Network Security for Desklib's Online Library | Desklib
Verified
Added on  2023/06/03
|11
|1250
|259
AI Summary
This report discusses network security for Desklib's online library, including vulnerabilities in CentOS and Apache web server. It provides solutions to threats such as DDoS attacks, SQL injection, and cross-site scripting. The report also includes a testing plan and references to helpful resources.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Masters of Network System
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.Introduction The company uses a web server Apache 2.0 in the CentOS Linux server. This web server displays the web contents of the organization. In this, junior network administrator trainee is don’t have that much knowledge about the network and server security. Then, later it was found that some trusted IP address did the TCP scans in the network. This is known later to the company team and they suspect that there is a chance of attacking the company network. In order to overcome from that attack, the company’s network admin needs to implement and properly use the security tools to prevent the server and network from the attacks and malicious activities. The SQL injection and cross-site scripting in the web server are overcome by using the tool Mod Security. Then, the threats regarding the centOS server need to find and also needs to produce the proper solutions for the possible threats. Then, the possibility of threats may occur in the Apache web server also needs to find and the solutions should provide to the threats. This report contains six threats regarding both Apache web server and CentOS Linux server1. Then, the threats may occur on the network needs to find and the proper methods and steps need to be taken to overcome those threats in the network. There are four threats in the network are considered in this report. Then, at last, one machine needs to be designed for the testing purpose to check the security design in the network. 'How To Install Linux, Apache, Mysql, PHP (LAMP) Stack On Centos 6 | Digitalocean' (Digitalocean.com, 2018) <https://www.digitalocean.com/community/tutorials/how-to-install-linux-apache-mysql-php-lamp-stack-on-centos- 6> accessed 17 October 2018.1 1
2.Network Diagram A simple logical network diagram is shown in the above snapshot. The SportClothes-IT- All is a department store chain. The web server is implemented on the network of the SportClothes-IT-All. The CentOS Linux server has the Apache 2.0 webserver2. The test machine is implemented on the network to check the vulnerabilities in the network, CentOS server and also in the Apache 2.0 Web server. The apache server is secured by implementing mod security. The mod security is installed by using the following commands in the CentOS. 2
Philip Hunter, 'Network Security Architecture Without Perimeters' (2002) 2002 Network Security.2 All mod-security rules are inserted in global Apache configuration. For configuring this first open the apache2 configuration file by using this command of /etc/apache2/apache2.conf. After that, restart the Apche2 server by the following command /etc/init.d/apache2 restart. 3.Design Discussion The CentOS server is used in the network design to provide required services to the network of the SportClothes-IT-All. The Web server of Apache 2.o is used to provide web services to the SportClothes-IT-All networks. The test machine used in the network is used to check the vulnerabilities of the network, Apache2 server and also the CentOS server. The cloud is representing the WAN network. By using this, the online shopping is implemented in the SportClothes-IT-All network. The vulnerabilities in the CentOS, Apache2 and the network is identified in order to secure the SportClothes-IT-All network. The network related threats are listed below ThreatsSolution Malicious threatInstall antivirus software to the system EavesdroppingUse encrypted data using data conversation. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Data breachesEncrypt the sensitive information. D-DOS attackUse firewall for controlling packet traffic The Apache2 server3related threats are listed below. NameSecurity measure DDosLimited the number of HTTP requests accepted from clients. TimeOut should be set short as the web server needs extra time to perform certain web requirements. ClickjackingImplement X-FRAME-OPTIONS in HTTP headers. There are three settings in the X-FRAME-OPTIONS such as sameorgin, deny and allow-from uri. Sameorigin : It display the page itself in a frame on same orgin. Deny: prevent the page display in the frame. Allow-from uri: It allow the page to display only on the indicated orgin. SlowLorisImplement Qos module Brute force attackEncrypt and decrypt the password. 4
M. Masoudifar, 'The Relation Between Apache II And Apache III Scores With Duration Of Mechanical Ventilation And ICU Stay' (2008) 33 Regional Anesthesia and Pain Medicine.3 Threats related to CentOS are given below. Ghost attack->reboot and update all of your Linux servers andFQDN variable not exit the determined number of characters. Ddos-> Limit the incoming IP address to SSHD from only know hosts SlowLoris-> Implement the QOS module to stop slowloris attacks. Brute Force attack->configure CentOS to drop packets from anyone but a trusted ip address. Set password authentication. Dictionay attack-> encrypt and decrypt the password. Disable all of theotherchecks it performs, such as minimum password length and character complexity. 5
4.Summary ofDevice configuration ThreatsAction/Tools for Mitigation Device Configured Commands Spectrum and meltdown Vulnerabilities TheSpectre and Meltdown Checker Scriptis used to check if the CentOS is vulnerable to Spectre and Meltdown Update Kernal CentOS4$ sudo sh spectre-meltdown-checker.sh $ sudo yum update Unused Services and Open Ports Service command is used to stop unused services CentOS$ sudo service nmbd stop nmbd stop/waiting $ sudo service smbd stop smbd stop/waiting service mysqld stop 'What Is Centos ? - Centos Blog' (CentOS Blog, 2018) <https://www.centosblog.com/what-is-centos/> accessed 17 October 2018.4 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5.Testing Plan There is no firewall6in the network. So, there is a chance to happen attacks. There are so manyunusedservicesandports.Theymustbestopped.TheCentOSalsohassome vulnerabilities like spectrum and meltdown vulnerabilities. The mitigation tools and actions are taken place to avoid vulnerabilities. The network is tested by using testing machine. The commands used to Prevent SQL Injection5and XSS using Blocking Rules by ModSecurity 'SQL Injection' (W3schools.com, 2018) <https://www.w3schools.com/sql/sql_injection.asp> accessed 17 October 2018.5 Products Services, 'Next-Generation Firewalls (NGFW)' (Cisco, 2018) <https://www.cisco.com/c/en/us/products/security/firewalls/index.html> accessed 17 October 2018.6 7
8
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser