preview

Architecture : Online Architecture

Better Essays

In a traditional three-tier architecture is a client-server architecture in a company data center which consists of presentation tier, business logic tier and data tier. Each tier is developed and maintained as an independent tier.
Presentation Tier: The Top-most level of the application is the user interface. The main function of the interface is to translate tasks and results to something the user can understand. In simple term, it is a layer which user can access directly such as web-based application, web browsing.
Business logic Tier: This logical tier is pulled out from the presentation tier and, as its own layer, it controls an application’s functionality by performing detailed processing.
Logic tier is where mission-critical …show more content…

In addition, identify and prioritize websites vulnerabilities, scan web applications and web services to reduce threat exposures, data loss risk. Protect sensitive data and transactions while meeting compliance requirements mandated by industry regulations and best practices. Also, it is best practice to routine verify firewall rule-set to prevent unauthorized users access to sensitive data.

Frist, Traffic between the Client and the Web Server is most likely to be HTTP on Port 80 or HTTPS on Port 443. It is extremely important that a firewall is placed between the Client and the Web Server; this will allow access only to the HTTP or HTTPS service and block access to the other services running on the server.

Second, Traffic between the Web Server and the Application Server could either be on HTTPS, SSH, RDP or some Custom Port. Here again, placing a firewall makes sense, as the traffic needs to be controlled between the Web Server and Application Server and should be allowed only on specific application ports and not operating system ports.

Third, Traffic between the Application Server and the Database server would most likely be on a SQL Port 1433. This is where a firewall does not necessarily add value because to obtain data from the database, no special ports are required the authorized SQL port can be used by anyone (authorized and unauthorized) to get data from the

Get Access