Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 4 You are preparing to host a website that you have built. The website

ID: 3694781 • Letter: Q

Question

Question 4

You are preparing to host a website that you have built. The website contains several types of web forms for receiving input from the end-user and uses a back-end database to store the user’s information. The web-site contains sensitive financial information that may be of value to an attacker so there could be motivation to attack your website. Describe the layers of security controls necessary for protecting your website and complying with Gramm-Leach-Bliley Privacy requirements to safeguard customer information and maintain a comprehensive information security program. Remember that layers of security controls involve people, processes and technology.

Explanation / Answer

They are different ways to protect your web site from Hacking and fraud:

Hackers are stealing card information and sensitive information from your web sites. To protect (and reassure) your customers, it's imperative to know how to protect your ebusiness and your sensitive customer data.

We are providing different techniques to protect your website from hackers and fraud

1)    Choose a secure platform for your website

Put your ecommerce site on a platform that uses a sophisticated object-orientated programming language.

2)    Use a secure connection for online checkout--and make sure you are PCI compliant.

It can be a leap of faith for customers to trust that your ecommerce site is safe, particularly when Web-based attacks increased 30 percent last year. So it's important to use SSL certificates "to authenticate the identity of your business and encrypt the data in transit,"

3)    Don't store sensitive data

There is no reason to store thousands of records on your customers, especially credit card numbers, expiration dates and CVV2 [card verification value] codes," says Chris Pogue, director of Digital Forensics and Incident Response at Trustwave.

4)    Employ an address and secure verification system

Enable an address verification system (AVS) and require

5)    Require strong passwords.

While it is the responsibility of the retailer to keep customer information safe on the back-end, you can help customers help themselves by requiring a minimum number of characters and the use of symbols or numbers,

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote