Free Essay

Secure Web and Database Successfully

In:

Submitted By mozurjus
Words 452
Pages 2
Project Part 2 Task 2: Secure Web and Database Servers
Scenario
First World Bank Savings and Loan needs to service its customers online with a Web application using a database that contains highly sensitive information. The Web application has been designed to work well with open source Web and database servers. The front end of the Web application, which is accessed by users, is served by a Web server. The Web server communicates with a database server to deliver the data. In other words, the Web server interacts with the database server. The users do not need to interact directly with the database server.
Tasks
Research and make recommendations about how the organization should implement the Web and database servers. Defend your recommendations in terms of security and stability.
Explain how Web and database administrators will be able to access the servers remotely.
Self-Assessment Checklist
•Student has recommended a database and Web server architecture and provided adequate explanations for the recommendation based upon security and stability.
•Student was able to specify a remote access solution for the Web and database administrators that can be considered secure.
Service subscribers access queues and or topics to exchange data using point-to-point or publish and subscribe patterns
Remote-access VPNs allow secure access to corporate resources by establishing an encrypted tunnel across the Internet. The ubiquity of the Internet, combined with today's VPN technologies, allows organizations to cost-effectively and securely extend the reach of their networks to anyone, anyplace, anytime.

The use of a database server and a we server is just fine, but they need to by kept within their own environment, behind at least a firewall. The communication between them should be done with a message queueing service (message-oriented middleware). It is deployed using software as a service model in a compute cloud (cloud service). Service subscribers access queues or topics to exchange data using point-to-point or pubish and subscribe patterns. Having the web server and database server behind firewalls inside their own area, allows both anti-virus- and anti-malware to be installed. All of this is going to opperate via SSL, which uses encryption, token exchange, and hashing. These steps will ensure that the information exhanged between the servers is kept within the C-I-A Triad (Confidentiality, Integrity, & Accessibility). If there was to be remote access to the information, it is recommended to be done via Remote-access VPNs (Virtual Private Network). They allow secure access to corporate resources like the servers, by establishing an encryped tunnel accross the Internet. The omnipresense of the Internet, combined with VPN technologies, allows organizations to cost-effectively and securely extene the reach of their networks.

Similar Documents

Premium Essay

Nt1310 Unit 3 Network Analysis

...Protecting user credentials from unauthorised users is an imperative task. This response (to EY Certificate 6 Assignment – Section A) will discuss how to protect passwords/user credentials. Protecting user credentials as well as user information brings into play all relevant security models. I have created my security model into the following: Process Physical Network Application Database Process The process layer defines the overall setup of the security architecture. It indicates how the security structure should be laid out. For...

Words: 2321 - Pages: 10

Free Essay

Security Issues and Solutions in E-Commerce Applications

...vulnerabilities and attacks on ecommerce platforms as well as some common tactics to prevent such attacks. Additional suggestions for maximizing information security on an application level as well as within an origination will be made with the goal emphasizing the prevention of attacks. There are numerous tactics that exploiters use to gain access to user personal and financial information on ecommerce sites. One common attack is SQL injection, which is a tactic where a hacker inserts SQL query data into user input fields on a web site, with the goal of that query being executed by the database. With the strategic placement of apostrophes, dashes and semi-colons, the hacker can execute queries that bring a web site down, provide access to customer financial and other personal information, and even manipulate data on the site. There have been a number of high-profile SQL injection attacks that have resulted in the theft of user information. The web sites of both Guess and PetCo were both the victims of a successful SQL injection attack by a 20 year old programmer who was able to steal user credit card information. Other online retailers that have fallen victim to SQL injection attacks resulting...

Words: 2158 - Pages: 9

Premium Essay

Nt1310 Unit 1 Assignment

...STEP 1: Create Instance. STEP 2: Download a key pair for security purpose. STEP 3: Launching the instance. STEP 4: Instance Configuration. STEP 5: Connecting to your Instance. STEP 6: Operating System Security. STEP 7: Result of your OS launched. STEP 8: Properties of new launched OS. Features of EC2: 1) Elastic Web-Scale Computing 2) Completely Controlled 3) Flexible Cloud Hosting Services 4) Integrated 5) Reliable 6) Secure 7) Inexpensive 8) Easy to Start 4.2 STORAGE & CONTENT DELIVERY NETWORK 4.2.1 Amazon Simple Storage Service (Amazon S3) Amazon S3 is storage for the Internet. It is designed to make web-scale computing easier for developers. Amazon S3 provides a simple web services...

Words: 1635 - Pages: 7

Premium Essay

An Evaluation of Apple Inc’s Use of Information Systems Through Its Website Http: //Www.Apple.Com/

...An evaluation of Apple Inc’s use of information systems through its website http://www.apple.com/ Introduction In the highly competitive world of business the ability to understand and make use of information systems can provide substantial benefits to an organization. The diversification of consumer taste and competition has put pressure on organizations to focus on customer involvement and business information systems have proven to be a versatile and useful tool in order to achieve this. Strategic information systems have the potential to allow an organization to gain a competitive advantage by accessing new markets and providing a more efficient and faster form of communication between managers. By improving communication within the organization, strategic information systems have the potential to reduce the cost of advertising, delivery, design and manufacturing. The purpose of this essay is to evaluate the use of information systems in consideration of Apple Incorporated’s website. About Apple Inc. Founded by Steve Jobs and Steve Wozniak, the company was incorporated on January 3, 1977, under the company name Apple Computers. Initially the multinational company predominantly dealt as a manufacturer of personal computers, however in 2001 following the successful release of the iPod, the company established itself as a credible competitor within the consumer electronics industry. By 2010 Apple Inc had surpassed Microsoft in terms of market capitalization to become...

Words: 2396 - Pages: 10

Free Essay

Advanced Web Development

...Advanced Web Development/WEB 407 Introduction Kudler Fine Foods is a specialty food store offering imported and domestic fare including baked goods, meats & seafood, produce, cheese & dairy, and wine. With three locations in the San Diego metropolitan area (La Jolla, Del Mar and Encinitas), Kudler’s mission is to provide their customers with, “…the finest in selected foodstuffs, wines, and related needs in an unparalleled consumer environment” (Apollo Group Inc. 2009). In an effort to increase customer convenience and business revenue, Kudler Fine Foods wants to sell their products on the internet. By adding both item inventory and online ordering pages to their current site, Kudler Fine Foods can accomplish this goal. There are, however, additional systems necessary on the back-end to make this system possible. According to TheConsumerCollective website (2010), “E-commerce spending continues to outpace analyst’s predictions… spending will reach $259 billion in 2014, and $278.8 billion by 2015” (Suetos, 2010). Over the past few years, customer confidence with online shopping has increased significantly. Customers feel more at ease with purchasing their products from online retailers than they did just years ago. This proposal will demonstrate the major components necessary for Kudler Fine Foods to begin offering their products online. It will discuss the database design, how the scripting language PHP will be set up to provide a “shopping cart” for ease...

Words: 3409 - Pages: 14

Premium Essay

Software Requirements Specification Document

...Software Requirements Specification for Mountain Bank Cell Phone App Version 5.0 approved CS455/Techs2ATee May 11, 2015 Table of Contents 1. Introduction 1 1.1 Purpose 1 1.2 Document Conventions 1 1.3 Intended Audience and Reading Suggestions 2 1.4 Project Scope 2 1.5 References 3 2. Overall Description 6 2.1 Product Perspective 6 2.2 Product Features 6 2.3 User Classes and Characteristics 7 2.4 Operating Environment 7 2.5 Design and Implementation Constraints 7 2.6 User Documentation 8 2.7 Assumptions and Dependencies 8 3. System Features 9 3.1 Establish Secure Session 9 3.1.1 Description and Priority 9 3.1.2 Stimulus/Response Sequences 9 3.1.3 Functional Requirements 9 3.1.4 Secure Session Test Script 10 3.2 Login 12 3.2.1 Description and Priority 12 3.2.2 Stimulus/Response Sequences 12 3.2.3 Functional Requirements 12 3.3 View Balances 13 3.3.1 Description and Priority 13 3.3.2 Stimulus/Response Sequences 13 3.3.3 Functional Requirements 13 3.4 View Transaction History 14 3.4.1 Description and Priority 14 3.4.2 Stimulus/Response Sequences 14 3.4.3 Functional Requirements 14 3.5 Transfer Funds 15 3.5.1 Description and Priority 15 3.5.2 Stimulus/Response Sequences 15 3.5.3 Functional Requirements 15 3.5.4 Funds Transfer between Accounts Test Script 16 3.6 Deposit 20 3.6.1 Description and Priority 20 3.6.2 Stimulus/Response Sequence 20 3.6.3 Functional Requirements 20 3.6.4 Successful Deposit Test Script 21 4. External...

Words: 13282 - Pages: 54

Premium Essay

Microsoft Access or Microsoft Sql Server: What's Right in Your Organization

...Microsoft Access or Microsoft SQL Server: What's Right in Your Organization? SQL Server Technical Article Writers: Luke Chung Technical Reviewer: Matt Nunn Published: December 2004, revised July 2006. Applies To: SQL Server 2005 Summary: This paper explains how Microsoft® Access is used within an organization. It also explains when to use Access and when to use Microsoft SQL Server™. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering...

Words: 6412 - Pages: 26

Premium Essay

Project Management

...Title: Move of Large Corporate Websites from Static to Dynamic Author: Nepaul Alphonse Jeyaraj Date: 22 April 2010 Authorization: Course Coordinator Subject: IT Project and Quality Management [COMP 1305] Exam Body: University Of Greenwich Table of Contents Introduction ............................................................................................................................... 3 Abstract ...................................................................................................................................... 4 Project Contents ......................................................................................................................... 5 One Level Weighted Scoring Model…………………………………………………………………………….6 Content Management System Description………………………………...........................6 Criteria Description…………………………………………………………………………………………...7 Justification………………………………………………………………………..................................7 Why choose Joomla as better CMS compared to other CMS……………………………13 Project Plan to move large corporate website from Static to Dynamic ................................... 14 Work Breakdown Structure………………………………………………………………………………………14 Gantt chart………………………………………………………………………………………………………14 Project Plan…………………….……………………………………………………………………………….16 Resource Utilisation…………………………………………………………………………………………21 Scope, Time and Cost of Project………………………………………………………………………22 Screen Shots .....................................................

Words: 6310 - Pages: 26

Premium Essay

Information System Controls for Systems Reliability

...CHAPTER 7 INFORMATION SYSTEM CONTROLS for SYSTEMS RELIABILITY SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 7.1 1. Encryption is the final layer of preventative controls in that encrypting data provides a barrier against an intruder who has obtained access to company data. Encryption employing a digital signature and a public key infrastructure (PKI) can also strengthen authentication procedures and helps to ensure and verify the validity of e-business transactions. The digital signature is some sort of identifying information about the signer that is encrypted with the signer’s private key. This identifying information can only be decrypted using the corresponding public key. Since a private key is only known to it’s owner, only the owner can hold both the public and the private key and be the creator of the digital signature. Thus, digital signatures can be used to authenticate a particular party involved in a transaction as being the creator of a document. This provides for non-repudiation: the creator of the digital signature cannot deny having signed a document.. A digital certificate is an electronic document that is digitally signed by a trusted third party that certifies the identity of the owner of a pair of public and private keys. The PKI is a system that is used to process and manage the public and private keys used in digital signatures and digital certificates. An organization that handles digital certificates is called a certificate...

Words: 5091 - Pages: 21

Premium Essay

Lans and Wans

...INDP-week 4 Erin Estes NTC/362 Keshia Green 11/26/2012 Local Area and Wide Area networks are essential to connecting Kudler Fine Foods together. As are the hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended...

Words: 1327 - Pages: 6

Premium Essay

Biometric Voting Essay

...around the world for identification purpose. This is due to easy and affordable cost of the system. The main drawback in the current system is authentication for the voters are not provided in a proper manner. The integration of biometric in the electronic voting machine undoubtedly requires less manpower and it also saves much time of the voter and it also eliminates rigging and it also ensures accuracy, transparency for faster result and accurate result during the election. Hence a framework for electronic voting machine based on biometric identification to authenticate and voting can be used. The candidate’s identity shall be verified through this process by comparing the fingerprint of the candidate with the pre-stored image in the database. The vote is validated only if both the acquired and the pre-stored fingerprint image matches. Hence only true voters are allowed to vote. The Electronic voting machine is coded and then the hex file is dumped in the microcontroller. When the voter enters his/her vote the fingerprint is verified and then the vote is entered. Keywords - EVM, Fingerprint , Biometrics, fingerprint module. I. INTRODUCTION Voting is a method to conduct the election in which the electorates are selected as their representative. Before election the transport system is maintained properly in order to avoid unwanted situations while transferring the voting machines. The official government works in the major public sectors are stopped during the election...

Words: 1345 - Pages: 6

Free Essay

Interactive Media Web Authoring

...Interactive Media Web Authoring Developing a news portal application 2011/2012 2HND2I Kurt Massa Table of Contents Table of Contents ................................................................................................................................ 1 Section 1.................................................................................................................................................. 3 Section 2.................................................................................................................................................. 4 Analysis, Design and Implementation ................................................................................................. 5 Content Management Systems....................................................................................................... 5 Blog ................................................................................................................................................. 5 Site Vs Portal ................................................................................................................................... 5 Open Source Software Content Management Systems ................................................................. 5 Software Used ................................................................................................................................. 6 WCM-P3.2 ...........................................................................

Words: 3026 - Pages: 13

Premium Essay

Development of an E-Commerce Website for Abc Corporation

...competitiveness. Designing a custom e-commerce online store on their current website, that is tailored to ABC’s goals and customer needs, is key in attracting and maintaining a customer base, and increasing profitability. The business problem to be solved is how to implement, market, and maintain a successful e-commerce site while building customer loyalty, increasing profitability, improving strategic planning, and expanding the market. ABC will use an outside source to develop, produce and maintain this store. There will be reporting systems in place to analyze data, in-turn allowing management to predict future trends. ABC will use these reports to continue to increase revenue and market to current and potential customers, increasing customer database and loyalty, and profitability. Company Background ABC has been in business for 15 years as a local clothing shop in Chicago, IL. They are a successful privately-owned company, selling young fashion...

Words: 2619 - Pages: 11

Premium Essay

Cloud Computing

...Overview of Amazon Web Services December 2010 Amazon Web Services Overview May 2010 Introduction Managing the unique and groundbreaking changes in both technology and business over the past decade has created an ongoing IT infrastructure challenge for many senior technology executives. Indeed, over the past 10 years, the typical business application architecture has evolved first from a desktop-centric installation, eventually to client/server solutions, and now most prominently to loosely coupled web services and service-oriented architectures (SOA). Each of these evolutionary steps has built upon the previous while adding new challenges, dimensions, and opportunities for IT organizations and their business partners. Recently, virtualization has become a prevalent and widely accepted way to reduce operating costs and increase the reliability of enterprise IT. In addition, concepts such as grid computing make possible a whole new class of analytics, data crunching, and business intelligence tasks that were previously cost- and time-prohibitive. Along with these technology changes there have also been fundamental changes in how markets work, with the speed of innovation and product introductions increasing at an unprecedented rate. Taken alongside the wide acceptance of Software as a Service (SaaS) offerings, all of these concepts have inspired the latest turn in the IT infrastructure challenge: cloud computing. Amazon Web Services (AWS) provides a flexible, cost-effective...

Words: 4330 - Pages: 18

Premium Essay

Unit 4 Discussion

...and Outcomes * You will be able to explore how a Linux system can get compromised. * You will examine ways in which a well-secured Linux filesystem can mitigate risks. Assignment Requirements The Apache Software Foundation (ASF) is a reputable open source foundation that has a history of developing and maintaining many open source products, including the Apache Web Server. In April 2010, the ASF discovered that their server hosting issue-tracking software was “hacked.” You can read a report on the incident on the following Web link: * https://blogs.apache.org/infra/entry/apache_org_04_09_2010 This report documents how a vulnerability was exploited, which solutions worked, which didn't work, and the measures planned by the Apache Infrastructure Team to mitigate future risks. Security is a layered process. Although the hackers took advantage of a vulnerable third-party Web application to gain root access to ASF’s Linux infrastructure, you need to focus on the layers of security that worked and failed on the Linux infrastructure, and how this vulnerability could have been avoided with a more secure Linux server. Discuss how the hackers took advantage of the JIRA daemon. What role did Pluggable Authentication Modules (PAM) play in this process? What are the security measures that you would recommend to mitigate such risks in the future? Participate in this discussion by engaging in a meaningful debate regarding the role of the JIRA daemon and PAM in the system breach...

Words: 1568 - Pages: 7