INFORMATION SECURITY UNIX & DB2. Introduction THE OBJECTIVE IS TO DESIGN SECURITY MEASURES FOR A MILITARY SYSTEM SYSTEM RUNNING A DB2 SERVER ON UNIX FOCUS.

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Configuring Windows to run Dr.Web scanner remotely.
Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
Chapter 7 HARDENING SERVERS.
Profile-Based Web Intrusion Prevention System by Donovan Thorpe CS526 Fall 2002.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
20411D Administering Windows Server® 2012 刘道军老师主讲 如有疑问请与我联系:
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
X2O Server Installation
IIS vs. Apache. Five advantages of IIS 1. It is has a GUI interface, which makes the installation a bit easier. 2. It "plays" well with other Microsoft.
Module 16: Software Maintenance Using Windows Server Update Services.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
BY Zoher & Mahmoud. What is WAMP?  - Acronym for Windows/Apache/MySQL/PHP, Python, (and/or) PERL  - WAMP refers to a set of free open source applications,
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Microsoft Operations Manager 2005 Architecture and Deployment Jonathan Whiteman Microsoft Europe, Middle East and Africa Jonathan.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Chapter 7: Using Windows Servers to Share Information.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
DWA Example Scenarios This presentation shows a number of the most common scenarios used with the Distributed Websydian Architecture. Note that there are.
Module 13: Maintaining Software by Using Windows Server Update Services.
Web Application Security A Project X Course Date: Nov 1 th – 2 nd, 2010 Confidential Material.
Patch Management Only part of the solution….. Bob Isaak Mar 04, 2004.
The Microsoft Baseline Security Analyzer A practical look….
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Introduction to ASP.NET 1www.tech.findforinfo.com.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Server Performance, Scaling, Reliability and Configuration Norman White.
Small Business Security Keith Slagle April 24, 2007.
Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
PHP Introduction PHP is a server-side scripting language.
Module 9 Planning and Implementing Monitoring and Maintenance.
CISCO NETWORKING ACADEMY Chabot College ELEC Internet Security Introduction.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Module 3 l Objectives –Identify the security risks associated with specific NT Services –Understand the risk introduced by specific protocols –Identify.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
XAMPP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
EduGeek Logon Tracker Next generation user tracking.
Outline  XAMPP  XAMPP Install  Put php and HTML documents  Windows and Mac Version  Security.
PHP is a server scripting language, and a powerful tool for making dynamic and interactive Web pages. PHP is a widely-used, free, and efficient alternative.
Benefits Of PHP Web Development. Easy to Implement PHP permits quick implementation of complicated issue. Its upper your cost- efficiency and also the.
Introduction to Operating Systems
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Implementing TMG Server Publishing
Printers.
NTC 324 RANK Education Your Life - ntc324rank.com.
VCE Dumps
Hybrid Search Technical Guidance.
A Web-based Integrated Console for Controlling a Set of Networks
Introduction to Systems Security
Windows System Programming Third Edition
Tutorial 6 PHP & MySQL Li Xu
APACHE WEB SERVER.
Designing IIS Security (IIS – Internet Information Service)
Hacking Windows Damian Gordon.
Presentation transcript:

INFORMATION SECURITY UNIX & DB2

Introduction THE OBJECTIVE IS TO DESIGN SECURITY MEASURES FOR A MILITARY SYSTEM SYSTEM RUNNING A DB2 SERVER ON UNIX FOCUS IS ON DB2 BACKEND VULNERABILITIES

UNIX VULNERABILITIES  BIND DOMAIN NAME SYSTEM  REMOTE PROCEDURE CALLS  APACHE WEB SERVER

STRENGTHENING UNIX  FIREWALLS  REGULAR UPDATES  STRINGENT USER ACCOUNT MANAGEMENT  ENCRYPTION

WEB SERVER DEPLOYMENT  2 SERVERS WILL BE DEPLOYED IN 2 LOCATIONS  THE SERVERS WILL BE SET TO AUTOMATICALLY SYNCHRONIZE  THE WEB SERVER WILL NOT USE PORT 80  SECURE FIREWALL CONFIGURATION

APACHE  THE MOST POPULAR WEB SERVER WORLD WIDE  HIGH RELIABILITY AND PERFORMANCE  FREE & OPEN SOURCE  CROSS-PLATFORM  MORE SECURE THAN IIS

IIS  PRODUCED BY MICROSOFT  SUPPORTS.NET FRAMEWORK AND ASPX SCRIPTS  ONLY RUNS ON WINDOWS  LESS SECURE THAN APACHE

References Roberta Bragg, C. I. S. S. P., & Rhodes-Oulsey, M. (2004). Network Security: The Complete Reference. The McGraw- Hill/Osborne.