Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4:01 Back TNE80006+Secure+Net... Project Scenario Il 4G Q Sydney Fashion Day is a department store chain which is evolving in textile market due to

image text in transcribed

4:01 Back TNE80006+Secure+Net... Project Scenario Il 4G Q "Sydney Fashion Day" is a department store chain which is evolving in textile market due to its trend setter clothing products. The company has recently decided to host a web server in their network to account for an online shopping portal in order to cater increased demand for products and to strengthen its market. The company deployed a flexible, popular and open source http server - Apache 2.0, which can also make use of server-side scripting tools so as to facilitate dynamic web contents, on a CentOS Linux Server. The implementation was carried out by a system administrator trainee who had a very little understanding about server and network security. As part of testing he connected the web server to the internet and after a few days of monitoring he noticed that someone from a trusted IP address has been conducting TCP scans on the network. So, the company is worried that someone might be planning to attack the web server in the near future. As a senior network systems administrator, your task is to propose a secure solution by implementing and configuring appropriate security tools so as to secure the server and network from potentially malicious activities. The company's CIO requires your solution design to cover below requirements: Implementing Mod Security with rules in place to protect the apache web server against SQL injection and Cross site scripting. (ModSecurity rules must be configured and included in the device configuration summary table.) Identifying at least 6 possible threats towards the CentOS Linux Server. You must also provide solutions to those threats. Identifying at least 6 threats towards the Apache web servers (other than SQL injection and Cross site scripting which is part of the first requirement). You must also provide solutions to those threats. Identifying at least 4 threats towards the network and protecting the network by implementing security solutions Including at least one test machine in your design to be able to test your security design. Note: As this project is strictly based on securing the web server and the network, you are not required to implement any programming aspects of the server which is Web Development team's job. You must include your name and student ID on the main page of your website Project Report Structure You are required to document a report that contains the following information. Introduction A brief discussion on the given scenario and identification of possible threats this web server and the network might be vulnerable to. Network drawing A logical diagram showing the CentOS Linux server and test machines in your network. Design Discussion

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networking A Top-Down Approach

Authors: James F. Kurose, Keith W. Ross

5th edition

136079679, 978-0136079675

More Books

Students also viewed these Computer Network questions

Question

c. What is the most likely value for X?

Answered: 1 week ago