Question

In: Computer Science

A small company network have multiple servers (including a web server, a log server, DNS servers,...

A small company network have multiple servers (including a web server, a log server, DNS servers, a file server for inventory information and customer orders, but no email server) , two firewalls, DMZ, and PCs. The company sales products online.

a). Suppose that you are a system administrator. What types of network connections will you allow to be established with the servers in the DMZ from the Internet?

b). What are the points of entry for attackers?

c). How do you secure the customer data?

d). How do you manage the servers in the DMZ?

e). How do you set up NAT?

Solutions

Expert Solution

J


Related Solutions

A server is a computer or device on a network that manages network resources. Servers are...
A server is a computer or device on a network that manages network resources. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems however, a server may be one of several programs that are each managing specific requests for services from clients or a particular hardware or software resource, rather than the entire computer. For each of the server types below, provide a short description of the service each provides...
The following is a mock-up of a Nginx web server access log. There are a few...
The following is a mock-up of a Nginx web server access log. There are a few entries that might indicate someone is searching for an attack vector. Write a command that will do all of the wollowing; Read the lines from a file Use a single regular expression to find all lines where; Someone tried to access a file starting with a period (example ".htaccess") OR Someone attempted to open one of; "php.ini" or "wp.conf" OR Someone tried to retrieve...
a) You have installed the DNS server role on a computer running Windows Server 2016 and...
a) You have installed the DNS server role on a computer running Windows Server 2016 and in the process of configuring forward/reverse lookups. Explain the difference between “ping www.google.com” and “ping the IP address of Google server at 172.217.167.68”. You may want to try both and observe any differences. Your answer should include your explanation, as well as screenshots. [5 Marks] b) Network administrators warn against configuring a file server to use DHCP. Explain what would happen if a file...
a) You have installed the DNS server role on a computer running Windows Server 2016 and...
a) You have installed the DNS server role on a computer running Windows Server 2016 and in the process of configuring forward/reverse lookups. Explain the difference between “ping www.google.com” and “ping the IP address of Google server at 172.217.167.68”. You may want to try both and observe any differences. Your answer should include your explanation, as well as screenshots. b) Network administrators warn against configuring a file server to use DHCP. Explain what would happen if a file server was...
a) You have installed the DNS server role on a computer running Windows Server 2016 and...
a) You have installed the DNS server role on a computer running Windows Server 2016 and in the process of configuring forward/reverse lookups. Explain the difference between “ping www.google.com” and “ping the IP address of Google server at 172.217.167.68”. You may want to try both and observe any differences. Your answer should include your explanation, as well as screenshots.
Case Project 3-2 Setting Up DNS Security Your DNS servers have been hacked, and you’ve been...
Case Project 3-2 Setting Up DNS Security Your DNS servers have been hacked, and you’ve been asked to set up DNS security measures. Your supervisor wants to know the options for preventing attackers from tampering with your DNS servers. Write a memo to your supervisor discussing DNSSEC, a DNS socket pool, and DNS cache locking and how they can help secure DNS. Answer:
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. (10 marks total) CSE1CPR 2020 Final Exam Page 8 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry? iii. How might this cause harm? iv. Suggest how the website developer or administrator might...
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry? iii. How might this cause harm? i v. Suggest how the website developer or administrator might mitigate this threat or vulnerability?
Use the sample entry from an Apache web server log below to answer the following questions....
Use the sample entry from an Apache web server log below to answer the following questions. 10.10.0.2 - - [1/Jan/2020:10:02:45 +0000] “GET /login.php?username=admin&password=password&submit=TRUE HTTP/1.1 302 i. Identify the key information in this message and briefly describe what this log entry is telling you? ii. What security threat or vulnerability can you see from this log entry?   iii. How might this cause harm? iv. Suggest how the website developer or administrator might mitigate this threat or vulnerability?
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT