This server is protected by the following creating

Info icon This preview shows pages 4–7. Sign up to view the full content.

View Full Document Right Arrow Icon
assignment for workstations and servers. This server is protected by the following Creating domain security policy and implementing on the server. It means that only the administrator can access this server locally and remotely. Montclair State University Fall2004 Catherine Alexis 4
Image of page 4

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Intranet Security Installing antivirus software and definitions Installing security patches and service pack Disabling unwanted devices like USB device, parallel port device from the server. iii. Web server The organizations website is hosted on the web server. Internally it is protected from the users via folder rights. Only the administrator or the webmaster has the rights to change the contents of the website. It is protected from the external world by firewall and the DMZ network via web filter techniques. Symantec, MacAfee, checkpoint and etc can be used as web filter software to monitor and prevent hackers from destroying the web server. iv. File server All the user’s files are saved on this server. Usually it has three levels of security. (Personal single user access), group (department access) and public (access to all departments in the company). It is protected by antivirus software, through updated security patches, and by frequent backup. Access from outside the company is achieved through Virtual Private Network and protected through firewall and DMZ. As always the system administrator has full access to this server for maintenance and backup. v. Mail server The user’s emails are stored in some encrypted format in the mail server. Only the administrator has the rights to access and perform maintenance on the mail server locally or remotely. The users have access only to their email folders. The mail server is protected from the outside through the firewall and DMZ network. The mail filter in the DMZ network filters spam and unwanted email attempts both from outside and from inside the organization. Example if the user from the inside sends a resume or unwanted emails or tries to visits pornographic websites it is blocked through the mail filter. The mail filter also scans email for viruses, worms and Trojan horses thus protecting the mail server and the user workstations. vi. Print Server This server networks all the printers within the organization. It monitors all activity and keeps a log. It is protected by regular antivirus software updates and security patch update. Only the administrator can access this system and do necessary changes. vii. Application Server This server holds all of the application software that are needed by the users. For example office, visio etc. The application software can be installed on the workstations by just mapping on to the application server. This provides for proper inventory and software license maintenance. viii. Database Server The database server holds the database software and the database files. It is protected by antivirus software and database security updates. Montclair State University Fall2004 Catherine Alexis 5
Image of page 5
Intranet Security I) Internal security Every database has several levels of security access.
Image of page 6

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern