Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

These are past assignments on computer science and technology, Assignments of Computer Science

It examines the current state of IT at ModMeters and projects future IT requirements. The plan also specifies the steps and means necessary to satisfy those needs as well as the strategy to ascertain that the company’s present IT resources are anchoring efficient service delivery. It is anchored on the premise that ModMeters provides leading-edge, proven information technology systems that improve efficiency, service quality, and quality of life. The IT plan focuses on helping all classes of users through improved service delivery, tools, and support.

Typology: Assignments

2022/2023

Available from 08/18/2023

paul-oyola
paul-oyola 🇰🇪

1 document

1 / 6

Toggle sidebar

Related documents


Partial preview of the text

Download These are past assignments on computer science and technology and more Assignments Computer Science in PDF only on Docsity! 1 Deploying a Cloud Security Control Author’s Name University Professor’s Name Course Date 2 Payment Card Industry Data Security Standard (PCI-DSS) PCI_DSS denotes an array of requirements aimed at ensuring that all organizations that collect, process, transmit, and store card details of users maintain a secure environment (Shaw, 2009). It provides a comprehensive set of standards and related materials, which include tools, specification requirements, and measures to help businesses guarantee the security of cardholder information at all times. PCI-DSS Security Controls Encrypt sensitive data Users' card details are transmitted across several channels in the cloud. As such, a strong encryption mechanism must be used to encrypt the data as it is sent across these locations. Organizations should not accept a connection request from systems that lack the requisite encryption strength and may lead to an unsecured connection. The cloud infrastructure should be configured to only accept trusted certificates and keys, and encryption strength should be suitable for the method of encryption that is used. Network segmentation Individual client computing environments that are outside the cloud computing ecosystem would usually be administratively, physically, and organizationally separated from one another. Clients that employ a shared or public cloud rely on the cloud service provider to ensure adequate isolation of their environment from the other cloud ecosystems. Segmentation on the cloud computing infrastructure should offer a similar level of isolation similar to the one attained through physical 5 References Security Standards Council. (2013). Information Supplement: PCI DSS Cloud Computing Guidelines. Retrieved from https://listings.pcisecuritystandards.org/pdfs/PCI_DSS_v2_Cloud_Guidelines.pdf. Markham, T., & Payne, C. (2001, June). Security at the network edge: A distributed firewall architecture. In Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01 (Vol. 1, pp. 279- 286). IEEE. Shaw, A. (2009). Data breach: from notification to prevention using PCI DSS. Colum. JL & Soc. Probs., 43, 517. 6
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved