Proxy Server

742 words | 3 page(s)

Current Security Measures
The proxy server is used by the company LAN computers to access company servers while in the office and on the road. Furthermore, the proxy server allows remote access to the corporate network. Such servers serve as an additional layer of authentication to access data. The WAN allows a dedicated line of access to the data center that is difficult to penetrate due to its design.

Open Port
Open ports also play as a significant security risk, as malicious individuals can discover these ports through specialized software and exploit these vulnerabilities. Given the free access that an open port provides, an individual can have free reign over available data, which can lead to a loss of intellectual property held by the firm.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Proxy Server".

Order Now
Promocode: custom20

Power Failure
Power failure is one of the most common vulnerabilities found within such systems, as many companies do not think to compensate for the loss of power. As such, a power failure can lead to critical data loss, especially if a server does not adequately back-up its data. Business function can be significantly impeded by a power failure, as company functions may simply freeze until the server is back online.

Solution
Uninterruptible Power Supply solutions exist to prevent this type of occurrence. Systems by APC such as Symmetra are designed to prevent any loss of power, and maintain a number of features and services that significantly reduce the loss of power/data from such occurences. The pricing for such systems depends on the scale needed, but estimates start from the low six digits (APC, 2013).

Antiquated Hardware Vulnerabilities
For many businesses, antiquated hardware can provide a number of vulnerabilities, as firms typically mix old and new hardware due to purchasing cycles and shelf life of certain components. As such, many firms such as Acme must address these vulnerabilities in order to prevent any malicious attempts on their systems and/or to safeguard critical data.

Lack of Fault Tolerance
One of the most basic vulnerabilities of a system is its ability to tolerate mechanical or software faults in its design. Fault tolerance allows a system to continue its functions without hindrance in the event of a failure of hardware components. Without preventive systems in place, even a small failure can cause complete system breakdown; such events are costly for firms as they can lead to the loss of productivity and firm data.

Lack of Compatibility
As hardware ages, many software developers fail to accommodate aging hardware in its code. This can effect hardware systems, as software may not be fully optimized to its use and may inadvertently leave behind security vulnerabilities as well as cause system failure.

Solution
Fortunately, both problems can be easily solved with a simple systems upgrade. NEC fault-tolerance servers are fully compatible with all industry standard software and can be acquired for $35,000; this price includes servers, set-up as well as support from NEC (NEC, 2010).

Routers
Routers possess a number of vulnerabilities, and serve as the first point of attack for malicious individuals. As such, such hardware must be up to date and possess the necessary countermeasures against threats.

DOS Attack
One of the easiest ways to disable a web server is through the use of a DOS attack. Denial-of-service attack ate attempts to render servers unusable due to a massive request of services. Through such methods, the server is overloaded and is unable to function until the attack ceases. This can leave companies vulnerable and unable to carry out tasks that depend on server capacity and stored data.

Port Failure
Port failure also disrupts function by preventing networked computers to properly connect and interface with the server. Due to hardware failure, the server is rendered inaccessible to the organization. This can lead to a loss of productivity, as data cannot be accessed and the company may be unable to properly service its clients.

Solution
Fortunately, DOS and Port Failure can be compensated for through hardware that is designed to counteract such vulnerabilities. The AntiDDoS8000 Series from Huawei possesses a 200Gbit/s defense performance, with an ability of 10 times scalability. The pricing for the full unit and service package begins at $30,000 (HUAWEI, 2013).

    References
  • APC. (2013). Symmetra. Retrieved from APC: http://www.apc.com/products/family/index.cfm?id=189
  • HUAWEI. (2013). Anti-DDoS Measures. Retrieved from Huawei: http://www.huawei.com/en/products/data-communication/network-security/Anti-DDoSSystem/Anti-DDoSSPU/index.htm
  • NEC. (2010, December 2). NEC servers bring fault tolerance to Microsoft Hyper-V environments! Retrieved from NEC: http://www.nec-itplatform.com/+NEC-servers-bring-fault-tolerance+.html

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now