Question: Challenge: You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about

Challenge:
You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about defense-in-depth and layered security. You need to create a network diagram that shows how best to defend against intruders stealing customer secrets from the database. The network diagram must include the following:
    • A node donating the internet (usually a cloud symbol)
    • Web Server (a reverse proxy)
    • Application Server
    • Email Server
    • DNS Server
    • Database Server
    • Employee Workstations (can be a single node)
However, one-hundred percent security is incredibly rare if just impossible. All computer networks suffer from at least a few vulnerability issues at all times. Please explain how your diagram prevents stealing customer secrets from the database for the following:
    • The web server suffers from misconfiguration and an attacker was able to get access to the server.
    • The application server is using known vulnerable software that has given the attacker root access.
    • An employee has opened a malicious attachment and has opened a backdoor on their workstation.
    • The DNS server is vulnerable to cache poisoning allowing an attacker to misdirect traffic.
    • The attacker has infiltrated the network and has created a man-in-the-middle listening to network traffic.
    • The database server itself has an escalation vulnerability allowing an attacker to get admin access to the database.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!