logo

Network Security for Desklib's Online Library | Desklib

   

Added on  2023-06-03

11 Pages1250 Words259 Views
Masters of Network System
Network Security for Desklib's Online Library | Desklib_1
1. Introduction
The company uses a web server Apache 2.0 in the CentOS Linux server. This web server
displays the web contents of the organization. In this, junior network administrator trainee is
don’t have that much knowledge about the network and server security. Then, later it was found
that some trusted IP address did the TCP scans in the network. This is known later to the
company team and they suspect that there is a chance of attacking the company network. In order
to overcome from that attack, the company’s network admin needs to implement and properly
use the security tools to prevent the server and network from the attacks and malicious activities.
The SQL injection and cross-site scripting in the web server are overcome by using the tool Mod
Security. Then, the threats regarding the centOS server need to find and also needs to produce
the proper solutions for the possible threats. Then, the possibility of threats may occur in the
Apache web server also needs to find and the solutions should provide to the threats. This report
contains six threats regarding both Apache web server and CentOS Linux server1. Then, the
threats may occur on the network needs to find and the proper methods and steps need to be
taken to overcome those threats in the network. There are four threats in the network are
considered in this report. Then, at last, one machine needs to be designed for the testing purpose
to check the security design in the network.
'How To Install Linux, Apache, Mysql, PHP (LAMP) Stack On Centos 6 | Digitalocean' (Digitalocean.com, 2018)
<https://www.digitalocean.com/community/tutorials/how-to-install-linux-apache-mysql-php-lamp-stack-on-centos-
6> accessed 17 October 2018.1
1
Network Security for Desklib's Online Library | Desklib_2
2. Network Diagram
A simple logical network diagram is shown in the above snapshot. The SportClothes-IT-
All is a department store chain. The web server is implemented on the network of the
SportClothes-IT-All. The CentOS Linux server has the Apache 2.0 webserver2. The test machine
is implemented on the network to check the vulnerabilities in the network, CentOS server and
also in the Apache 2.0 Web server. The apache server is secured by implementing mod security.
The mod security is installed by using the following commands in the CentOS.
2
Network Security for Desklib's Online Library | Desklib_3
Philip Hunter, 'Network Security Architecture Without Perimeters' (2002) 2002 Network Security.2
All mod-security rules are inserted in global Apache configuration. For configuring this first
open the apache2 configuration file by using this command of /etc/apache2/apache2.conf. After
that, restart the Apche2 server by the following command /etc/init.d/apache2 restart.
3. Design Discussion
The CentOS server is used in the network design to provide required services to the
network of the SportClothes-IT-All. The Web server of Apache 2.o is used to provide web
services to the SportClothes-IT-All networks. The test machine used in the network is used to
check the vulnerabilities of the network, Apache2 server and also the CentOS server. The cloud
is representing the WAN network. By using this, the online shopping is implemented in the
SportClothes-IT-All network. The vulnerabilities in the CentOS, Apache2 and the network is
identified in order to secure the SportClothes-IT-All network.
The network related threats are listed below
Threats Solution
Malicious threat Install antivirus software to the system
Eavesdropping Use encrypted data using data conversation.
3
Network Security for Desklib's Online Library | Desklib_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Managing Services and Security
|19
|1665
|145

Installation and Configuration of Linux Virtual Machines for Managing Services and Security
|20
|1511
|489

Managing Services and Security
|16
|1893
|489

Threats and Mitigation Strategies for Apache Web Server and Centos Linux Server
|21
|3232
|291

Analysis of Security Vulnerability of WidgetsInc Virtual Machine Image
|23
|3636
|97

The Name of University
|9
|639
|17