achieve this?
what are the characteristics of a business systems analyst? How can a business systems analyst plan...
what are the characteristics of a business systems analyst? How can a business systems analyst plan for requirements gathering?
6)         i)          How would you identify entity and relationship types from a user’s requirements specification?         &n
6)         i)          How would you identify entity and relationship types from a user’s requirements specification?             ii)         How would you identify attributes from a user’s requirements specification and then associate the attributes with entity or relationship types?
Identify an effective health care organization that utilizes information technology. Health care information systems and their components and requirements.
  Identify an effective health care organization that utilizes information technology. Health care information systems and their components and requirements.
For chipotle... gather Insight from a SWOT analysis and how these raise important strategic issues
For chipotle... gather Insight from a SWOT analysis and how these raise important strategic issues
Subject: Cloud computing How does the cloud consumer interact with the appropriate systems to gain access...
Subject: Cloud computing How does the cloud consumer interact with the appropriate systems to gain access to the required services. What different portals help the consumer to achieve this?
Identify the three types of economic systems. How do these three types of economic systems differ...
Identify the three types of economic systems. How do these three types of economic systems differ from each other? How are they the same? (
Identify the different methods of early-stage funding and how to access complementary resources. examples of complementary...
Identify the different methods of early-stage funding and how to access complementary resources. examples of complementary funding
Objective: Identify the various types of software requirements from problem statements. Problem Description: In this experiment...
Objective: Identify the various types of software requirements from problem statements. Problem Description: In this experiment the students will learn how to identify functional and non-functional requirements from a given problem statement. Functional and non-functional requirements are the primary components of a Software Requirements Specification (SRS). Expected Outcome: After completing this exercise, the students will be able to: ● Identify ambiguities, inconsistencies and incompleteness from a requirements specification. ● Identify and state functional requirements. ● Identify and state non-functional requirements....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT