Is there any security threat?

Hi Group,
I have my IIS webserver outside the fire wall and my coldfusion application server and SQL Server is behind the firewall . Can IIS Still access the cold fusion application server and SQL Server for coldfusion pages, is it for this situation do i need to open the port no 1433 in the firewall for SQL Server, if so is there any security threat?
Thank You for your Time

You can run CF in a distributed mode if it is running on JRUN.  So the IIS server would only need access over JRUN ports (which are uncommon) to the CF server.
This is a little harder to setup, but is covered in the livedocs.
Alternately, if the person who does your firewall knows how to, you can place everything behind the firewall and segment the firewall into zones, so only your application has access to the database.
Then your only concern would be what code is being placed on the server and by whom, internally.
Of course, if your internal network is not secure and accessible, this is a "way in".
Best practice is to allow no access, and grant only what is necessary.  This applies to all networks and routes that would have access to the entity being protected.
There is also something to be said for security by obscurity.  Meaning if you have to make 6 jumps to upload code to your server, and only a handful or people know this process, that makes it all the harder to be compromised.
Byron Mann
[email protected]
[email protected]
Software Architect
hosting.com | hostmysite.com
http://www.hostmysite.com/?utm_source=bb

Similar Messages

  • I have an imac G5 with a power PC chip running os 10.5.8.  and using safari 5.0.6. are there any security threats i should be aware of?          s there a

    are there any security concerns using my PPC imac g5 running OS 10.5.8 and using Safari 5.0.6?

    You could use a browser that does not use Flash or Java, as a safety measure when visiting sites; the Safari browser has no support or recent updates. TenFourFox v 24 is fairly good, and uses later Mozilla code, is compatible with powerPC computer limitations. SeaMonkeyPPC has a similar code, but acts a little different; and there still is iCab, a good browser that will run free, but asks you get a $20. license.
    The Safari browser can be used to set a different browser up as system default, so it won't launch and open attachments or web pages; it has a setting in its preferences where you choose another browser as default. As I have four or five browsers and one dedicated to gmail (launched as signed-in, through notifier) that is how I've used the default, otherwise mine are all in the Dock.
    There is no new upgrade for Adobe Flash plugin player, etc; but the one in their site for vintage is still available at getflash player at Adobe. Most prompts online are to get you something else, even adware loads up from some not-so-clever efforts to get people to install junk. So go to the source. Someone wrote a patch that is supposed to allow a later version of Flash player to work in older 10.5.8 PPC Mac, but I have not tried it.
    The thread of security is mostly based on the user and their caution to avoid odd free software and also avoid some sites that try to get people to load cleanmymac or genieo, or other adware malware voluntarily. Those are troublesome and hard to remove, and can waste processor cycles, slow the computer & mess it up. Mostly from a browser the adware issues arise. For those you see The Safe Mac and read up on the adware removal guide, among others linked on the page: http://www.thesafemac.com/arg/
    So anyway, there is really nothing new on the face of it for obsolete OS X systems users.
    Good luck & happy computing!

  • HT1222 Are there any security updates for the Mac OS 10.4.11?

    Are there any security updates for my G4 PowerPC OS 10.4.11?

    No. Tiger is an obsolete and unsupported OS at this point. If there were any updates you would find them using Software Update.

  • Are there any security issues with Quicktime player on macbook

    Are there any security issues with Quick Time Player on macbook pro? 2010 model running Yosemite recently upgraded. Thanks!

    No.

  • Is there any security on the ipad mini?

    Is there any security on the ipad mini?

    If Kappy's response doesn't cover your issue, please post back and explain what "security" you're referring to.
    Regards.

  • I lost my E 71 phone is there any security feature...

    i lost my E 71 phone is there any security feature to get SMS when someone replaces SIM

    I don't think there is. Even if there was, it'd be a bit late now as you've already lost the phone.
    Some security practices to use for mobile phones:
    - Change the default lock/security code of the phone
    - Change the default PIN and PIN2 codes of the SIM card
    - Make sure the PIN code query is enabled when the phone is started
    - Make sure the setting that requires entering the lock/security code at SIM card change is enabled
    - Enable the autolock feature
    - Put a password on the memory card (so that the card cannot be used in another device)
    - Do not install software (applications/games) on your phone from questionable mobile or web sites
    - Do not install software on your phone, which is sent unsolicited (even if it comes from someone you know)
    - Make frequent backups (or otherwise copy/save any data you don't want to lose)

  • Is there any security system for the Internet for the iPad?

    Is there any type of security system for the Internet for the iPad?

    If you're asking about virus protection for your iPad, it's not necessary.  All iOS devices, including iPad are closed devices and you really can't download anything which could contain a virus........

  • Is there any Security or Change Log for Shockwave Player 12.1.3.153 available?

    I haven't seen so far any Security or Change Log for Shockwave Player 12.1.3.153. Given the Update ID SW12-13153 this seems to be an ordinary update (not a security hotfix with the prefix APSB...). Has anyone seen a change log?
    Thanks.

    As always: no.  The last Security Bulletin issued for Shockwave Player was http://helpx.adobe.com/security/products/shockwave/apsb14-10.html (March 13, 2014).

  • Are there any security risks in two-way trusts?

    Hello!
    Can anybody enumerate security risks two-way trusts have? Security holes?
    I mean two-way trusts between two domains from different forests Windows 2003\2008.
    Thank you for any info.

    Hi,
    There are two potential threats to interforest trust relationships in Windows Server 2003 :
    1: Attack on trusting forest by malicious user in a trusted forest :
    A malicious user with administrative credentials who is located in a trusted forest could monitor network authentication requests from the trusting forest to obtain the security ID (SID) information of a user who has full access to resources in the trusting
    forest, such as a Domain or Enterprise Administrator. SID filtering is set on all trusts by default to help prevent malicious users from succeeding with this form of attack
    2: Attack on shared resources in a trusting forest by malicious users in another organization’s forest :
    Creating an external or forest trust between two forests essentially provides a pathway for authentications to travel from the trusted forest to the trusting forest. While this action by itself does not necessarily create a threat to either forest, because
    it allows all secured communications to occur over the pathway, it creates a larger surface of attack for any malicious user located in a trusted forest. Selective authentication can be set on interforest trusts to help minimize this attack surface area.
    For more info , Please refer :
    http://technet.microsoft.com/en-us/library/cc755321(v=ws.10).aspx
    Though the forest mentioned is on win 2003, this article applies to Win 2008,2008R2 forest environment as well.
    Please revert in case of any queries
    pankaj(MCT)

  • Are there any security risks in opening ports for IChat AV?

    Hi all,
    I'm trying to get the network admin on a primarily Windows network to open the ports needed to get iChat AV working, but he is saying it's dangerous to have those ports open, not knowing what kind of effects there would be on a Windows network.
    I am the only Mac user there so as you can see it poses a considerable problem.
    Any help or advice or assurance from network admins to confirm that it is OK to open those ports would be of great help.
    Thanks in advance.
    AW

    Andru08:
    Don't expect your network admin to open any ports. He won't want to put his job on the line for you, nor should you expect him to.
    You MAY be able to route iChatAV over a VPN, although I am still unsuccessful in doing so. I have found that iChatAV works over AIM servers when both source and target are inside the corporate LAN, even though the call registration and setup is initially managed off-net at AOL and Apple (i.e., AOL login and SNATMAP and all that stuff). Theoretically, it would seem like if the outside machine had VPN with the appropriate certificates issued by your network admin (e.g., your home machine if you were wanting to be able to talk work-to-home), the outside machine would act no different than if it was on the corporate LAN.
    In real life, I still haven't gotten my home machine to communicate successfully over VPN to/from work, although I can ftp, afp, telnet, vnc, ssh, imap, smtp, etc., with no problem whatsoever over VPN. Just can't ichat over VPN. So, like me, you're probably SOL until a future version of iChat solves the VPN issue, if that is ever even explored by Apple.
    In the interim, you may just have to have your work go with yahoo messenger or msn messenger on PCs to AV conference to remote offices -- we use something like that at my work for AV conferencing and it traverses VPN just fine to/from our remote offices -- from user desktop/laptop to user desktop/laptop -- just don't know exactly which package we use or how to set it up on Wintel boxes, though, ...coz' I'm a Mac guy. I suppose I could find out for you, though, if you were interested in a Windoze solution...
    If any readers out there have actually gotten iChatAV to work over a VPN, boy, do I (and probably Andru08, too) want to talk to you!

  • Is there any Security Feature available in any of ...

    Dear Everyone, very good day to you all
    Just checking for a security feature:
    1. Is there a way to hide my Messages or can I set up a Personal password to prevent access from strangers?
    2. Is there a way to hide my contacts list or can I set a password to prevent access?
    This is a basic feature which should be available in a Mobile phone, everybody has some confidential data that cannot be accessed by someone other than the owner of the Mobile. so could someone let me know which Nokia Models support this feature.
    This feature is available in all the Samsung Mobiles strarting from the very basic phone and it is known as " Privacy Lock " where we can lock phone book contacts, messages, memory card access, call log etc etc.
    Thanks in advance,
    Jagadeesh Yenduri.
    Solved!
    Go to Solution.

    Many Thanks for the swift response, Nokia R&D should concentrate on such simple features, being a Giant in Mobile Market it should understand and concentrate on security too. Everybody needs security and have some important data to hide from others. Hope Nokia Team would read my post and concentrate on such Privacy features.
    Thanks in Advance,
    Jagadeesh  Yenduri.

  • Just a question...is there any security (firewall) on this phone

    To protect any data you send/reeceive? Anyone?

    There is effectively a 'firewall' in that the phone doesn't respond to network connections on any ports. Or at least on any of the ports I've tried. It's probably safe to assume that it doesn't have any regular services accessible from the outside.
    It does support Wi-Fi encryption on encrypted networks, obviously, for what that's worth. And if your mail server supports SSL connections, it'll do that, too. Just turn on 'incoming uses SSL' and/or 'outgoing uses SSL' in the advanced screen under each e-mail account's settings.

  • Tcode SQVI post any security threat in production system ?

    hi,
    my user is requesting to use tcode sqvi in production, but authorisation team do not allow as the tcode will allow user to do query across.
    is SQVI a security critical tcode that we should not let user have in Production system ?
    comment and advice will be highly appreciated.
    regards,
    kent

    >
    Kent SAP wrote:
    > hi,
    >
    > my user is requesting to use tcode sqvi in production, but authorisation team do not allow as the tcode will allow user to do query across.
    >
    > is SQVI a security critical tcode that we should not let user have in Production system ?
    >
    > comment and advice will be highly appreciated.
    >
    > regards,
    > kent
    i'm sorry i saw this post too late ... of course  SQVI is VERY security-critical. It requires S_TABU_DIS on every table used in sqvi. if you have more than one company code, more than one plant, more than one purchasing organisation you will no longer be able to prevent your user reading data from other organisational structures!!  you might as well give access to SE16(N) then.
    follow this thread about queries (sqvi is a small-time query) in the SDN security-forum for more on the topic:
    How to override security for table access when using SAP Query?
    Edited by: Mylene Euridice Dorias on May 29, 2008 1:31 PM

  • Are there any AD LDS Security best practices?

    Hi,
    Is there any security baseline for AD LDS by Microsoft or any other reputed organization?
    I am looking for something like a set of configurations / settings to compare the AD LDS server which authenticates non-domain devices (linux, networking devices, etc.) using LDAP.

    > Is there any security baseline for AD LDS by Microsoft or any other
    > reputed organization?
    Not to my knowledge, but basically the same rules apply as they do for
    AD DS.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Need any security for Macs??

    Have recently converted from the PC dark side to my new iMac.
    In my research,have read endlessly that Macs don't get viruses,
    sound Linux base,only occupy small portion of the market,etc...
    Some Mac people I talk to don't run any antivirus or anything.
    Is there any security problems I should worry about (spyware)??
    If so,what pgms should I run?
    Shouldn't I have something so I don't send things to PC users?
    Thx,
    Doug

    sound Linux base,only occupy small portion of the
    market,etc...
    Just being nitpicky here, but OS X doesn't have a Linux base. It is based on NeXTStep which uses the Mach microkernel and a BSD subsystem, all of which predates Linux by a few years. Just because something is UNIX-based or UNIX-like doesn't mean it's Linux. OS X does include quite a few GNU utilities that are also included with most Linux distributions, but the utilities themselves aren't really "Linux" either, they are just sort of closely associated with Linux because Linux too is a UNIX-like OS.
    That out of the way, I don't run anti-virus software because to me, the hassle involved in doing so far outweighs the very small risk of getting a virus. There are no OS X viruses now, so the only risk is that eventually one will come out, and I'll be unlucky enough to be infected despite the fact that I'm already careful about what I do.

Maybe you are looking for

  • Hi Gurus :  about BAPI

    Hi GURUS,         I want to extract customer general data,customer sales data,customer company code data, customer partner rolls data...so could any body suggest me BAPI available for this.....available one bapi ? Pls suggest it would be great helpfu

  • How to create links without using widgets

    I am using a vertical menu via the widget, but want to create a submenu without using the widget. btw, the rollover feature is fun

  • Java.util.Properties issue

    I have an Integer array that i want to store using properties. At the moment i have something like this for(int i = 0; i < guitarNo.length; i++)     {      p.setProperty("Identification", Integer.toString(guitarNo)); }But it doesn't store any of the

  • Time sheet-Reg

    Dear PM guys, During confirmation of order, we are entering the personnel number and Actual work.Based on this in Iw47 we can track the hours worked by particular employee or group of employees for a paricular period(ie posting date). Is it possible

  • Unable to find MultipartRequest in WebSphere

    Hi, Am using the MultipartRequest class provided by oreilly in the com/oreilly/servlet package. I used that class to upload files and everything worked fine on my local machine where i am running LiteWebServer. Now i moved my code into WeBSphere and