Question: Challenge: You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about
Challenge: You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about defense-in-depth and layered security. You need to create a network diagram that shows how best to defend against intruders stealing customer secrets from the database. The network diagram must include the following: A node donating the internet (usually a cloud symbol) o Web Server (a reverse proxy) o Application Server o Email Server DNS Server o Database Server o Employee Workstations can be a single node) However, one-hundred percent security is incredibly rare if just impossible. All computer networks suffer from at least a few vulnerability issues at all times. Please explain how your diagram prevents stealing customer secrets from the database for the following: The web server suffers from misconfigura- tion and an attacker was able to get access to the server. The application server is using known vul- nerable software that has given the attacker root access. An employee has opened a malicious at- tachment and has opened a backdoor on their workstation. o The DNS server is vulnerable to cache poi- soning allowing an attacker to misdirect traffic. o The attacker has infiltrated the network and has created a man-in-the-middle listening to network traffic. The database server itself has an escala- tion vulnerability allowing an attacker to get Challenge: You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about defense-in-depth and layered security. You need to create a network diagram that shows how best to defend against intruders stealing customer secrets from the database. The network diagram must include the following: A node donating the internet (usually a cloud symbol) o Web Server (a reverse proxy) o Application Server o Email Server DNS Server o Database Server o Employee Workstations can be a single node) However, one-hundred percent security is incredibly rare if just impossible. All computer networks suffer from at least a few vulnerability issues at all times. Please explain how your diagram prevents stealing customer secrets from the database for the following: The web server suffers from misconfigura- tion and an attacker was able to get access to the server. The application server is using known vul- nerable software that has given the attacker root access. An employee has opened a malicious at- tachment and has opened a backdoor on their workstation. o The DNS server is vulnerable to cache poi- soning allowing an attacker to misdirect traffic. o The attacker has infiltrated the network and has created a man-in-the-middle listening to network traffic. The database server itself has an escala- tion vulnerability allowing an attacker to get
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
