Project #58550 - Linux server security assignment

 

Assignment 3

 

Each question should be answered in no more than 350 words.

 

 

 

1. As the Linux system administrator of insurance company Secure All, Inc., you need to design firewall rules for the organization's bastion host file server, which uses Samba. This server is located in the local area network (LAN) with the network address 172.16.0.0/12 and subnet 255.240.0.0. The server should also allow Web application access for its online transaction platform to mount the filesystem. The Web application resides on the Web server located in the demilitarized zone (DMZ). This server has two interface cards. One card, which is for the traffic from the DMZ firewall, is linked to the wide area network (WAN). This card's IP address is 192.168.1.5. The other interface card has the IP address 172.16.1.5 and is linked to the LAN.

 

Which firewall rules should be written using iptables for the server hosting Samba? Discuss and suggest firewall rules to allow administrators to remotely manage the server using SSH. Use the concept of "default deny" when designing the rules.

 

 

 

2.  Community-supported software refers to free software support offered in the open source community. On the other hand, vendor-supported software refers to paid software subscriptions provided by a vendor. Organizations providing Linux support may or may not make money for providing the support.

 

Many open source software users do not pay for Linux support and instead use forums, mailing lists, and Internet Relay Chat (IRC) to find solutions to a problem. This free "community support" is quite popular for keeping the software updated and addressing configuration and production issues.

 

Discuss the pros and cons of Linux support provided by the community and by vendors. What are the situations where an organization may consider subscription-based support or community-based support and why?

 

 

 

3. As the Linux system administrator for First World Bank Savings and Loan's proposed Linux-based infrastructure, it is imperative that you take a backup of the "right" data, keep the data safe, and restore the data when the need arises.

 

Discuss a suitable backup plan considering the different servers of the organization. In your plan, include suggestions for verifying backups with periodic restores.

 

Answer the following questions:

 

What is the critical data from each server in the infrastructure that requires a backup?

 

Will it be necessary to encrypt backup data?

 

How often do you need to take the backup of the data?

 

Where will you store the backup data?

 

How often will you verify the backups?

 

 

 

 

 

Subject Computer
Due By (Pacific Time) 02/21/2015 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy