Free «Network Security Compliance Document» Essay Sample

A company that wishes to enter into e-commerce should be very careful to ensure that all the losses area voided. E-commerce enables accompany to sell its goods via the internet (Neumann, 2003). The internet has more threats that a robber can use to steal from a business person just like in the physical bank, shop or wholesale. This paper intends to highlight the processes required to be put in place by Xterior company to ensure that no loses are incurred through the e-commerce (Pfleeger, 2005). In the table below the first column gives the compliance process, the second column gives the elements of the document and lastly the third one gives justification for the recommendations.




Password policies

Passwords to be strong enough to reduce guessing least number of characters should be six. Develop passwords for the workers and managers. An administrator can be locked out after three logs in attempts.

Passwords limit any other person from accessing without permission

Intrusion detectives and security logs

When a customer or an employee attempts to view information that is not relevant to him then the system should log out the account then send a message to the administration and the customer. In addition, if the account use makes more than six failed logons then the account can be closed then a message sent to both the user and the administration. 

Detects all threats of attacks on the site plus all potential attacks from the thieves.

Server firewalls

The company to set up a demilitarized zone with firewalls. The firewalls will allow outgoing and incoming requests from only known ports.  

It ensures that all requests that enter into a system come from a known pot only. This will prevent intruders form accessing the company’s information when they sent requests.  

Honey pot servers

Detects fake payments and closely monitors any access by attackers.

Detects any fake payments that can be used by customers to pay for their goods. The expired credit cards can be detected before shipping the goods.

Secure socket layer

Encrypting information between the site server and the shopper’s computer.

The browser is required to identify himself with the server as a trusted customer then it initiates a handshake for the encrypted information to pass back and forth. It checks if the server is certified by the government, if the browser is not certified it gives a warning to the browser.

Encrypts information to prevent any access by any person who may sniff the network. The information that flow from the customer and back cannot be accessed by any other person when it is encrypted.

Supply chain and loading dock security

Checking the invoices against goods that come in and leave the premises.

Clear record keeping for future reference.

Safeguards all risks that may arise when goods come in and leave the premises. Inventories are checked properly to ensure there is no miss appropriation during loading and offloading of goods.


            When Xterior retail outlets join the e-commerce, they should be able to use these processes to measure the level of the security that they have to their goods (Neumann, 2003). Supply chain and loading dock security will prevent any loses that occur during loading goods for transporting to the customer and also during offloading goods supplied to the retail outlets (Pfleeger, 2005). The other mentioned processes will keep track to all other risks that may arise from the internet. The processes include: secure socket layer, personal server walls, intrusion detectives and security logs, password policies and honey pot servers among others.


What Our Customers Say

Get 15%OFF   your first custom essay order Order now Use discount code first15
Click here to chat with us