Free Essay

Server Side Security Unit 1 Individual Project

In:

Submitted By NTGEDDRY70
Words 597
Pages 3
Server Side Security Unit 1 Individual ProjectRunning head: SERVER SIDE SECURITY UNIT 1 IP

Server Side Security Unit 1 Individual Project
American Intercontinental University
IT465-1102B-02: Intrusion Detection and Prevention for Windows Security
June 12, 2011

Basic Server Security The four basic necessities of server security include antivirus, strong passwords, firewalls, and critical updates. Antivirus software prevents infiltration and/or stops an attack completely. It will check a set of coding against a database of virus codes. It is important to use a well stocked virus database source. Strong passwords are typically ten to fourteen characters in length, a mix of numbers, symbols, upper, and lower cases lettering. Patterns, names, and identifiable information should be avoided (HostingHelpers, 2008). Critical updates include receiving security updates from an online source. These are done in forms of patches and/or updates that will correct coding, fix exploitable code, and a wealth of other things. These are vital to working with several applications. Firewalls are able to block unwanted traffic. These can help with security and keep random connection attempts form using up server and system resources (HostingHelpers, 2008).
Firewalls
Firewalls are very resourceful. Depending on the size of the company and users, choosing the correct firewall can be critical. There are many firewalls out there and companies that produce them both freely and paid. You can utilize small office/home office (SOHO) firewalls, single machine firewalls, medium–sized network firewalls, or Enterprise firewalls (Easttom, 2006). Medium-sized companies are usually 25 to several hundreds of users. All of these users are on a LAN in a single location. For this type of company you can utilize the Check Point Firewall-1 or Cisco PIX 515E. For Enterprise you can use the Fortigate 3600 (Easttom, 2006).
Advantages:
Firewall-1: * Works with multiple OS’ * Combination of application gateway and SPI or Stateful Packet Inspection * Common DoS techniques are protected against
Cisco PIX 515E: * SPI filtering * Robust built-in encryption * Product training is readily available * NAT is included * Multimedia security options and VoIP are included
Fortigate 3600: * User authentication and SPI is offered * Built-in virus scanning, IDS, and encryption * Extensive content filtering * 24-hour update service
Disadvantages:
Firewall-1: * Cost * Dependent upon underlying operating system security * Requires moderate skill to configure and administer
Cisco PIX 515E: * Cost * Moderate administrative and configuring skill required
Fortigate 3600: * Trained personnel are required * Service contracts range in the several thousand’s as well as the firewall costing up to and surpassing $20,000 depending on model (Easttom, 2006).
Windows Server Security WIN Server Security includes Windows Monitoring and Windows Application Monitoring. The areas of interest are: * Optimal resource usage and servers are up and running * Failure bound resources recognition capabilities * Capacity planning and inventory management * Windows Monitoring and a robust set of WIN applications (ManageEngine, 2011). Some of the process includes CPU utilization, Disk utilization, Memory utilization, Process Monitoring, Windows Service Monitoring, Network Interface Monitoring, Windows Event Log Monitoring, Windows Performance Counters, and more. This will help to see if the CPU’s are running to potential and capacity, notification of low memory, disk space notification, process failure notification, critical process monitoring, do this in WMI mode, health and status of network interface monitoring, monitor events generated, and performance counter values (ManageEngine, 2011).

References Easttom, C. (2006). Network defense and countermeasures. Upper Saddle River, NJ. Pearson Prentice-Hall. HostingHelpers. (2008). The basics of server security. Retrieved June 12, 2011, from http://www.hostinghelpers.com/articles/the-basics-of-server-security/ ManageEngine. (2011). Applications manager. Retrieved June 12, 2011, from http://www.manageengine.com/products/applications_manager/windows-monitoring.html

Similar Documents

Premium Essay

Web Application

...Chapter – 1 INTRODUCTION The world as we know it today is centered on the workings and ability of the World Wide Web. Internet security, however, is one area of concern and poses one of the biggest challenges to this internet savvy era. Our interaction with the internet has increased to such an extent , that experience, mixed with continued research has taught us that with each such interaction, we are prone to many malicious attacks, security lapses and even extremely skilled hacking operations. The field of Network Security and Cryptography has come a long way in the past decade, but it is safe to say that there is a lot more work to be done. Here we choose to concentrate on Web Applications and we particularly approach them from the developer’s perspective. With every step taken towards better security on the internet, end-users are doing their bit to safeguard their systems and data. However, keeping in mind how commercial and competitive the world we live in has become and the manner in which the market for web related products has grown, it becomes imperative for a developer to ensure that his web application is not just marketable as a breakthrough user friendly concept but also as a secure one. We imagine a world where, every skilled developer is able to make phenomenal applications and is able to provide his users with a large amount of credibility and reliability in terms of security. We aim to conceptualize and subsequently generate a security tool exclusively...

Words: 6435 - Pages: 26

Premium Essay

Richdash

...|ELECTRONIC BUSINESS | | | |STUDY GUIDE FOR | |INYM 225 MEC | |*INYM225MEC* | |FACULTY OF COMMERCE AND ADMINISTRATION | |MAFIKENG CAMPUS | Study guide compiled by: Ms S.T. Nthutang Instructional Design by Mrs Annelize Cronje,Senior Academic Development Advisor, ADC Page layout by Roxanne Bremner, Academic Development Centre Printing arrangements and distribution by Department Logistics (Distribution Centre). Printed by Nashua Digidoc Centre (018) 299 2827 Copyright ( 2014 edition. Date of revision 2016. North-West University, Mafikeng Campus. No part of this book may be reproduced in any form or by any means without written permission from the publisher TABLE OF CONTENTS Module information vii Study guide title: Electronic Business vii Module qualification:...

Words: 8803 - Pages: 36

Premium Essay

Network Administrator

...Re-use: "This task contains portions of material that were originally submitted during [1/6/2013 -2/12/2013] in [IT401-1301A] with [Kay N. Crook]." Re-use: "This task contains portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 ...

Words: 4303 - Pages: 18

Free Essay

Digital Marketing

...CHAPTER 1 INTRODUCTION 1.1 OVERVIEW OF ONLINE SHOPPING ONLINE SHOPPING is a web-based application Software Developed in IMB WEBSPHERE using JSP as front end on Pentium machine. The main aim of Online Shopping is to improve the services of Customers and vendors. It maintains the details of customer payments, product receipts, addition of new customers, products and also updating, deletion for the same. It also stores the details of invoices generated by customer and payments made by them with all Payments details like credit card. The primary features of online shopping are high accuracy, design flexibility and easy availability. It uses database tables representing entities and relationships between entities. 1.2 OBJECTIVE OF ONLINE SHOPPING The system is capable of maintaining details of various customers, vendors, Products and storing all the day to day transactions such as generation of shipment address bills, handling customers and product receipts, updating of stores The central concept of the application is to allow the customer to shop virtually using the Internet and allow customers to buy the items and articles of their desire from the store. The information pertaining to the products are stores on an RDBMS at the server side (store). The Server process the customers and the items are shipped to the address submitted by them. 1 The application was designed into two modules 1. Buy module 2. Database module The Buy module is used for the customers who wish...

Words: 4558 - Pages: 19

Premium Essay

Test Paper

...The Necessity of Information Assurance 1 The Necessity of Information Assurance Adam Smith Student ID: Western Governors University The Necessity of Information Assurance 2 Table of Contents Abstract ........................................................................................................................................... 5 Introduction ..................................................................................................................................... 6 Project Scope .............................................................................................................................. 6 Defense of the Solution ............................................................................................................... 6 Methodology Justification .......................................................................................................... 6 Explanation of the Organization of the Capstone Report ........................................................... 7 Security Defined ............................................................................................................................. 8 Systems and Process Audit ............................................................................................................. 9 Company Background ................................................................................................................ 9 Audit Details ...........................

Words: 12729 - Pages: 51

Free Essay

Project

...SECOND YEAR FINAL PROJECT COURSE CODE: 227 NAME: MUIGUA STEPHEN GITAU ADM NO: P15/54335/2012 SUPERVISOR: ERIC AYIENGA   DECLARATION I, Muigua Stephen Gitau, do declare that this project is my own work, and as per my knowledge, it has not been submitted to any other institution of higher learning. Student’s Name: MUIGUA STEPHEN GITAU Registration No: P15/54335/2012 Signature: _________________________________________________________ Date: _________________________________________________________ This project has been submitted as a partial fulfillment of requirements for the Diploma in Computer Science of the University of Nairobi with my approval as the University Supervisor. Supervisor’s Name: Mr. ERIC AYIENGA Signature: ___________________________________________________________ Date: _______________________________________________________________   ACKNWOLEDGEMENT I thank almighty God; I thank Nairobi University of Kenya in Conjunction with the School of Computing and Informatics for facilities and resources they availed during execution of this project. I take this opportunity to express my sincere appreciation to my supervisor Mr. Ayienga and the entire Faculty of Computer Science for the exemplary guidance, monitoring and constant encouragement throughout the course. Lastly, I thank my parents, for their constant support even as I worked over the night and throughout the week towards school and this project.   ABSTRACT ...

Words: 4782 - Pages: 20

Free Essay

Hul Ap

...and Challenges of Networking Technologies in Smart Grid Abstract— To make the existing power grid more responsive and intelligent, to incarporate fast emerging DERs, design a real-time pricing strategy and enable the customer to participate in the load reduction program effective communication technology is a primary need. This paper explore the communication opportunities in the HAN—one of the key components of SmartGrid. Keywords: HAN(Home Area Network), DER(Distributed Energy Resources), WSN(Wireless Sensor Network) I INTRODUCTION SmartGrid[1] will integrate the sensor technology, communication technology, alternate energy resources with electric power system, to enable the existing electric network with the abilities of self-healing, interaction, compatibility, integration.[4, 5].Conventional power systems areexperiencing transition from centralized supply side management to decentralized supply&demand side management due to power system restructuring and addition of distributed generations (DGs) with renewable power sources in the past two decades. Therefore load management in the new operating environment becomes more difficult[8]. Home Area Network (HAN) extends smart grid capabilities into the home using different networking protocols. HAN is an important component of the smart grid. It provides energy utilization for both customers and providers. Customers can remotely turnoff the devices based on the real time information from the provider. This enables...

Words: 3035 - Pages: 13

Free Essay

Network Design Proposal for Retail Technologies Corporation

...Introduction……………………………………………………………….....................................3 Customer Introduction……………………………………………………………………….........4 Organizational Goals …………......5 Organizational Constraints...............................................................................................................6 Technical Goals of Existing Network..............................................................................................7 Technical Constraints of Existing Network.......………………………………………………..…8 Existing Network Design Analysis...……………………………………………………………...9 Technical Goals of New Network Design...……………………………………………………..10 Technical Constraints of New Network Design.....……………………………………………...11 New Network Design Analysis, Including Security………………………………….............12-19 Implementation Schedule……………………………………………………………….......…....20 Testing of The New Network……………………………………………………………............21 Budget............................................................................................................................................22 Detailed Summary.........................................................................................................................23 Detailed Components and Parts Summary Page............................................................................24 Physical Topology of the WAN.....................................................................................................25 Diagram of the Old Network Design.........

Words: 5466 - Pages: 22

Premium Essay

Document

...TABLE OF CONTENT TABLE OF CONTENTS Title page Approval page i Dedication ii Acknowledgement iii Table of content iv Abstract viii CHAPTER ONE: INTRODUCTION 1.1 Introduction 1.2 Background of study 1.3 Statement of the problem 1.4 Objectives of the study 1.5 Scope of the study 1.6 Significance of the study 1.7 Limitation of the study 1.8 Definition of terms CHAPTER TWO: REVIEW OF RELATED LITERATURES 2.1 Introduction CHAPTER THREE: REVIEW OF RELATED LITERATURES 3.1 Introduction 3.2 System Analysis 3.2.1 Detailed Definition of the problem 3.2.2 Feasibility study 3.3 Method of Data Collection 3.3.1 Interview 3.3.2 Observation 3.3.3 Review of procedure manual or exiting system/procedure 3.3.4 Evaluation of Forms 3.4 Problem of Existing System identified in the present system 3.4. home -page 3.4.2 Student’s Registration 3.4.3 Administrator’s page 3.5 Data Preparation 3.6 User Preparation 3.7 Objectives of the New design 3.8 Program Structure 3.8.1 Modularity 3.8.2 Top-down Program Design 3.8.2.1 Program Flowchart 3.9 System Flowchart 3.10 File Maintenance Module 3.11 Main Menu Specification 3.11.1 Output Specification 3...

Words: 3789 - Pages: 16

Premium Essay

Infrastructure and Systems Implementation Plan

...Infrastructure and Systems Implementation Plan Sabrenna Anderson Kaplan University Primary Contact | Name | Rosanne Moran | | Phone | 732-930-3800 | | Email | rmoran@wint.net | Backup Contact | Name | Sabrenna Anderson | | Phone | 732-656-3575 | | Email | sanderson@wint.net | Proposal Type | Idea To Be Explored Potentially Identified Solution | Project Type | New Project Enhancement to Existing or Former Project | Working Title of Project | Infrastructure and Systems Implementation Plan | Project Sponsors | WInt IT department, Rosanne Moran, IT Director. | ------------------------------------------------- ------------------------------------------------- Introduction Widgets International, Inc. currently consists of Widgets USA, LLC and Widgets-R-Us, LTD. Combined Widgets International, Inc. has 50 years of experience in providing function critical assembly and machinery solutions. WUSA has cornered the Business to Business market while WRU has grown in leaps and bounds in the retail market. Together as Widgets International, Inc., they stand to increase their market share substantially by creating and offering innovative and cost effective assembly solutions globally. (Anderson, Unit1, 2014) ------------------------------------------------- ------------------------------------------------- Purpose and Justification This proposal will explore the requirements for the application and implementation of an easily manageable information...

Words: 2927 - Pages: 12

Premium Essay

Cmit 495 Implementation Plan

...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed proposed...

Words: 13687 - Pages: 55

Premium Essay

Project Management

...[pic] [pic][pic][pic] [pic] | [pic]Building Websites - The Options This page uses modern project management strategies and tools[pic] to present the options for strategies and tools during various phases of a web system development project. |  |Site Map [pic]  About this site [pic]  Top of Form Search for word: [pic][pic][pic][pic][pic][pic][pic][pic][pic][pic] Bottom of Form [pic][pic][pic][pic][pic][pic][pic][pic][pic][pic] | |[pic][pic][pic][pic][pic][pic] |[pic]Introduction | | | | |Our approach to ensuring smooth web project creation depend| | |[pic] | |on a robust process[pic] and a solid product plan[pic]: | |[pic] |[pic] | |[pic]The Process | | |[pic] | |(Phase names in parentheses are from the Rational Unified | | | | |Process[pic]). | | | | |[Phase names in brackets are from the Project Memory | | | | |Jogger[pic]. | | ...

Words: 3855 - Pages: 16

Premium Essay

Security Management Plan

...IT 454 Security Management Plan Marshall Miller December 20, 2015 Table of Contents Section 1: Information Security Management 4 Intro to Organization 4 People 4 Physical Security 4 Training of Security 4 Information Technology Training 4 Technology 5 Project Manager Roles 5 Section 2: Security Program 6 Data Classification 6 Management Support 7 Hierarchy Reporting Structure 8 8 Section 3: Security Policies 10 Acceptable Use Policy 10 1. Overview 10 2. Purpose 10 3. Scope 11 4. Policy 11 5. Enforcement 13 6. Definitions 13 7. Implementation Date 13 Section 4: Security Policies 14 Risk Assessment 14 Quantitative Risk Analysis 14 Quantitative Risk Analysis 14 Methodologies 15 1. Transfer 15 2. Avoid 15 3. Reduce 15 4. Accept 16 Summary 16 Section 5: Controlling Risk 17 Administrative 17 Human Resources 17 Organizational Structure 17 Security Policies 18 Technical 18 Access Control 18 System Architecture 18 System Configuration 18 Physical 19 Heating and Air Conditioning 19 Fire 19 Flood 19 Summary 19 Bibliography 20 Section 1: Information Security Management Intro to Organization My organization is about a federally recognized business called JPPSO (Joint Personnel Property Shipment Office). JPPSO specializes in the shipping of military personnel goods. JPPSO works hand in hand with the United States Air Force to enforce the safe shipping of military household goods...

Words: 2755 - Pages: 12

Premium Essay

Btec Business Level 3 Unit 1 D1

...Task 1 : (LO1: 1.1, 1.2,1.3, M1 and D1) interim deadline (6 th October 2014) (Formative Assessment in Week 3) To create dynamic and static web pages scripting languages are used. Identify types of Scripting languages with examples. Which languages would you prefer for creating your Online store? Critically evaluate the functions and advantages of web applications. (200 Words) Scripting Languages: A high-level programming language that is interpreted by another program at runtime rather than compiled by the computer's processor as other programming languages (such as C and C++) are called scripting languages. These can be embedded within HTML, commonly are used to add functionality to a Web page, such as different menu styles, graphic displays or dynamic content. Type of Scripting Languages: There are two types of scripting languages, which are: I. Client Side Scripting II. Server...

Words: 2251 - Pages: 10

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71