You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users using your firewall’s proprietary internal user management functionality, which cannot communicate with any outside systems. As your network grows and security items are added, other network components need to access the same database of users. Discuss strategies you could employ to provide multiple network components with access to a common database of users?
I need your own word to answer this. Please do not copy answer from internet.
Thank you
strategies can be as follows:
- the data files can be encrypted- generally the information about the database is stored in plain text format which is vulnerable to attacks,hence encryption of this file would secure the important data from being attacked.
- patches- with social media and online advertising - the rate of getting attacked has increased manifold . In this case application of patches will increase the security to many levels.
You have configured your firewall to authenticate a group of 100 users who are in your...
You are given the following "informal firewall policy" details to be implemented using the firewall topology illustrated in slide # 22 (Chapter 9) Present the rules for the external and internal firewalll in a table format. a) Email may be sent using SMTP in both directions through the firewall, but it must be relayed via the DMZ mail gateway. External email must be destined for the DMZ mail server. b) Users inside may retrieve their e-mail from the DMZ mail...
You have decided to build a web application that allows user
authentication(enrolling and verifying users) using either
fingerprint, iris, face recognition or voice. Using the image
attached as a guideline, your task is to come up with an
architecture plan diagram and a brief
explanation of the diagram for this web application,
depicting the technologies or technology stack that will be
used.
Application Delivery Infrastructure Web Server, Portal, Application Server, & User Interface Technology Middleware Infrastructure Enterprise Service Bus, Message...
1- It is advisable to have more than of form of defence, justify the advantages and disadvantages of that approach? 2- In what case you would recommend a screening router firewall architecture over screened host architecture? 3- You need to implement defence in depth for your entire organization. Your management is interested in deploying intrusion prevention systems. Your goal is to protect. 1) All the traffic flowing through a network 2) Endpoints from intrusions. Analyse the technologies you will be...
Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure the RMC network and ensure that the...
Question 2 (20 marks) – Improving network design Jim is
impressed by your report and asks you to write a proposal to
improve the network, although his budget is limited he tells you
that if you can justify your design choices you may be able to
purchase some more equipment. You will need to provide a new
network design diagram in PowerPoint format, thankfully Jim has
included a couple of slides with various network equipment elements
that you can use...
Background: I have an Access-software (~30 simultaneous users) with split front- & back-end, both UI & DB running on Access-files. Most important features for me are reports & printing, with emphasis on fast development and deployment to the users (updates 1-3 times per week, using as little time as possible). The environment is Win7 + Access 2010. Updates are handled with .BAT-batch file. The database might be upgraded into SQL Server Express or something later this year. Problems: The Access...
Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the...
For your initial discussion post, you are to expand on the element review below. You need to provide specific examples on what will be reviewed in the audit based on this element. Answer what will be included in the audit plan for this element. If possible, provide a link to another resource. Try not to pick an element already discussed by another student. In your response, provide your comments on the other students posts on their element and any additional...
Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has the following equipment: 5 Servers in San Francisco, LA and Sacramento, all deploying Windows Server 2102R2 as follows: 1 SQL Server Database server in SFO 1 Exchange Email Server in SFO 1 File Server in SFO. This server is also the Domain Controller 1 File Server in Sacramento 1 File Server in L.A The file servers are connected through VPN lines to each other....
Create a Snort Rule. You have been investigating an apparent internal attack against your company’s Windows Server 2008 file servers. Suspicious packets have been captured during routine audits. You need to configure Snort to log these suspicious files. Your internal network address is 172.20.0.0 with a subnet mask of 255.240.0.0. Your file servers’ addresses are 172.20.0.12 and 172.20.0.13. Each of these file servers is running Snort as an HIDPS. The suspicious packets have the following characteristics: ? They have come...