Preview

lasb 8 IS3220

Satisfactory Essays
Open Document
Open Document
390 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lasb 8 IS3220
1. Explain why a layered security strategy helps mitigate risk and threats both external and internal.
Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.
2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access?
When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers.
3. What recommendations do you have for the future e-commerce server and deployment in regards to physical location and back-end security for privacy data and credit card data?
I would place the e-commerce server in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will pass it in an encrypted form to and from whatever it needs to go. The e-commerce server will be physically secured in the server room, possibly with an added locked server cabinet.
4. What recommendations do you have to secure the server farm from unauthorized access?
I would lock the servers into their own room with keycard or fingerprint access only. Set up and perform audits on each individual server.
5. If the organization implemented wireless LAN (WLAN) technology, what would you recommend regarding the use of VPNs or encryption within the

You May Also Find These Documents Helpful

  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access?…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Question 1 (1 point) In NAT, the ________ creates new external source IP addresses and port numbers. Question 1 options: A) firewall B) source host C)…

    • 268 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Deploy Front End Server: Deploy a Front End Server on the DMZ, and close unused ports on the DMZ. Here are the ports most used by Exchange services:…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    A DMZ network has been set up to add another layer of security. A DMZ is layered defense created to limit access deeper into the network. Connected to that particular firewall is the addition of a storage router, that makes it now three routers in the network diagram as oppose to the two routers in the as-is diagram. To ensure software countermeasures, the deployment of anti-virus and firewall software for servers and computers are implemented. Anti-virus software for servers would operate at the database layer while other antivirus and software firewalls would operate at the client layer. The use of a personal firewall protects each of the client machines, creating a virtual layer.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    The Database Server is a very high risk of vulnerabilities because this is where important data and files are being stored in. Again, this is still an open-source software so protecting this kind of software is important to the company. A Simple Mail Transfer Protocol (SMTP) and a file server for customers’ loan applications and other personal data files are a must protect! These are open-sources too, so basically all of these server requirements are open source, no surprise. But protecting all these will require a lot of attention especially the SMTP, file server for customers’ and the database server.…

    • 364 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For site to site we would just use VPN to secure the network data and encrypt it for security measure. An SSL VPN offers versatility, ease of use and granular control for a range of users on a variety of computers, accessing resources from many locations. There are two major types of SSL VPNs. SSL Portal VPN is a type of SSL VPN allows for a single SSL connection to a Web site so the end user can securely access multiple network services. The site is called a portal because it is one door (a single page) that leads to many other resources. The remote user accesses the SSL VPN gateway using any modern Web browser, identifies the user to the gateway by using an authentication method supported by the gateway and is then presented with a Web page that…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. Placing a firewall between two routers and another firewall before a DMZ would be the best requirement choice to use…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    M2M Remode_access

    • 1084 Words
    • 5 Pages

    In the minimal configuration only incoming SSH connections are required to have access to DMZ zone. Services other than SSH are optional – however they are required in that case to provide access for monitoring of the HMI and for engineering /configuration purposes.…

    • 1084 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Eci Pass Paper 13

    • 449 Words
    • 2 Pages

    Discu ss t he following Electr onic Commerce Infrastructure related security topics. Use examples to support your discussion: (a)…

    • 449 Words
    • 2 Pages
    Satisfactory Essays