milestone update 4
docx
keyboard_arrow_up
School
Full Sail University *
*We aren’t endorsed by this school
Course
2318
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
27
Uploaded by HighnessThunderSeahorse21
Diamond Supply
Co.
Project and Portfolio II
William Feller
Full Sail University Table of Contents
Inventory
.................................................................................................................................
4
Custom Network
.....................................................................................................................
4
IDs and Passwords
..................................................................................................................
4
Network Topology Diagram
....................................................................................................
5
Node.js Application (Ghost) on Docker
....................................................................................
5
Install base CentOS 7 Virtual Machine “ITE229-docker (11)”
..............................................................
5
SSH into CentOS VM
...........................................................................................................................
5
Update CentOS
...................................................................................................................................
5
Install EPEL Packages
..........................................................................................................................
5
Install Docker CE
.................................................................................................................................
5
Start and Enable Docker
.....................................................................................................................
5
Test Docker (hello-world)
....................................................................................................................
5
Disable SELinux on CentOS 7 Virtual Machine
....................................................................................
5
Install Ghost Docker Container
...........................................................................................................
5
Test Ghost
...........................................................................................................................................
5
NginX Reverse Proxy
...............................................................................................................
6
Install base CentOS 7 Virtual Machine “ITE229-NginX (10)
.................................................................
6
SSH into CentOS VM
...........................................................................................................................
6
Update CentOS
...................................................................................................................................
6
Disable SELinux
...................................................................................................................................
6
Disable Firewall
..................................................................................................................................
6
Install EPEL Packages
..........................................................................................................................
6
Install NginX
.......................................................................................................................................
6
Start and Enable NginX
.......................................................................................................................
6
Reverse Proxy to Ghost Site
................................................................................................................
6
Install WordPress on Ubuntu - LAMP Stack
..............................................................................
7
Base Ubuntu 18.04 Install
...................................................................................................................
7
Set Static IP
.........................................................................................................................................
7
SSH into Ubuntu VM
...........................................................................................................................
7
Update Ubuntu
...................................................................................................................................
7
Install and Configure Apache
.............................................................................................................
7
Install and Configure MySQL
...............................................................................................................
7
Install and configure PHP
....................................................................................................................
7
Test PHP
.............................................................................................................................................
7
Database Configuration in MySQL
......................................................................................................
7
Install WordPress
....................................................................................................................
7
Clone WordPress
................................................................................................................................
7
Edit Ownership
...................................................................................................................................
7
Edit .htaccess
......................................................................................................................................
8
WordPress Configuration
........................................................................................................
8
WordPress Configuration Process
.......................................................................................................
8
Test WordPress
...................................................................................................................................
8
WordPress Security Settings and Configurations
......................................................................
9
Security Summary
..............................................................................................................................
9
Defense-in-depth
................................................................................................................................
9
Before/After Configuration
.................................................................................................................
9
Testing and Validation Process
............................................................................................................
9
WordPress Security Conclusion
..........................................................................................................
9
Full Report Conclusion
.............................................................................................................
9
Appendix A
............................................................................................................................
10
NginX Config File
...............................................................................................................................
10
Appendix B
............................................................................................................................
10
NginX Access Log File
........................................................................................................................
10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Inventory
EQUIPMENT
OPERATIING SYSTEM
ADDITIONAL INFO
IP ADDRESS
Router/Custom Network
Enter your OS
-
10.10.229.1
Docker
CentOS
Ghost Container
10.10.229.11
NginX Reverse Proxy
CentOS
Reverse Proxy
10.10.229.10
Wordpress
Ubuntu
LAMP Stack running WordPress
10.10.229.12
Custom Network
NETWORK NAME
SUBNET IP
SUBNET MASK
DNS
GATEWAY
ITE229
10.10.229.0
255.255.255.0
10.10.229.1
10.10.229.1
IDs and Passwords
ACCOUNT
USER ID
PASSWORD
CentOS Root User
root
Fullsail1!
CentOS Network User
root
Fullsail1!
CentOS Host User
[yourname]
Fullsail1!
MySQL Network User
root
Fullsail1!
MySQL Host User
[yourname]
[randompassword]
WordPress Admin
admin
[randompassword]
Network Topology Diagram
Node.js Application (Ghost) on Docker INCLUDE SCREENSHOTS PER STEP LISTED BELOW
Install base CentOS 7 Virtual Machine “ITE229-docker (11)” SSH into CentOS VM
Update CentOS
Install EPEL Packages
Install Docker CE Start and Enable Docker
Test Docker (hello-world)
Disable SELinux on CentOS 7 Virtual Machine
Install Ghost Docker Container
Test Ghost
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
NginX Reverse Proxy
INCLUDE SCREENSHOTS PER STEP LISTED BELOW
Install base CentOS 7 Virtual Machine “ITE229-NginX (10)
SSH into CentOS VM
Update CentOS
Disable SELinux
Disable Firewall
Install EPEL Packages
Install NginX
Start and Enable NginX
Reverse Proxy to Ghost Site
Install WordPress on Ubuntu - LAMP Stack INCLUDE SCREENSHOTS PER STEP LISTED BELOW
Base Ubuntu 18.04 Install Set Static IP
SSH into Ubuntu VM
Update Ubuntu
Install and Configure Apache
Install and Configure MySQL
Install and configure PHP Test PHP
Database Configuration in MySQL
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Install WordPress INCLUDE SCREENSHOTS PER STEP LISTED BELOW
Clone WordPress
Edit Ownership
Edit .htaccess
WordPress Configuration
WordPress Configuration Process
Test WordPress
WordPress Security Settings and Configurations Security Summary
WordPress is a popular content management system used to create and manage websites. Due to its widespread usage, it is important to ensure the security of a WordPress website in order to protect sensitive information and prevent malicious attacks. This can include measures such as using strong passwords and regularly updating the website's software to address security vulnerabilities. Additionally, using security plugins and implementing best practices for user account management can also help to enhance the security of a WordPress website.
The .htaccess file is a configuration file used by the Apache web server to control various settings for a website, including security settings. By editing the .htaccess file, you can prevent hackers from accessing specific files or directories on your website.
One way to do this is by using the "Deny" directive to block specific IP addresses or ranges from accessing your website. For example, you can use the following code to block all access to your website from a specific IP address:
Order Deny,Allow
Deny from 12.34.56.78
Another way to use the .htaccess file to improve security is by using the "FilesMatch" directive to restrict access to specific files or file types. For example, you can use the following code to block access to all PHP files in a specific directory:
<FilesMatch "\.php$">
Order Deny,Allow
Deny from all
</FilesMatch>
It's also important to note that editing the .htaccess file can also cause errors or break your website if not done properly, so it is recommended to have a backup of the file before editing.
Additionally, it's worth noting that editing the .htaccess file may not be enough to secure your website, it's important to keep software and plugin updated and use other security measures like using a web application firewall, SSL certificates, and regular security scans.
Defense-in-depth
Defense in depth is a security strategy that involves implementing multiple layers of security controls to protect against various types of threats. When applied to WordPress, defense in depth can involve a combination of the following measures:
Strong passwords and two-factor authentication: This helps prevent unauthorized access to the WordPress admin area.
Regular software updates: WordPress and its plugins should be updated regularly to ensure that any known security vulnerabilities are patched.
Firewall: A firewall can be used to block malicious traffic and prevent attacks on the WordPress site.
Secure hosting: A secure hosting environment can help protect against server-level attacks.
Security plugins: There are several security plugins available for WordPress that can help protect the site against common attacks, such as brute force attacks and SQL injection.
Regular backups: Regular backups ensure that if the site is compromised, it can be easily restored to a previous state.
Security Auditing and monitoring : Regular security audits and monitoring should be conducted to identify any security issues and vulnerabilities.
Overall, defense in depth is a holistic approach to security that involves implementing multiple layers of protection to guard against various types of threats, rather than relying on a single security measure.
Before/After Configuration INCLUDE SCREENSHOTS OF EACH CATEGORY (FILE PERMISSIONS AND CHANGING THEM, SECURING WP-CONFIG.PHP, AND CONFIGURATION OF FIREWALL)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Testing and Validation Process INCLUDE SCREENSHOTS OF EACH CATEGORY (FILE PERMISSIONS AND CHANGING THEM, SECURING WP-CONFIG.PHP, AND CONFIGURATION OF FIREWALL)
WordPress Security Conclusion
Security is important in regards to defense in depth because it creates multiple layers of protection for a system or network. This approach helps to prevent a single point of failure and can make it more difficult
for an attacker to penetrate the system. Defense in depth can be applied to computer systems in the real
world by implementing a combination of technical and non-technical controls such as firewalls, intrusion detection systems, encryption, access controls, and security policies. This can help to protect against a wide range of threats, including malware, hackers, and unauthorized access. Additionally, regular security assessments and testing can help to identify vulnerabilities and ensure that the system remains secure over time.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Full Report Conclusion
In conclusion, setting up and creating a network plan for an information technology client that includes WordPress, a reverse proxy server, and focuses on security and defense in depth is a process that requires careful planning and execution. By installing Ubuntu on a server, setting up a reverse proxy server, installing and configuring WordPress, implementing security measures, using a defense-in-depth strategy, regularly updating and patching the server, and monitoring and testing the network regularly, it is possible to create a secure and reliable network that will meet the needs of the client. Overall, this
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
report has outlined the necessary steps and considerations that should be taken when planning and setting up a network for an IT client, with a specific emphasis on the importance of security, defense in depth and using Ubuntu to manage the server.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help