Thursday, June 13, 2019
Computer Security Essay Example | Topics and Well Written Essays - 1000 words
Computer Security - Essay ExampleThe network also makes it possible to appropriate resources like printers and hard drives. This therefore reduces costs for of having to buy these resources. Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture. In this aspect the soldiers will be installed in a data center with the master of ceremonies of the server program. Three-tier architecture has various layers with various functions. 3-tier architecture. The 3-tier client/server architecture was introduced to sweep away the problems that were associated with 2-tier architecture. With this architecture, a middlew atomic number 18 lies between the server and the client. They are implemented in several ways, which include implementation as a message server, or application server or processing monitors. The functions of the middleware are queuing, execution of applications, staging of the databases, and prior itization for work in progress (Wegner, & Peter, 2007). This architecture improves performance when the number of users is increased. It has the advantage of flexibility when compared to 2-tier architecture. One of the downsides of this architecture is the fact that the development is more complex than that of 2-tier applications. There are two types of 3-tier architectures 3-tier with message server In this type of 3-tier architecture, the messages are processed and prioritized asynchronously. This is done in such a way that the messages have a header which contains priority information, address and identification number. The message server provides a link to the relational database forethought system and other sources of data. Messaging systems are good alternatives to wireless infrastructures (Gorit, Dreoh, & Jeri, 2006). This architecture allows the main body of an application to run on a shared host instead on running on the his machine which is already overloaded due to its m inimal resources (Rabaugh et al, 2001). The application server shares the sections of the business logic, computational and data recuperation engine. The good thing about this architecture is the fact that applications are scalable compared to 3-tier with message server. Furthermore, the installation costs are less on a iodine server compared to a situation where living is done on each of the client machines. In the payroll program, the users will be configured so that they can access the server which is installed in a central location. The reason why I prefer this architecture is that one application program will be acquired and the rest will be in the server machine. It will be cheaper. The cost will be reduced in terms of purchasing the software system that will be installed. This is because in this case one application software will be purchased which will be installed in the server. Given the many users who are going to use the program, it will mean that the applications w ould be bought for every user who will be required to use the payroll program. Another cause for decline of cost is that of maintenance. With this architecture, there will be maintenance of the server machine only. Maintaining one application is easier and cheaper in terms of expertise who will undertake the maintenance (Orfali, Dan, & Jeri, 2006). How to prevent interception There are mitigation strategies that are used to eradicate the risks that are associated with interception attacks. For spoofing and ARP poisoning, one way on which this can be mitigated is by using IP addresses which are static. Also the network administrator should make use of ARP
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.