unit_1_p2b_tech_7350_security_trends

unit_1_p2b_tech_7350_security_trends - TECH 7350 Managing...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 1 Unit 1 - Part 2B: Part 2B: Security Trends Security Trends 2 What’s better than 2-Tier Network? ± Answer: Three-tier architecture: ² For companies with credit card information or a bank will need Three-tier architecture 3 3-Tier Architecture Purpose ± Presentation Tier - Server farm that presents web pages to customers and accepts requests ± Business Tier - Business logic lives and the actual processing of data and requests ² Black Box or Middle Man level where no information passes from Tier 1 directly to Tier 3 – Middleware software) ± Back-end databases – no request comes directly to this tier without going through two firewalls, and the first two tiers
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TECH 7350 – Managing Information Security The Graduate School of Management at the University of Dallas
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.

Page1 / 5

unit_1_p2b_tech_7350_security_trends - TECH 7350 Managing...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online