Preview

Projects

Good Essays
Open Document
Open Document
781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Projects
Task 1
Design a file storage server architecture for the proposed Web-based infrastructure to support customers.
NFS follows the client-server model of computing
File system + NSF client +Network to NSF server + File system
The systems will start with a file system and an NSF Client. There could be one two or more files systems in use.
It will connect to a network that will go to an outside NSF File server.
There should be firewall rules in affect that will not allow confidential information from leaking out. The use of a good encryption setup should be used as well. I would recommend this in order to save personal financial information from being comprimised. This will also keep customers from making unauthorized changes to other peoples accounts.
Describe specifically how data can be shared with the Web server in a secure fashion
Data can be shared securely by the use of an apache web server application. Also the use of SSH will help as well.

Task 2
(http://www.acunetix.com/websitesecurity/webserver-security/)
1. Remove Unnecessary Services
Change the default settings for installations and configurations on the operating systems. By removing unnecessary systems that are running, it will help to secure unused and open ports. 2. Remote access
Use tunneling and encryption protocols. restrict access to only the ips needed to do the job. 3. Separate development / testing / production environment
Development should be done on development servers, testing on its server and production on its environment.
4 .Web application content and server-side scripting The web application or website files and scripts should always be on a separate partition or drive other than that of the operating system, logs and any other system files.
5. Permissions and privileges Always assign the least privileges needed for a specific network service to run, such as web server software. 6. Install all security patches on time 7. Monitor

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This software is going to have a web server which will be connected to whenever any web service is needed. This server is also going to contain the database. Thus in needs for data also, system will communicate with this server. This communication is capable with the help of JDBC. The data will be synchronized and consistent data will be kept in the server.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    To restrict Web site or FTP access to specific computers or companies, you can create a list of IP…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Name two parameters that you can set to enhance the access control to the system.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Quiz

    • 2246 Words
    • 9 Pages

    10) Which of the following is a technology used to place content on a shared file server in a company?…

    • 2246 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Web 240 week 2 dqs

    • 340 Words
    • 1 Page

    The process of creating and maintaining a website typically involves both development and production environments. What is one reason for maintaining the two separate environments and the purpose of each? Explain. Is there a scenario for bringing the two together? Explain.…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cis 207 Information

    • 889 Words
    • 4 Pages

    There are several ways that customers can transfer information to us. One example is when customers would use the FTP site, (files transfer protocol), email, drop box, and many other data transfer method in order get files to us. One simple and quick way is that information flows in and out of my company is through our public FTP site. Our public FTP site does not require and login and a password. Anyone can upload or download files. This method of data transfer is hard for my coworkers and I to control. This is because any customers can get a hold of someone else’s files, and we would never even know. The only way we can keep the file safe is that once the customers is done with the upload, we ask them to give us a call or an email us right away, to let us know that the files are ready for us to download. Once the files are downloaded from our FTP site to our desktop,…

    • 889 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Implement a tool for user authentication, encryption and decryption; use pins and passwords for barriers.…

    • 964 Words
    • 4 Pages
    Good Essays

Related Topics