Question: Part 2 ) CentOS 8 based web server running an API for credit card processing and has a database to store transactional data named C

Part 2) CentOS 8 based web server running an API for credit card processing and has a database to
store transactional data named C8Credit1
Windows 2012 file server named WFile1. This server also provided file storage for backups
from other servers.
Various printers, laptops, desktops, etc.
Summary of Security Breach
The hack attempted to gain access to the web server by logging into the WordPress
administrative console using a dictionary attack. They got lucky and scored the "Admin"
password.
After logging in, they tried logging in via FTP with the same credentials and got into the
Apache root folder. The company doesn't even need FTP as no one ever uses it.
In FTP, they found the information on the database server from WordPress's wpconfig.php
file.
In WordPress, they found the plugin info about how it connects to the credit card processing
system.
Due to the lack of any meaningful firewall, they were able to connect to the database server
and download the entire WordPress database.
They tried using ssh into the Apache server with the admin credentials which worked. From
there, they were able to ssh into the credit card processing server and find the MySQL server
installed for the credit card system. However, they did not even need to hack the system as
there was a backup directory that had the sql dump from the night before. They copied the
file over ssh.
After getting the 2 major databases, they left. They sold the data on the web for about $3 per
record and are now vacationing in a country without extradition.
Since then the admin password has been changed to something that no one can type due to
its length so they copy and paste it from a word doc that is shared on the file server.
Things your boss wants you to know about the project:
Although we have a substantial budget, money is a concern. When you are looking at
solutions, you should be able to justify why a specific solution is needed and compare it to
the next lower priced solution. If pricing is not easily accessible, make your best educated
guess.
We fully expect that the router, switches and Wi-Fi needs replacing. We want managed
devices to create the vlans to segment the network.
We fully expect that we probably need a few more servers. Instead of physical servers, we
are going to buy big beefy servers and virtualize everything. For now, your assignment is to
determine the virtual servers and not be concerned with the physical servers.
Part 2 ) CentOS 8 based web server running an API

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!