Sei sulla pagina 1di 3

Sebastian Rodriguez 16-0929

Bibliofind
 
 

Q1: Firewalls can be defined as a security system which is used to control access in a company

protected area within corporate network. “Firewall normally protects computer networks from

intruders who might compromise the confidentiality of companies’ privacy” (Microsoft

PressPass). It examines traffics which are routed between two networks in order to see if it can

meet certain criteria and if these criteria are met then it is fixed between the networks. Firewalls

filter both incoming and outgoing traffic. According to Stephen and Michael (2009) firewalls can

be implemented both in software and hardware. The common types of firewalls include packet

filter, application gateway, circuit- level and Proxy server. The firewall is placed between the

computer and the internet for it to prevent the intruders.

In choosing the firewall to use, there are important issues Bibliofind needed to consider and they

include:-Application protection, stealth mode, inbound and outbound filter. Outbound and

inbound filters information when they passes through the system, only important information

will be allowed to pass while discarding the rest based on the rules which have been created by

the Bibliofind Company. This is the primary function of the firewalls. Bibliofind ought to have

paid attention to this kind of information in order to protect their server from intruders.Bibliofind

should use Stealth mode because it is one of the vital elements or rules to be considered while

installing its firewalls as it helps not to block but to make your computer appear as if it does not

exist. Due to this, intruders and hackers will be made to think that you are not connected or you

are offline.
Sebastian Rodriguez 16-0929

Use of Intrusion detection is also one of the best ways Bibliofind ought to have

used since ​hackers usually use very many ways to penetrate the security system. Scan for

intrusion detection is important and it would have helped Bibliofind to notify the presence of

such intruders and Biblofind could have been safe from these hackers.

Q3: ​Personal information can be defined as; or to include individual name, personal, social status

and any other information which might be of any security concern. When this bill was passed in

state of California, many people supported it while others decline to support it. The arguments

against this bill is that it might make consumers to believe that data breach could lead to stealing

of identity and this could lead in the increase of the cost of running the business without

benefiting consumers or business people. In examining both social corporate responsibility of

any business (Kathryn 2002) argued that it could not fit and the time for presenting the argument

in court could be wasting the precious time. Besides, the law itself also lacks the vital

information like time of the breach or the kind of information that might have been breached.

The law also can be argued in support of it that it will be an eye opener to the consumer;

the consumers will understand well the essence of security for private information and also to

protect themselves from the identity theft, it could also dispel the uncertainty around security

breach and a good step taken in solving one having his or her information breached. The law

could make modest and helpful steps in current security breach notification and help in reducing

cyber crimes in the whole world if not only state of California.


Sebastian Rodriguez 16-0929

Regarding the enacting of this law, (Stephen et al.) argued that if this law is not brought

to force, security breaches will go on until that point business society will find the investment

needed to implement the security system in the company being more than the cost of investment.

It is good that this law comes at the right time to help solving this problem. It is high time both

the government and private investors shift cost benefit analysis to upgrade better security system.

Good care and standard must be maintained to govern the implementation of this law and the

security situation as a whole.

Potrebbero piacerti anche