Preview

Projects

Good Essays
Open Document
Open Document
781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Projects
Task 1
Design a file storage server architecture for the proposed Web-based infrastructure to support customers.
NFS follows the client-server model of computing
File system + NSF client +Network to NSF server + File system
The systems will start with a file system and an NSF Client. There could be one two or more files systems in use.
It will connect to a network that will go to an outside NSF File server.
There should be firewall rules in affect that will not allow confidential information from leaking out. The use of a good encryption setup should be used as well. I would recommend this in order to save personal financial information from being comprimised. This will also keep customers from making unauthorized changes to other peoples accounts.
Describe specifically how data can be shared with the Web server in a secure fashion
Data can be shared securely by the use of an apache web server application. Also the use of SSH will help as well.

Task 2
(http://www.acunetix.com/websitesecurity/webserver-security/)
1. Remove Unnecessary Services
Change the default settings for installations and configurations on the operating systems. By removing unnecessary systems that are running, it will help to secure unused and open ports. 2. Remote access
Use tunneling and encryption protocols. restrict access to only the ips needed to do the job. 3. Separate development / testing / production environment
Development should be done on development servers, testing on its server and production on its environment.
4 .Web application content and server-side scripting The web application or website files and scripts should always be on a separate partition or drive other than that of the operating system, logs and any other system files.
5. Permissions and privileges Always assign the least privileges needed for a specific network service to run, such as web server software. 6. Install all security patches on time 7. Monitor

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This software is going to have a web server which will be connected to whenever any web service is needed. This server is also going to contain the database. Thus in needs for data also, system will communicate with this server. This communication is capable with the help of JDBC. The data will be synchronized and consistent data will be kept in the server.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    To restrict Web site or FTP access to specific computers or companies, you can create a list of IP…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Name two parameters that you can set to enhance the access control to the system.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Using weak passwords, Unencrypted data storage, passing clear text credentials over the network, using weak authentication mechanisms, allowing prolonged session lifetime…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    For site to site we would just use VPN to secure the network data and encrypt it for security measure. An SSL VPN offers versatility, ease of use and granular control for a range of users on a variety of computers, accessing resources from many locations. There are two major types of SSL VPNs. SSL Portal VPN is a type of SSL VPN allows for a single SSL connection to a Web site so the end user can securely access multiple network services. The site is called a portal because it is one door (a single page) that leads to many other resources. The remote user accesses the SSL VPN gateway using any modern Web browser, identifies the user to the gateway by using an authentication method supported by the gateway and is then presented with a Web page that…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If you use a computer at home the most efficient and important step to help your computer to protect by turning on your firewall.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 207 Information

    • 889 Words
    • 4 Pages

    There are several ways that customers can transfer information to us. One example is when customers would use the FTP site, (files transfer protocol), email, drop box, and many other data transfer method in order get files to us. One simple and quick way is that information flows in and out of my company is through our public FTP site. Our public FTP site does not require and login and a password. Anyone can upload or download files. This method of data transfer is hard for my coworkers and I to control. This is because any customers can get a hold of someone else’s files, and we would never even know. The only way we can keep the file safe is that once the customers is done with the upload, we ask them to give us a call or an email us right away, to let us know that the files are ready for us to download. Once the files are downloaded from our FTP site to our desktop,…

    • 889 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Implement a tool for user authentication, encryption and decryption; use pins and passwords for barriers.…

    • 964 Words
    • 4 Pages
    Good Essays

Related Topics