Creating a Network Topology to Protect Database
Create Network Topology to Protect Database
Your company just purchased a Dell server MD1420 DAS to use to store databases. the databases will contain all employee records and personal identified information (PII). You know that databases like this are often targets. The Chief Information Officer has asked you draft a diagram for the server and 3 connected workstations. The diagram must use proper UML icons.
- Research: network topology to protect database server (Google Term and click images)
- Create a diagram using proper UML icon, the protects the server and the 3 workstations.
- Include where Internet access will be located, firewall and other details. +500 WORDS
To prevent unauthorized access, both user authentication and device authentication should be implemented in order to grant appropriate permissions on who can view what data stored on the server. Additionally, an intrusion detection system (IDS) should also be installed on each machine in order to detect suspicious activity or attempts at gaining unauthorized access into private networks and systems containing PII information.
Finally, all machines connecting with MD1420 DAS should have anti-malware software installed in order to mitigate any potential virus infections that could result in corruption or theft of sensitive data stored within its databases. Network monitoring tools should also be put into place so administrators are notified whenever new connections attempt to gain access into their network environment—this way they can quickly identify malicious activity and take appropriate action if necessary. This combined with regular patching and vulnerability scans helps ensure that no security holes exist within your network infrastructure which could lead hackers gaining entry into critical systems such as those containing employee records or other personal identifiable information (PII).