The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Unit 4 Discussion: Bella
In the twilight of a fading day, when the sore computer strained eyes of most are adapting to the absence of light, Edward and Jacob have come out of hiding to work together. Ordinarily, they don’t hang out together since they don’t see eye-to-eye on some topics. But to protect their newest interest, a server called Bella, they have suppressed their thoughts of each other. Although they have very different technical appetites, Edward and Jacob each contribute complimentary talents and agree that Bella is vulnerable to all kinds of attacks: worms, viruses, etc.
Bella is not the typical beauty. There are no cosmetic applications to garnish the exterior, just pure clean data storage built on a very solid and well-grounded frame. In contrast to their own very complex personas, Edward and Jacob are attracted by Bella’s simplicity. But they admit they need to protect Bella from even themselves. It is complicated. The challenge is to protect Bella without Bella knowing too much about how they are doing it.
Bella resides on a private subnet off the beaten network path. That anonymity provides some comfort, but the attack vectors are substantial. Bella is hosting internal websites, files, providing authentication for the domain, is the backup email proxy, and even has a role as a syslog server. Bella is supposed to be accessible to external verified users, but only if authenticated. Even internal users are on a restricted ‘need only’ basis.
You must respond to at least two (2) of your classmates. Ask questions to get the conversation moving. To further enhance the discussion, return to your original post throughout the week and respond to a few of the comments and questions raised by classmates and instructor.
Remember to proofread and spellcheck your discussion contributions before posting. For more information about discussion grading criteria, refer to the Discussion Forum Participation Policies and Rubric.
-----------