Firewall
Our firewall is setup as a separate machine that acts as a gateway for
access to all other servers in our system. This firewall is designed to
prevent hackers from entering the system searching files and information.
The firewall acts as a barrier so that we only have a single point of
entry to our system... through the web browser. All of our internal databases
and applications are shielded from any access outside the firewall.
1. Screenshot
We use the Check Point VPN-1 solution to provide state-of-the-art security
for critical client resources. For users of remote access VPNs, Checkpoint
leads the industry with advanced client solutions to establish VPN connections
efficiently and completely transparently and provides strong encryption
to ensure data privacy, and supports a broad range of authentication methods
to verify user identity. All VPN-1 client solutions secure communications
with network gateways and with individual servers.
Check Point FireWall-1 is based upon Stateful Inspection, the de facto standard
for Internet firewalls invented by Check Point Software Technologies (U.S.
Patent No. 5,606,668 and 5,835,716). Stateful Inspection provides the
highest level of security possible by incorporating communication- and
application-derived state and context information, which is stored and
updated dynamically.
FireWall-1
transparently authenticates users of HTTP services via an extended log-in
procedure. Transparency means that the user can request a connection
directly to the final destination, rather than to a firewall gateway.
FireWall-1 automatically intercepts each connection and prompts users
to authenticate themselves if required by the security policy.
Check Point FireWall-1 protects users from virus attacks, malicious Java and
ActiveX applets and undesirable Web content through its integrated content
security capabilities: Integrated Security Servers. For each connection
established through a FireWall-1 HTTP, SMTP or FTP security server,
the network manager controls access to specific resources with a high
degree of granularity. Access can be controlled to specific Web pages
and actions, SMTP-specific header fields and more.
Security Checking for ID and Password
Survey owners are checked into the administrative portion of the system
using their ID and password. This is the only way to access the data
collected for the individual survey. UserName and password check is
a standard access protocol in the industry.
Access Control for Surveys
Access of potential respondents to the survey can be controlled by password
protection. In this way, only a certain group of individuals (that you,
as an administrator give access to), are able to take the survey.
Specific Data Items
Individual data items are not encrypted. However they are keyed to the survey owner's UserName and Password and we implement extensive checks so that access to each individual data item (and;all computation requests) require confirmation of correct UserName and Password.
Security for Credit Card Payments
Verisign handles all credit card processing directly on their
site. SurveyAnalytics uses Verisign for processing of credit card payments. Verisign creates a dedicated SSL TCP/IP level communication thread for each transaction between the client and the server.