You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card information? Assume that the information will need to be stored.

What will be an ideal response?


Students should make the leap to assume that the online store is hosted on a web server, and that the information will be stored in a database. Here are some possible answers: Isolate information storage from the web application byputting it on a database server that cannot be directly accessed from the Internet. Salt the credit card information and encrypt it using an adequate symmetric algorithm (e.g., AES-­? 256). Use access controls to limit the users who can access the web serverand database server. Use stored procedures and other database best practices to limit potentially dangerous queries. Use program security best practices to limit the vulnerabilities in the web application.

Computer Science & Information Technology

You might also like to view...

What are the two kinds of light sources used in fiber-optic communication |systems?

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) The stream member function flags with a long argument sets the flags state variable to its argument and returns its previous value. 2) The stream insertion operator << and the stream extraction operator >> are overloaded to handle all standard data types—including strings and memory addresses (stream insertion only)—and all user-defined data types. 3) The stream member function flags with no arguments resets the stream’s format state. 4) Input with the stream extraction operator >> always skips leading white-space characters in the input stream, by default. 5) The stream member function rdstate returns the current state of the stream.

Computer Science & Information Technology

A ________ query makes it easy to correct errors or add values to blank fields

Fill in the blank(s) with correct word

Computer Science & Information Technology

In Dreamweaver, by default, the cloaking feature is disabled.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology