Preview

IS3440 Lab 1

Good Essays
Open Document
Open Document
364 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3440 Lab 1
For this kind of scenario, I would have to create a server from scratch so I can be able to identify any types of vulnerabilities on any of these server requirements stated below. Any of these can be at risk at any time, so creating a new server from scratch would be most recommended. Because it is kind of safer than Windows because most viruses and worms are written for Windows but it doesn’t mean Linux can be attacked.
Server Requirements:
A Web Server
A database server
A Simple Mail Transfer Protocol (SMTP) server
A file server customers’ loan applications and other personal data files
First of all, since Linux is mostly an open-source type of software running server, it is very vulnerable to any kinds of attacks, or as Linux calls them, crackers. Many malicious attacks on Linux and related applications will also grow. The Web Server isn’t much of a risk because but it is still an important software that can have a high risk of being attacked because it’s known as an open-source, so having any personal information stored inside it, can be at risk of being exposed to a cracker (hacker).
The Database Server is a very high risk of vulnerabilities because this is where important data and files are being stored in. Again, this is still an open-source software so protecting this kind of software is important to the company. A Simple Mail Transfer Protocol (SMTP) and a file server for customers’ loan applications and other personal data files are a must protect! These are open-sources too, so basically all of these server requirements are open source, no surprise. But protecting all these will require a lot of attention especially the SMTP, file server for customers’ and the database server.
Here are some steps/tools that you can use to stop any kinds of attacks upon these servers:
Identify any risks/vulnerabilities these servers have
Open ports
Nessus
OpenSSH/PuTTY/SSH
Burp Suite
There’s more of these but these are the basics of protecting your Linux

You May Also Find These Documents Helpful

  • Good Essays

    CHM130LL Lab 5

    • 920 Words
    • 7 Pages

    The isotopes of an element have the same amount of protons, but a different amount of neutrons, so they vary in size.…

    • 920 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    The benefits of a partial in the cost and a full meh would be required where large sums of money and data are exchanged and can have almost none down time.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab8 is3440

    • 129 Words
    • 1 Page

    1 Bascially RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The e-commerce server could be placed in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will pass it in an encrypted form to and from wherever it needs to go.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Netw 310 Lab #1

    • 257 Words
    • 2 Pages

    1. There are three patterns outlined on the screen. Which one of these is identifying the noise floor?…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2670 Lab 5

    • 88 Words
    • 1 Page

    2. No you need to configure the URL and path for the media you want to show.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It 220 Lab 9.1

    • 426 Words
    • 2 Pages

    37. What type of fiber cable should be placed in the ground for a campus network?…

    • 426 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. What happens to the volatile memory when the power is lost? –RAM is deleted…

    • 239 Words
    • 2 Pages
    Satisfactory Essays