Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Bibliofind was one of the first Web sites to specialize in hard-to-find and collectible books. The site featured a powerful search engine for used and rare books. The search engine's database was populated with the results of Bibliofind's daily surveys of a worldwide network of suppliers. Registered site visitors could specify the title for which they were searching, a price range, and whether they were seeking a first edition. The site also allowed visitors to build a wish list that would trigger an e-mail when a specific book on the list became available.

Bibliofind had developed a large customer list, an excellent reputation, and a solid network of rare book dealers, all of which made the company an attractive acquisition for other online bookstores. In 1999, Amazon.com bought Bibliofind, but Bibliofind continued to operate its own Web site and conduct its business as it had before the acquisition.

Several years after the Amazon.com acquisition, Bibliofind's Web site was hacked. The cracker had gained access to the company's Web server and replaced the company's Web pages with defaced versions. Bibliofind shut down its Web site for several days and undertook a complete review of its Web site's security. When the company's IT staff examined the server logs carefully, they found that the Web page hacking was only the tip of the iceberg. Entries in the logs showed that attackers had been accessing Bibliofind's computers for more than four months. Even worse, some of the crackers had been able to go through the Web servers to gain access to the computers that held Bibliofind customer information, including names, addresses, and credit card numbers. That information had been stored in plain text files on Bibliofind's transaction servers.

Bibliofind called in state and federal law enforcement officials to investigate the hacking incidents and sent an e-mail notification to the 98,000 customers whose private information might have been obtained by the crackers. The investigation did not result in any arrests, nor did it determine the identity of the intruders. Many of Bibliofind's customers were very upset when they learned what had happened.

A month after the hacking incident, Amazon.com moved Bibliofind into its zShops online mall (zShops was the original name of Amazon Marketplace). As an Amazon zShop, Bibliofind could process its transactions through Amazon's system and no longer needed to maintain private information about its customers on its computers; however, the company had seen its reputation seriously damaged and eventually was closed down. A successful business was ended in large part because had it failed to maintain adequate security over the customer information it had gathered.

Required:

1. In about 300 words, explain how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers. Be specific about where the firewalls should have been placed in the network and what kinds of rules they should have used to filter network traffic at each point.

2. California has a law that requires companies to inform customers whose private information might have been exposed during a security breach like the one that Bibliofind experienced. Before California enacted this law, businesses argued that the law would encourage nuisance lawsuits. In about 300 words, present arguments for and against this type of legislation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9784864
  • Price:- $35

Guranteed 24 Hours Delivery, In Price:- $35

Have any Question?


Related Questions in Computer Engineering

Assignment write an 8-page apa formatted paper on a

Assignment: Write an 8-page APA formatted paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how y ...

Suppose you are a manager in the it department for the

Suppose you are a manager in the IT department for the government of a corrupt dictator, who has a collection of computers that need to be connected together to create a communication network for his spies. You are given ...

On microsoft word what would be the advantage of using the

On Microsoft word, what would be the advantage of using the dialog box over setting various tabs directly on the ruler line? In what types of typing tasks would you find using the ruler line helpful?

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Subject digital securitybesides legal factors what are

Subject : Digital Security Besides legal factors, what are some of other important factors that need to be seriously considered when the cloud computing and service company(assuming) you work for decides to extend busine ...

On a multiple choice test there are 8 questions worth 125

On a multiple choice test, there are 8 questions worth 12.5 points each. There are four choices for each question (a,b,c,d). Robin has not studied for the quiz and decides to randomly guess on all of the questions. 1. Th ...

Task working with arrays in matlabnbspcreate a matlab

Task : Working with Arrays in MatLab  Create a MatLab script called a2taski.m that computes the following tasks. The answers will appear in the Workspace. To view the larger structures, e.g., matrix A in Part 1 double cl ...

Structured programming is a subset of procedural

Structured programming is a subset of procedural programming. If structured programming promotes the creation of good code and procedural programs are easier to maintain, why do you need to shift to OOP? What are the pro ...

State the required answer precisely and then provide proper

State the required answer precisely and then provide proper explanation. It is not enough to provide one- word or one-line answers. Some early computers protected the operating system by placing it in a memory partition ...

A very skilled court stenographer makes two typographical

A very skilled court stenographer makes two typographical errors (typo) per hour, on average. 1. What probability distribution is most appropriate for calculating the probability of a given number of typos being made by ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As