An information system that more specifically is “a network architecture in which each computer or process on the network is either a client or a server Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers). Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power.” (Webopedia, 2014)
The Trusted Computing Base (TCB) is the part of a system that is responsible for enforcing system-wide information security policies. The user can define user access to the trusted communication path, which allows secure communication between regular users and the TCB, by installing and …show more content…
using the TCB.The system administrator must determine how much trust can be given to a particular program.
“In the ring of trust model, the outer rings contain a lower level of security, and systems requiring higher levels of security are located inside the inner rings. To move from an outer ring into an inner ring, extra security mechanisms are encountered.” (Smith, 2013) the servers will be secure and have all the securities that Riordan would like and need.
There will be little or no down time to create the new virtual servers and business will not be effected.
Also the disaster recovery rate is much quicker in case of a crash. The information is backed up so in case of a crash the information can be retrieved quickly. The information gets to the end user much more quickly than having a physical server. Physical server machines get dirty and overloaded with old files and information that is no longer needed or wanted. All information passed through the organization will be encrypted to protect vital aspects of the company operations. The virtual machine running the share point will house the encryption piece for information traffic. Utilizing a virtual server in this aspect will allow end users to generate reports by department in real time with little or no help from an information technology
professional.
The use of firewalls and even a virtual firewall is also recommended to protect Riordan’s information. “A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines. A virtual firewall is deployed, executed and operated from a virtual machine. Virtual firewall formats include: Stand-alone software Integrated OS kernel component. A virtual security provider 's dedicated hardware platform A virtual firewall operates in a virtual area network (VAN) environment of connected virtual machines. A virtual firewall operates in two different modes: Bridge mode: Like a traditional firewall, this mode operates by diagnosing and monitoring all incoming and outgoing traffic bound for other virtual networks or machines. Hypervisor mode: In contrast, this mode is isolated from the actual network, resides in the core hypervisor kernel and monitors the virtual host machine 's incoming and outgoing traffic.” (Techopedia, Virtual Firewall, 2014)
When placing all of the business information on a server along with all of the employee information the company will want it to be secure and readily available to use. When using a virtual server there is not complete control of the physical access of the database. On the other hand the information is no longer on easy identifiable physical systems. There are multiple layers of virtual securities. The data safeguards requirements are the same as a physical server. Information that requires more safeguards is available. Information can be encrypted, role based control, and secure in many ways. Cyber-attacks are all very real threats and can be protected against also.
A firewall can encrypt data at the file system that the virtual machine then uses a much managed login procedure for added protection of data against compromise. Logs are also created for looking back on to see who, where, and when certain data was accessed. Different levels of securities will be used for different levels of data importance. Administration roles will have more securities on them than someone at the data entry level.
References
Smith, D. (2013, January 23). Improving Computer Security through Network Design. Retrieved from WindowsSecurity.com: http://www.windowsecurity.com/whitepapers/misc/Improving_Computer_Security_through_Network_Design_.html
Webopedia. (2014, January 1). Webopedia. Retrieved February 17, 2014, from IT Business Edge: http://www.webopedia.com/TERM/C/client_server_architecture.html