Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Difficulties and Risks Associated with Using a Public Infrastructure
It is critical to realize that credit reporting systems that are based on the usage of public infrastructure and the internet, in particular, cannot guarantee secure communication of data. Several parts of this system including data transfer and network are the most vulnerable. Security holes may be also found in database and interface if they are not decently protected.
In this way, the situation when a user is willing to work with some information should be considered. For example, during the process of data transferring, hackers can interfere and obtain the information that is received by the user. Procedures maintained through the internet can be easily hacked by professionals so that they get an opportunity to read or listen to everything that is available to the user. Of course, appropriate encryption can protect the data from being stolen, but the risks remain.
Such personal information as login and password can also be obtained by the hackers if it can be reached through the public infrastructure. Transmission is a process that turns out to be the most insecure that is why it is often used as an opportunity to hack confidential data.
In this framework, it is significant to ensure a decent configuration of the database, which contains the most vital information. Unauthorized users may receive subscriber codes and other things if they have an opportunity to get into the system. They can steal customer list full of personal information such as names and addresses, and use it for illegal purposes. Thus, if the company has only one single database, its business competitors and hackers have high chances to receive all data.
The organization that works with the insecure interface provides hackers with the opportunity to enter its system with no difficulties and increases the risks of potential swindle. Drawbacks in the network configuration affect security and allow particular components of the system to be compromised. But if one of these parts is hacked because of its vulnerability, unauthorized users may take advantage of the situation and receive access to others. In this way, the whole system can be taken down.
ING’s Solution for Providing Security
ING Life decided to use an extranet for the brokers and other users to have access to the database and all information needed for their work. The organization also provided an opportunity to use a Web-to-host service with the same purpose. Such approach gives a possibility to access data via the internet and does not require any additional operations. The clients of the company can use their browsers when they want to enter the system because their software is installed as an applet to them.
In other words, a browser can be utilized as an interface. The system that is chosen by ING Life consists of servers, gateway, and firewall. It is the solution that provides a safe connection to the internet. In order to ensure the security of the database, the Pix firewall is used. It is claimed to prevent unauthorized entrance to the system and stealing of the information. This kind of firewall is based on the secure operating system that easy to work with. It prevents the most common attacks, which is rather beneficial for the organization because unauthorized users cannot get into the system through the public internet (Cisco, 2016b). Except for that, the SSL connection is used.
It requires a special certificate and ensures the secure connection. In this way, the process of transferring the data is private and integral. Only those users who have their private key can access the database and get the information from it. Finally, it should be mentioned that ING Life assessed their system for vulnerabilities. Its security consultants checked different parts of the system to make sure that they cannot be easily hacked. Thus, it can be concluded that the solution chosen by the company is adequate and efficient.
Extranet Solution
The extranet solution selected by the ING Life is rather efficient, as it provides the users with the possibility to access the information and prevent possible risks. Brokers can obtain enhanced connectivity so that they receive an opportunity to share different data with through various documents. They can pass their personal calendars and work on the projects together. It is also possible to interact with the stakeholders who live in the different countries and on the different continents, as all workers, partners and customers can have access to the internet and, with its help, to the system.
The possibility to access the extranet any time is rather beneficial in this perspective. Such tool is cost-effective, which appeals to the executives, and it is not difficult to manage, which is a great advantage for the users. Thus, it would be also advantageous to provide the Platinum service for the brokers, as it ensures 24/7 support in the framework of leased-line connectivity (Cisco, 2016a). Such backup would improve brokers’ performance as they would receive assistance immediately in case of technical problems.
References
Cisco. (2016a). Cost-effective menu of link architectures provides secure, reliable connections for Cisco partners. Web.
Cisco. (2016b). Firewall best practices guide. Web.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.