Question: Challenge: You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about

 Challenge: You are tasked with designing a company network that must

Challenge: You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about defense-in-depth and layered security. You need to create a network diagram that shows how best to defend against intruders stealing customer secrets from the database. The network diagram must include the following: A node donating the internet (usually a cloud symbol) o Web Server (a reverse proxy) o Application Server o Email Server DNS Server o Database Server o Employee Workstations can be a single node) However, one-hundred percent security is incredibly rare if just impossible. All computer networks suffer from at least a few vulnerability issues at all times. Please explain how your diagram prevents stealing customer secrets from the database for the following: The web server suffers from misconfigura- tion and an attacker was able to get access to the server. The application server is using known vul- nerable software that has given the attacker root access. An employee has opened a malicious at- tachment and has opened a backdoor on their workstation. o The DNS server is vulnerable to cache poi- soning allowing an attacker to misdirect traffic. o The attacker has infiltrated the network and has created a man-in-the-middle listening to network traffic. The database server itself has an escala- tion vulnerability allowing an attacker to get Challenge: You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about defense-in-depth and layered security. You need to create a network diagram that shows how best to defend against intruders stealing customer secrets from the database. The network diagram must include the following: A node donating the internet (usually a cloud symbol) o Web Server (a reverse proxy) o Application Server o Email Server DNS Server o Database Server o Employee Workstations can be a single node) However, one-hundred percent security is incredibly rare if just impossible. All computer networks suffer from at least a few vulnerability issues at all times. Please explain how your diagram prevents stealing customer secrets from the database for the following: The web server suffers from misconfigura- tion and an attacker was able to get access to the server. The application server is using known vul- nerable software that has given the attacker root access. An employee has opened a malicious at- tachment and has opened a backdoor on their workstation. o The DNS server is vulnerable to cache poi- soning allowing an attacker to misdirect traffic. o The attacker has infiltrated the network and has created a man-in-the-middle listening to network traffic. The database server itself has an escala- tion vulnerability allowing an attacker to get

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!