First World Savings and Loan Bank will need to have a secure file storage server. Along with a secure web server, a database server. The bank will also need to provide layered security to ensure that its customers' confidential information is not compromised. This is an outline along with an executive summary to meet the needs. From my experience in the IT field and what I have learned during my training and from my own mistakes, a file server must have a powerful antivirus program installed along with a powerful firewall rules on the server. Furthermore, this antivirus program must work together with the other services on the network while providing protection when working with a Samba server. Furthermore, the antivirus program must be able to protect individual workstations. The network will need to have layered security for file servers running the Linux operating system. The antivirus program must protect the server in real time. Throughout my career in IT I have realized that having a strong firewall rule will allow and restrict users and only allow them to view their own data. Hackers or hacking programs will have difficulty manipulating or viewing data via the web interface. You will need to have access to various files on the file system. This will be accomplished via Network File System NFS which is accessed using Secure Socket Layer. NFS allows the remote user to mount a file system on a remote computer. The remote user will then be able to access any file on that remote file system. The server and client do not have to use the same operating system, but the client system must have an NFS-capable NFS client......middle of paper......approximately the client of this type of attack can gain unauthorized access to a database. ("DB Attacks", ) Another type of attack that can be used against a database is a user gaining another user write privilege. Social engineering is also another way unauthorized user can gain access. To combat these types of attacks, the administrator needs to train all users on different types of attacks. References Harutyunyan, G. G. (2011). [How to] Secure your SSH connection. Retrieved 05/23/2014 from http://linuxconfig.net/manual-howto/how-to-securing-ssh-connection.htmlRhodes, T. (2014). Security TC wrapper. In safety. Retrieved from http://www.freebsd.org/doc/handbook/tcpwrappers.htmlRouse, M. (2005). SSH. Retrieved from http://searchsecurity.techtarget.com/definition/Secure-ShellTop 10 Database Attacks. (). Retrieved from http://www.bcs.org/content/conwebdoc/8852
tags