Topic > Intrusion Detection Systems

The software used on servers can play a role in their security. Unverified and inauthentic software can be full of loopholes that can be exploited to gain access to the system. All software should be obtained only from official software repositories that can be verified via PGP signatures. (Peltier, 2016). Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get Original Essay The development team must strictly use a different web server to test the phone. This is considered industry best practice that should prevent cases of attacks caused by untested code. Therefore, there is no need to test or debug on a production server. Using application scanners will ensure that all internally developed code has been validated and does not enter production environments. Servers and their operating systems should always remain up to date. This will prevent attackers from using a newly discovered bug to gain access to the system. This will require you to stay abreast of developments as manufacturers usually release patches shortly after a bug is discovered. (Peltier, 2016). Intrusion detection systems can ensure that attacks are discovered early enough. Early warning can help minimize the damage done to a system by identifying threats early enough and neutralizing them accordingly. An intrusion detection system will be set up to monitor logs, processes and any sensitive directories. They will then alert the administrator to any unusual activity taking place. Services should only come from accounts with the minimum privileges needed for the service. This will ensure that any attacker cannot use the privileges of the said account to gain further access to the server. (Peltier, 2016). Server redundancy will occur with the Cincinnati data center acting as a failover to the Atlanta data center. With backups, restores will only happen up to the restore point and this can result in data loss. To avoid this, you can use a service such as Windows Distributed File System (DFS) to replicate data to replica servers. This will be from the Atlanta data center to the Cincinnati data center. Local replication of data within the data center is not recommended and therefore the Cincinnati office will be the secondary data center. (Peltier, 2016).Wireless technologies. While each location will have its own LAN, the two locations in Cincinnati and Atlanta will be connected via VPN (virtual private network). While previously businesses used WAN to connect to different offices, VPN provides a better solution that can use the Internet to establish site-to-site connection. They are also secure enough to be used by employees when they are away from offices. Considering that information must always be moved at 50 Mbps, the VPN will prove to be a better solution than a WAN. The VPN solution is also cheaper as it can use a single line for each office and this will result in lower broadband costs. Wi-Fi technology can be used for the LAN network of individual offices. (Cassidy, 2016). Please note: this is just an example. Get a custom paper from our expert writers now. Get a Custom Essay High Availability Solutions It is important that access to systems is not interrupted. This will require implementing appropriate measures for high availability. With database servers in both data centers, database mirroring will be used to ensure high availability. This solution uses software to manage a database, 2016).