We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Network Security and the Demilitarized Zone - Coursework Example

Comments (0) Cite this document
This research will begin with the statement that the demilitarized zone operates as a part of a firewall configuration in order to secure the local area networks. If a DMZ is configured on the whole network or on specific workstations, they are known to be in a DMZ…
Download full paper
Network Security and the Demilitarized Zone
Read TextPreview

Extract of sample
Network Security and the Demilitarized Zone

Download file to see previous pages... The researcher states that the disadvantages associated with DMZ are not significant, but one issue can be highlighted, as the segregation may create a hassle for the network administration because DMZ requires frequent updates and maintenance. Moreover, the hardware cost is high and requires dedicated hardware in order to implement DMZ within the network. Deployment includes a switch, separate firewall, and IDS etc. The most significant advantage that is shared by both of these technologies is communication. However, intranet provides limited communication as compared to the extranet, but it is still effective. In order to implement the intranet, local area network and a host is required. The network must adhere to the requirements of the intranet application. Moreover, the application will be deployed on a separate workstation called as a host or server. The star topology is recommended for intranet-based networks as the network administrator can manage and administer intranet issues in a centralized environment. Furthermore, the presence of the intranet will enable new trends for communication. For example, paperless communication between employees, chatting, e-mails and blogs etc. disadvantage includes maintenance and security issues. Hardware requirements for an extranet are similar, except Extranet provides a wide coverage for employees, who want to work from home, or communicate while traveling. However, in order to provide or publish contents on the Internet, certain advanced protocols are required. For instance, VPN is a secure choice. Accordingly, due to its broad functionality, security issues are also more as compared to the intranet. Network address translation is defined as “An Internet protocol that allows individual sites to support more IP hosts than the number of IP addresses assigned to it. This is done using special Internet addresses that have been reserved for this purpose. These special addresses are invalid on the Internet itself. The hosts using these addresses may communicate among themselves, but they cannot access the Internet directly” (Campus infrastructure guidelines). NAT translates private IP addresses into global IP addresses, making it simple for the network administrator, as incremental changes are required without modifying host and routers. Moreover, the disadvantage NAT has is that it is slow because each packet is processed, prior to the decision of translating it or not. ‘IP traceability’ also becomes difficult as data packets are difficult to trace.  Tunneling is also called as port forwarding. Port forwarding is configured for a secure channel within the medium or corporate networks. One way of implementing a tunneling protocol is to configure a DSL modem by defining the port number that is allocated for using specific service. For instance, in order to access remote desktop via port forwarding, port number 3389 and RDP service is defined in the router against the IP address of the workstation on which the service needs to be executed. A popular tunneling protocol developed by Microsoft is known as Point to Point Tunneling Protocol (PPTP). ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Network Security and the Demilitarized Zone Coursework”, n.d.)
Retrieved from https://studentshare.org/information-technology/1416249-network-security
(Network Security and the Demilitarized Zone Coursework)
“Network Security and the Demilitarized Zone Coursework”, n.d. https://studentshare.org/information-technology/1416249-network-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Network Systems and Technology
tallation Procedure Page 13 - 17 5.1 DNS Server Page 17 6 Proposed Network Model Page 18- 20 6.1 Site 1 Local Area Network Page 18 6.2 Site 1 & Site 2 VPN Point to Point Connectivity Page 19 7 Conclusion and Recommendations Page 20 References Page 21 Abstract We have assumed a proposed network of a hospital that will remotely connect to maternity homes.
12 Pages(3000 words)Coursework
What is security Why network security is important
In the context of network security definition, it consists of concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing Internet for concealed communication (Network Security.
9 Pages(2250 words)Coursework
Network Security Research
When the link is established between the two connections, connection A sends a message named a ‘challenge’ to the connection ‘B’. Connection ‘B’ replies to the request by calculating a value with ‘one-way hash’ utility. It is important for both connections that the hash value connection should be the required one; otherwise, the connection will be terminated.
3 Pages(750 words)Coursework
Network Security
New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies.
13 Pages(3250 words)Research Paper
Internet Security
For example, the policy information in a company should only be known by the executive management. Integrity- ensuring that that a party gets is the original one that was placed there. For example, the patient information entered to the computer by a nurse is the exact information that reaches the physician.
5 Pages(1250 words)Coursework
Security Technology Firewalls and VPN
This paper discusses security technology, firewalls and VPNs that can be used to make our system secure. Stewart (233) defines a firewall as a written program and a vital network component that screens the movement of information through a
3 Pages(750 words)Coursework
Security Analysis and Redesign of a Network
XYZ Invitation Printing and ABC Invitation Design have merged into A2Z Invitations Company. Prior to the merger, ABC, a virtual firm, hosts a proprietary website that enables its customers to carry out some preliminary work on its website; it usually consulted with a third party designer to perform for the end product.
14 Pages(3500 words)Coursework
Security Risk Mitigation Policies
Despite the fact that the wireless networking provides numerous advantages, it is also coupled with various security threats which can alter an organization’s overall security profile. In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology. Thorough and sound assessment of the risk provided in the environment should be done in order to develop a plan to mitigate it.
2 Pages(500 words)Coursework
Security Risk Assessment
It further analyzes the costs that a business organization will face, for purposes of recovering its operations in case its computer systems are attacked. A secure computer and IT system
6 Pages(1500 words)Coursework
Questions in Network Security
These certificates are certified and issued by certificate authorities (CAs). The main function of CAs is to issue digital certificates. The other role of CA is to confirm the identity of the
1 Pages(250 words)Coursework
Let us find you another Coursework on topic Network Security and the Demilitarized Zone for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us