Wednesday, August 27, 2008

Midterm Question no.3

Universal Computer Access Management System


UCAMS is a central application that provides an on-line, interactive process for the management of User Identifiers (UIDs), computer resources, and passwords associated with the UIDs. UCAMS uses a web interface operating in secure mode (SSL). Key components of UCAMS include:

  • Central UCAMS Database/Web Servers
  • Various Platform Agents
  • WWW-Based User Interface
Clients and customers have the need to simplify and streamline computer account and password management processes. There is also a desire to implement a consistent strong password policy across all computer systems and databases. UCAMS is a central application that provides an on-line, interactive process for the management of User Identifiers (UIDs),computer resources, and passwords associated with the UIDs. With SAIC's UCAMS, companies can manage computer/database resources and passwords on multi-vendor systems across an enterprise. Additionally, UCAMS provides a defendable/auditable approach to managing computer resources and passwords.
UCAMS offers a single centralized application to manage computer and database resources (accounts) and passwords across an enterprise!
  • Provides strong passwords that are more secure (harder to crack) and a consistent approach for their handling and distribution.
  • Provides Defendable/Auditable password management process.
  • Remote access to UCAMS via the Internet via secure Web (SSL)
  • Savings: Reduction in labor time spent managing various computer and account management processes.

Tuesday, August 12, 2008

Midterm Question no.2

Research 1 company and describe how they protect their company from internet risk



Nestle has chosen its Active Risk Manager solution to manage enterprise risk across its operations worldwide.

According to the company, Nestle was looking for a consistent method to manage risk across its multi-national operation, and web-based Active Risk Manager will enable branches in different countries to share information, update and monitor risk information in an efficient way.

Security– both internal and external– was also an important con Front's TCP/IP-to-SNA protocol boundary provides, but also has internal security issues to address. Nestle wanted to be sure that users could only access the AS/400 applications relevant to their department. With HostFront, users still have to log on to the host as if they were using a traditional terminal, and HostFront provides additional security through user IDs, passwords, and IP addresses that authenticate users before granting them access to the corporate host.

Security– both internal and external– was also an important consideration for NestlĂ©. The company is taking full advantage of the natural firewall that HostFront's TCP/IP-to-SNA protocol boundary provides, but also has internal security issues to address. NestlĂ© wanted to be sure that users could only access the AS/400 applications relevant to their department. With HostFront, users still have to log on to the host as if they were using a traditional terminal, and HostFront provides additional security through user IDs, passwords, and IP addresses that authenticate users before granting them access to the corporate host.