Question

In: Computer Science

Modularizing Security Design: a. Please explain about the modular approach of security design b. How to...

Modularizing Security Design:

a. Please explain about the modular approach of security design

b. How to implement modular approach to secure server farm?

Solutions

Expert Solution

a) Security experts are actually promoting the security defense, the main objective that network security that should be multi layered and implementing many technique to ensure the security. Since no method can assure you to give 100% data security so for each methods you should use a backup method. There is one such method called the belt and suspenders approach. This method uses firewall to block access to outside traffic. The modular approach to the security design is really a good way to have an understanding regarding the types of solution which is required to implement security . Here are few approach which you can take:

  • Internet connection: Internet connect is the major source for an attack. So implementing security realted to internet security is by implementing router level firewalls in your network.
  • Using of VPN: Virtual private network creates a secure tunnel through which we can securely connect to a network using remotely. VPN is another modular way to implement security.
  • Wireless network security: Implementing wireless security using WPA will allow users to authenticate into the network. Without proper authorization, no user can able to enter into the network.

b) Server farms generally used to host files, database, prints and and application inside the infrastructure. These servers have most sensitive information stored in it. So it must be protected at any cost. Moreover, these servers are accessed by a lot of users and the network performance is an critical issue that need to be solved. In order to maximize the security, and security must be selected and maintained. Here are few steps which needs to be followed:

  • Limiting the root password only to the administrator and even guest account should be avoided. There should be a different host machine where guest user can able to login.
  • Using kerberos authentication system which provides user to host security for application level protocol such that FTP and the Telnet. Kerberos relies on symmetric key database which uses KDC on kerberos server.

Related Solutions

explain how Modular Design is beneficial and how do the component statement and pirt maps work?
explain how Modular Design is beneficial and how do the component statement and pirt maps work?
Please write in python Use modular design to write a program that asks the user to...
Please write in python Use modular design to write a program that asks the user to enter his or her weight and the name of a planet. The program then outputs how much the user would weigh on that planet. The following table gives the factor by which the weight must be multiplied for each planet. PLANET CONVERSION FACTOR Mercury 0.4155 Venus 0.8975 Earth 1.0000 Moon 0.1660 Mars 0.3507 Jupiter 2.5374 Saturn 1.0677 Uranus 0.8947 Neptune 1.1794 Pluto 0.0899 The...
Explain how a rational design approach was used to create semi synthetic aminoglycosides Which classical approach...
Explain how a rational design approach was used to create semi synthetic aminoglycosides Which classical approach was used to increase the production of penicillin?
please explain how student loans are an asset-backed security
please explain how student loans are an asset-backed security
Uses of security-market indexes – Please write a paper about the uses of security-market indexes. How...
Uses of security-market indexes – Please write a paper about the uses of security-market indexes. How are they constructed and differentiated? How are they used as benchmarks? Why should investors examine numerous security-market indexes to evaluate the performance of their investments? Integrate Leviticus 19:22-25 and Ecclesiastes 11:1-6 into the paper. Requirements: 500 words minimum
Explain how the CMS promoting interoperability program and its security requirements impact EHR design and use...
Explain how the CMS promoting interoperability program and its security requirements impact EHR design and use . Explain the role of encryption in storing and security secured data. Explain the importance of making ethical decisions to comply with security requirements when using EHR systems. How could aspects of a christian worldview help inform ethical decision making in the situation?
please write about stakeholders approach in 200 words. thanks in advance. the topic is ''stakeholders approach''.
please write about stakeholders approach in 200 words. thanks in advance. the topic is ''stakeholders approach''.
Please answer all questions please 1.Explain how the NGS approach has been able to bring the...
Please answer all questions please 1.Explain how the NGS approach has been able to bring the cost of sequencing down. 2.In a nutshell, what are the major steps performed during next generation sequencing of DNA? How do these steps differ in the Illumina platform as compared to the Roche 454 platform? 3. Now that the human genome has been sequenced, what types of information still need further research?
How does a scenario-based design approach help identify key design decisions on a project?
How does a scenario-based design approach help identify key design decisions on a project?
Please explain how you design the experiment to predict the spoilage microorganism that affected on the...
Please explain how you design the experiment to predict the spoilage microorganism that affected on the Shelf-life of meat balls from primary model to validation. The factors are the storage temperature, water activity, pH
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT