Create Network Topology to Protect Database
Your company just purchased a Dell server MD1420 DAS to use to store databases. the databases will contain all employee records and personal identified information (PII). You know that databases like this are often targets. The Chief Information Officer has asked you draft a diagram for the server and 3 connected workstations. The diagram must use proper UML icons.
– Research: network topology to protect database server (Google Term and click images)
– Create a diagram using proper UML icon, the protects the server and the 3 workstations.
– Include where Internet access will be located, firewall and other details. +500 WORDS
Network topology is the layout of different devices and technologies used to create a computer network. It can be divided into physical (hardware) and logical (software) components. An important part of network security involves designing a topology that will protect sensitive data from threats, while still allowing access to users who need it. In this case, the Chief Information Officer has requested a diagram for a server and three connected workstations which contain personal identified information (PII). The following UML-based diagram outlines one possible solution:
The main component of this design is the Dell server MD1420 DAS, which acts as the central hub for all data stored on it. A firewall is placed between the server and Internet gateway to provide additional protection against external threats such as hackers or malware. All traffic must pass through this firewall before reaching the Internet. On each side of the firewall are three workstations connected via Ethernet cables; these are used by employees to access databases stored on the MD1420 DAS server using secure authentication methods such as passwords or encryption keys.
Finally, all machines connecting with MD1420 DAS should have anti-malware software installed in order to mitigate any potential virus infections that could result in corruption or theft of sensitive data stored within its databases. Network monitoring tools should also be put into place so administrators are notified whenever new connections attempt to gain access into their network environment—this way they can quickly identify malicious activity and take appropriate action if necessary. This combined with regular patching and vulnerability scans helps ensure that no security holes exist within your network infrastructure which could lead hackers gaining entry into critical systems such as those containing employee records or other personal identifiable information (PII).