B2B FileMover - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

B2B FileMover

Description:

Title: Security Awareness Author: Lloyd M Guyot II Last modified by: jsuchowo Created Date: 6/21/2003 5:30:45 PM Document presentation format: Letter Paper (8.5x11 in) – PowerPoint PPT presentation

Number of Views:66
Avg rating:3.0/5.0
Slides: 16
Provided by: Lloy103
Category:
Tags: b2b | filemover | private

less

Transcript and Presenter's Notes

Title: B2B FileMover


1
B2B FileMover
Grand Valley State University
2
B2B FileMoverAgenda
  • Introduction Background
  • File Exchange Process
  • Security
  • Infrastructure Design
  • Reporting Capabilities
  • Administration
  • Lessons Learned
  • Questions Discussion

3
Introduction Background
  • Necessity of Secure File Transfer
  • Priority Health
  • Why GVSU Interns?
  • Partnership with GVSU
  • Why Perl?

4
File Exchange Process
  • Objective
  • Automated Secure Transfer
  • Why FTP?
  • Most Requested ? Solves ASCII / EBCDIC
  • Common ? Free
  • Modular Design
  • Partner or Steelcase Initiated
  • Push or Pull Transfers
  • On Demand
  • Repetitive

5
B2B FileMover Process
6
B2B FileMover Process
7
Security
  • Separate User Accounts
  • Filename Verification
  • Encryption Standards
  • Virus Scanning
  • Security Agreement

8
Incoming Process Data Flow
9
Incoming Process Data Flow
10
Security
  • Separate User Accounts
  • Filename Verification
  • Encryption Standards
  • Virus Scanning
  • Security Agreement

11
Infrastructure Design
  • Architecture
  • Automated
  • Supports FTP and SFTP
  • Independent Capabilities
  • Centralized and Reusable Modules
  • Stateful and Self-Recoverable

12
Reporting Capabilities
  • Log Contents
  • System Reporting
  • EMU monitoring
  • Heartbeats
  • Normal Alert
  • Notification System
  • Errors
  • Verifications

13
Administration
  • Platform - Linux
  • Main System Administration Account
  • Process Configuration Values
  • Independent Administration Accounts
  • File Permissions

14
Lessons Learned
  • Gather Requirements
  • Scope Creep
  • Setting Understanding Expectations
  • Profuse Testing
  • Use Warning Option
  • Linux Permission Settings
  • Sufficient Documentation
  • Instant Messaging

15
QUESTIONS DISCUSSION
Write a Comment
User Comments (0)
About PowerShow.com