NEW HERE? USE "AFORUM20" TO GET GET 20 % OFF CLAIM OFFER

UK: +44 748 007-0908 USA: +1 917 810-5386
My Orders
Register
Order Now

Creating a Network Topology to Protect Database

Create Network Topology to Protect Database Your company just purchased a Dell server MD1420 DAS to use to store databases. the databases will contain all employee records and personal identified information (PII). You know that databases like this are often targets. The Chief Information Officer has asked you draft a diagram for the server and 3 connected workstations. The diagram must use proper UML icons. - Research: network topology to protect database server (Google Term and click images) - Create a diagram using proper UML icon, the protects the server and the 3 workstations. - Include where Internet access will be located, firewall and other details. +500 WORDS
To prevent unauthorized access, both user authentication and device authentication should be implemented in order to grant appropriate permissions on who can view what data stored on the server. Additionally, an intrusion detection system (IDS) should also be installed on each machine in order to detect suspicious activity or attempts at gaining unauthorized access into private networks and systems containing PII information. Finally, all machines connecting with MD1420 DAS should have anti-malware software installed in order to mitigate any potential virus infections that could result in corruption or theft of sensitive data stored within its databases. Network monitoring tools should also be put into place so administrators are notified whenever new connections attempt to gain access into their network environment—this way they can quickly identify malicious activity and take appropriate action if necessary. This combined with regular patching and vulnerability scans helps ensure that no security holes exist within your network infrastructure which could lead hackers gaining entry into critical systems such as those containing employee records or other personal identifiable information (PII).

Sample Solution

Network topology is the layout of different devices and technologies used to create a computer network. It can be divided into physical (hardware) and logical (software) components. An important part of network security involves designing a topology that will protect sensitive data from threats, while still allowing access to users who need it. In this case, the Chief Information Officer has requested a diagram for a server and three connected workstations which contain personal identified information (PII). The following UML-based diagram outlines one possible solution: The main component of this design is the Dell server MD1420 DAS, which acts as the central hub for all data stored on it. A firewall is placed between the server and Internet gateway to provide additional protection against external threats such as hackers or malware. All traffic must pass through this firewall before reaching the Internet. On each side of the firewall are three workstations connected via Ethernet cables; these are used by employees to access databases stored on the MD1420 DAS server using secure authentication methods such as passwords or encryption keys.