Question

You have configured your firewall to authenticate a group of 100 users who are in your...

You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users using your firewall’s proprietary internal user management functionality, which cannot communicate with any outside systems. As your network grows and security items are added, other network components need to access the same database of users. Discuss strategies you could employ to provide multiple network components with access to a common database of users?

I need your own word to answer this. Please do not copy answer from internet.

Thank you

0 0
Add a comment Improve this question Transcribed image text
Answer #1

strategies can be as follows:

- the data files can be encrypted- generally the information about the database is stored in plain text format which is vulnerable to attacks,hence encryption of this file would secure the important data from being attacked.

- patches- with social media and online advertising - the rate of getting attacked has increased manifold . In this case application of patches will increase the security to many levels.

Add a comment
Know the answer?
Add Answer to:
You have configured your firewall to authenticate a group of 100 users who are in your...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • You are given the following "informal firewall policy" details to be implemented using the firewall topology...

    You are given the following "informal firewall policy" details to be implemented using the firewall topology illustrated in slide # 22 (Chapter 9) Present the rules for the external and internal firewalll in a table format. a) Email may be sent using SMTP in both directions through the firewall, but it must be relayed via the DMZ mail gateway. External email must be destined for the DMZ mail server. b) Users inside may retrieve their e-mail from the DMZ mail...

  • You have decided to build a web application that allows user authentication(enrolling and verifying users) using...

    You have decided to build a web application that allows user authentication(enrolling and verifying users) using either fingerprint, iris, face recognition or voice. Using the image attached as a guideline, your task is to come up with an architecture plan diagram and a brief explanation of the diagram for this web application, depicting the technologies or technology stack that will be used. Application Delivery Infrastructure Web Server, Portal, Application Server, & User Interface Technology Middleware Infrastructure Enterprise Service Bus, Message...

  • 1- It is advisable to have more than of form of defence, justify the advantages and...

    1- It is advisable to have more than of form of defence, justify the advantages and disadvantages of that approach? 2- In what case you would recommend a screening router firewall architecture over screened host architecture? 3- You need to implement defence in depth for your entire organization. Your management is interested in deploying intrusion prevention systems. Your goal is to protect. 1) All the traffic flowing through a network 2) Endpoints from intrusions. Analyse the technologies you will be...

  • Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set...

    Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure the RMC network and ensure that the...

  • Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can j...

    Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can justify your design choices you may be able to purchase some more equipment. You will need to provide a new network design diagram in PowerPoint format, thankfully Jim has included a couple of slides with various network equipment elements that you can use...

  • Background: I have an Access-software (~30 simultaneous users) with split front- & back-end, both UI &...

    Background: I have an Access-software (~30 simultaneous users) with split front- & back-end, both UI & DB running on Access-files. Most important features for me are reports & printing, with emphasis on fast development and deployment to the users (updates 1-3 times per week, using as little time as possible). The environment is Win7 + Access 2010. Updates are handled with .BAT-batch file. The database might be upgraded into SQL Server Express or something later this year. Problems: The Access...

  • Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test....

    Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the...

  • For your initial discussion post, you are to expand on the element review below. You need...

    For your initial discussion post, you are to expand on the element review below. You need to provide specific examples on what will be reviewed in the audit based on this element. Answer what will be included in the audit plan for this element. If possible, provide a link to another resource. Try not to pick an element already discussed by another student. In your response, provide your comments on the other students posts on their element and any additional...

  • Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has...

    Imagine that you are an IT administrator with a medium sized manufacturing company. Your company has the following equipment: 5 Servers in San Francisco, LA and Sacramento, all deploying Windows Server 2102R2 as follows: 1 SQL Server Database server in SFO 1 Exchange Email Server in SFO 1 File Server in SFO. This server is also the Domain Controller 1 File Server in Sacramento 1 File Server in L.A The file servers are connected through VPN lines to each other....

  • Create a Snort Rule. You have been investigating an apparent internal attack against your company’s Windows...

    Create a Snort Rule. You have been investigating an apparent internal attack against your company’s Windows Server 2008 file servers. Suspicious packets have been captured during routine audits. You need to configure Snort to log these suspicious files. Your internal network address is 172.20.0.0 with a subnet mask of 255.240.0.0. Your file servers’ addresses are 172.20.0.12 and 172.20.0.13. Each of these file servers is running Snort as an HIDPS. The suspicious packets have the following characteristics: ? They have come...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT