-
Essay / Intrusion detection systems
Software used on servers can play a role in their security. Unverified and inauthentic software may face vulnerabilities that can be exploited to gain access to the system. All software should only come from official software repositories that can be verified by PGP signatures. (Peltier, 2016).Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get an original test The development team must strictly use another web server to test the phone. This is considered an industry best practice that should prevent instances of attacks caused by untested code. As such, no testing or debugging should be performed on a production server. Using application scanners will ensure that all internally developed code has been validated and does not slip into production environments. Servers and their operating systems must remain updated at all times. This will prevent attackers from using a newly discovered bug to gain access to the system. This will require keeping abreast of developments, as manufacturers typically release patches shortly after a bug is discovered. (Peltier, 2016). Intrusion detection systems can ensure that attacks are discovered early enough. Early warning can help minimize damage to a system by identifying threats early and neutralizing them accordingly. An intrusion detection system will be configured to monitor logs, processes and any sensitive directories. They will then alert the administrator of any unusual activity taking place. Services must only come from accounts with the minimum privileges necessary for the service. This will ensure that no attacker can use the privileges of said account to gain further access to the server. (Peltier, 2016). Server redundancy will occur, with the Cincinnati data center serving as a failover to the Atlanta data center. With backups, restores will only take place up to the restore point, which may result in data loss. To avoid this, a service such as Windows Distributed File System (DFS) can be used to replicate data to replica servers. This will be from the Atlanta data center to the Cincinnati data center. Local replication of data within the data center is not recommended and as such the Cincinnati office will be the secondary data center. (Peltier, 2016).Wireless technologies. While each of the offices will have its own LAN network, the two offices in Cincinnati and Atlanta will be connected by a VPN (virtual private network). While businesses previously used WAN to connect to different offices, VPN offers a better solution that can use the Internet to establish a site-to-site connection. They are also secure enough to be used by employees when they are away from the office. With the requirement that information be transmitted at 50 Mbps at all times, VPN will prove to be a better solution than a WAN. The VPN solution is also cheaper because it can use a single line for each office, which will result in lower broadband costs. Wi-Fi technology can also be used for local networking in different offices. (Cassidy, 2016).Keep in mind: This is just an example.Get a personalized article now from our expert writers.Get a personalized essaySolutions for High AvailabilityIt is important that access to systems does not is not disturbed. This will require the, 2016).