The steps of how customer order information is collected


Make an architecture diagram of an eCommerce web site that attempts to keep order information (including personal and credit card information) private. The system must allow uses to access the web site from the Internet while confidential data must be stored in the internal corporate network.

Use components such as firewalls, VPNs, proxies, machine access control lists, and encryption.

Explain the specific function of each of the components. If a component is used twice, describe the specific function the component performs each time it is used.

Given the access control permission for each machine and firewall rules.

The steps of how customer order information is collected and moved to the internal database. By "steps," give the machines the data visits and the function of the machine.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: The steps of how customer order information is collected
Reference No:- TGS01411732

Expected delivery within 24 Hours