Client And Server Security Essay

5360 words - 22 pages

Table of Contents
Project Outline 3
Security Requirements 4
Perimeter Security 5
Client and Server Security 10
Database Security 10
Server Security 12
Wireless and Remote Access Security 15
Security Configuration Management 19
References 23

Project Outline
Tiger Tees is a medium sized business with 4 locations across the eastern United States. This company produces and sells t-shirts for school systems, both locally and across the country via the internet. The organization’s headquarters is located in Beckley, West Virginia, and employs 25 people. The departments include the warehouse, human resources, accounting, sales, and administration. The second location of Tiger Tees ...view middle of the document...

The server segment will consist of a database server, human resource server, accounts payable/accounts receivable server, and an application server. The web/email server will be segmented from the other portions of the network using a DMZ. The servers will be secured in a locked server room to prevent physical access by unauthorized personnel. The internet facing portion of this network will be the greatest security concern due to outsider attacks. This segment will be protected by a router, a firewall, and an intrusion detection system. There will be a wireless access point on this network, and this is also a point of concern. Security will come from the settings on the wireless router. The server set identifier or SSID is an alphanumeric character that is used to identify wireless workstations attempting to connect to the network. The information sent across this wireless network will also be secured using Wired Equivalent Privacy or WEP (Microsoft, 2012).
The office located in Columbus, Georgia, Washington, DC, and Richmond, VA, all have small networks that are connected to the virtual private network. All data that is stored from these locations is stored on the servers located in Beckley, WV. These networks are connected to the VPN using a router. An enterprise firewall working with a router secures the networks. Each of these networks also has an intrusion detection system in place (SANS, 2012).  

Perimeter Security
Network perimeter security requires both function and policy to secure the perimeter of the network. The perimeter of the network is the segment that is internet facing, and has data flowing in and out of the network. This perimeter must be protected against outsider threats and attacks. There are hardware applications that will be in place to ensure that the maximum amount of security is in place while still allowing for network usability.
The most commonly used security measure of this network is the firewall. This application firewall will work be checking IP packets that flow in and out of the network. When the firewall finds that an IP packet does not meet security policy, the IP packet is blocked. If all packets that pass through a firewall are examined it can create a bottleneck on the network slowing down performance drastically. Policy can help alleviate this bottleneck by using policy to determine which packets to inspect. Some examples of these rules are:
• All packets traveling from a public interface to a private interface shall be inspected.
• All packets traveling from a private interface to a public interface shall be inspected.
• Packets traveling from a private interface to a private interface shall not be inspected.
• Packets traveling from a public interface to a public interface shall not be inspected.
These firewall policy rules allow the firewall to inspect the packets that are the biggest threat to the network without inspecting internal traffic. There are also allow, deny policy that will...

Other Papers Like Client And Server Security

Unit 2 Dhcp and Dns Essay

664 words - 3 pages ITT-TECH Institute Hanover, MD Configuring and Maintaining the DHCP and DNS Server Roles Unit 2 Jovanny Avelino Client-Server II NT1330 Professor Arthur VIII Due: 3/21/2016 DHCP: DHCP is a standard protocol that make TCP/IP network configuration much easier for the administrator by dynamically assigning IP addressing and providing additional configuration information to DHCP clients automatically. DHCP configuration information

Ftp & Sftp Essay

1781 words - 8 pages transmissions, but we must consider how encryption and decryption will affect the time consumed to complete file or data transfer between the server and the client. * ------------------------------------------------- FTP and SFTP speed: * ------------------------------------------------- To secure any information, the price for the security should be paid, and the price for file transfer security is the time. The encryption of username

Week 7 Lab

669 words - 3 pages accounting protocol and later brought into the Internet Engineering Task Force (IETF) standards. Because of the broad support and the ubiquitous nature of the RADIUS protocol, it is often used by ISPs and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. These networks may incorporate modems, DSL, access points, VPNs, network ports, web servers, etc. RADIUS is a client/server protocol

Cis: Network Design Paper

1188 words - 5 pages other server can come into picture and handles the requests. Reference Agarwal, B. B., & Tayal, S. P. (2009). Computer network. New Delhi: University Science Press. Gallaugher, John. (1996). The critical choice of client server architecture: A comparison of two and three tier systems. Retrieved from https://www2.bc.edu/~gallaugh/research/ism95/cccsa.html Indiana University (2015). Best practices for computer security. Retrieved from

Windows Operating System Upgrade for Riordan Manufacturing

3911 words - 16 pages early in 2000. Tentatively labeled “NT 5” during development, Windows 2000 Server targets organizations that operate in a client-server environment (Miles, 1999). In 2000 Server, Microsoft improved on the Windows NT systems in a variety of ways. Plug and play support was one of the new features in this release, as was the heightened security enabled by the Kerberos 5 security protocol. Two new files system types were also supported FAT 32, and

Research Assignment Part 1

841 words - 4 pages 2003? The differences between Windows Server 2003 and Windows Server 2008 are that 2008 has Visualization management. In Windows Server 2008, has new features and technologies these technologies help with reducing the power consumption of server and client operating systems, Which helps increase server efficiency and help lower environmental byproducts.  Microsoft Windows Server 2008 was designed with Energy Efficiency at the top of the

Securing Sql Server

1297 words - 6 pages authentication. Certifications are used to enforce object and network connection security. Application security includes writing secure client applications. SQL Server also has Security tools, Utilities, Views and Functions to bolster SQL Server security. These include: SQL Server Management Studio Sqlcmd Utility SQL Server Configuration Manager Administer Servers by Policy-Based Management Rskeymgmt Utility (SSRS) SQL Server also uses

Installing Windows Server Networking

737 words - 3 pages to ensure they choose the right operating system. Below is a list of several server roles available in installing Windows Server 2008 R2. Active Directory Certificate Services (AD CS) provides customizable services for creating and managing public key certificates used in software security systems employing public key technologies (Microsoft, 2014). Active Directory Domain Services (AD DS) provide secure, structured, hierarchical data storage for

Building Blocks of Design

906 words - 4 pages multiple servers throughout an organization. First you have the Edge Transport Server Role which establishes perimeter security by providing antivirus and antispam message protection. Then you have the Client Access Server Role which provides user connectivity and also manages MAPI (like outlook) and makes it so the client never has to connect directly to the mailbox server. Also we have the Hub Transport Servers which routs mail, this server has

It 240 Appendix B

643 words - 3 pages peer to peer is security and it can slow down a system if they are sending and receiving a lot of information from other users. You are the administrator of a client-server environment. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component of a typical client/server environment.

Research Assignment 1

1188 words - 5 pages -v support however. As with all of these OS, the prices reflect the roles and features of each one ranging from $470 per server all the way up to $3,000 per processor. The phrase 64-bit was big when it came to the Nintendo 64 gaming system and it is still a popular technology. Server 2008 takes advantage of the memory addressability, the parallel processing, the faster bus architecture and the security advances. Not all businesses can just jump

Related Essays

Implement A Vpn Tunnel Between A Microsoft Server And Microsoft Client

653 words - 3 pages allocated for the remote VPN client pool? The IP host range that was set up for the VPN had three IPs from 172.30.0.20 to 172.30.252 3. How many encryption settings are available from the remote access server? Which one is the best? Which one provides backward compatibility? There were three different encryption settings. They are Basic Encryption (MPPE 40-bit), Strong Encryption (MPPE 56-bit), and Strongest encryption (MPPE 128-bit). The

Web Design Essay

2415 words - 10 pages must enforce its own security process. Since the relational databases can be accessed from a number of different clients, each database must also enforce its own security process. Due to more complex client applications, the size of the application increases; the client hardware platform has to increase in terms of processing power and memory. In addition, as the number of users accessing the database increases, the server hardware platform

Unit 1 Net+ Essay

1105 words - 5 pages require central file server the client-server can also be expensive to implement. It provides a level of access to client’s better security, more stable and can be scaled as much as it needs to be. With a peer-to-peer the peer acts as both service provider and server to consumers. The security handled by end users which makes it very vulnerable. But it mainly can suffer in performance as the number of nodes increase. 4. Describe two

12345 Essay

827 words - 4 pages length for a Windows Server 2008 computer name is 65 characters. The __Active Directory Federation Services_ server role is used to manage security tokens and security services for a Web-based network. 9. Your company plans to purchase and implement 21 new servers in the next few months and then add 10 more over the next year. You want to make a case for using Windows Deployment Services. Which