Question

In: Computer Science

Web Server Infrastructure Web application infrastructure includes sub-components and external applications that provide efficiency, scalability, reliability,...

Web Server Infrastructure

Web application infrastructure includes sub-components and external applications that provide efficiency, scalability, reliability, robustness, and most critically, security.

  • The same advancements made in web applications that provide users these conveniences are the same components that criminal hackers use to exploit them. Prudent security administrators need to be aware of how to harden such systems.

Use the graphic below to answer the following questions:

Stage 1

Stage 2

Stage 3

Stage 4

Stage 5

Client

Firewall

Web Server

Web Application

Database

  1. What stage is the most inner part of the web architecture where data such as, customer names, addresses, account numbers, and credit card info, is stored?

  1. Which stage includes online forms, word processors, shopping carts, video and photo editing, spreadsheets, file scanning, file conversion, and email programs such as G mail, Yahoo and AOL.

  1. What stage is the component that stores files (e.g. HTML documents, images, CSS stylesheets, and JavaScript files) that's connected to the Internet and provides support for physical data interactions between other devices connected to the web?

  1. What stage is where the end user interacts with the World Wide Web through the use of a web browser?
  2. Which stage is designed to prevent unauthorized access to and from protected web server resources?

Solutions

Expert Solution

ANSWERS:

1)The information regarding the customer names,credit card info,adreeses,and other confidential information is stored in the database(stage 5)

2)Web application(stage 4) like mail, helps us to view emails and provide us with the functiionality that we require on the web.

3)Web server(STAGE 3) is responsible for the storage of files like html,images related to the internet and acts as a middleman between the different devices and helping with the interconnection

4)Client stage(STAGE 1) is where the user is actually connected with the internet,a client server forms a bridge to the web server through the firewall by sending an authorised connection request,which upon authentication is opened to the end user.

5)The firewall (STAGE 2)protects against the unauthorised access by accepting or rejecting connection requests upon performing some basic security checks.(just like a gatekeeper)

---------------------------------------------fin--------------------------

please upvote if the answer was helpful.


Related Solutions

Explain the key difference between a web service application and a general client/server application
Explain the key difference between a web service application and a general client/server application
To improve the overall functionality and efficiency of your sub-ordering Java application, you are considering the...
To improve the overall functionality and efficiency of your sub-ordering Java application, you are considering the use of some of the Java predefined methods. Some of the predefined Java classes and methods you are evaluating include vectors, wrapper classes, conversion methods, and collections data structures to process lists. Within the Discussion Board area, write 5 paragraphs that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be...
When you put a Servlet in a Web Application on the Tomcat/Glassfish server, how do you...
When you put a Servlet in a Web Application on the Tomcat/Glassfish server, how do you go about running this Servlet? a. From the Browser’s URL(give path):
Web-based application designers often make a fundamental mistake in their applications regarding the source of data....
Web-based application designers often make a fundamental mistake in their applications regarding the source of data. Identify and explain this mistake, including how applications handle this common error.
A systems developer needs to provide machine-to-machine interface between an application and a database server in...
A systems developer needs to provide machine-to-machine interface between an application and a database server in the production environment. This interface will exchange data once per day. Which of the following access control account practices would BEST be used in this situation? A.Establish a privileged interface group and apply read -write permission.to the members of that group. B.Submit a request for account privilege escalation when the data needs to be transferred C.Install the application and database on the same server...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT