StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Report - Book Report/Review Example

Cite this document
Summary
In any situations that demand the use of internet interface, security becomes paramount, as there are several risks involved in using the internet through unprotected servers. DMZ is a term derived from the term ‘Demilitarized Zone’ that denotes a perimeter network that…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Report
Read Text Preview

Extract of sample "Report"

The Role DMZ in Server Environment In any situations that demand the use of internet interface, security becomes paramount, as there are several risks involved in using the internet through unprotected servers. DMZ is a term derived from the term ‘Demilitarized Zone’ that denotes a perimeter network that links an organization’s servers to untrusted outside networks. Usually, a DMZ comes between the VLAN and the servers of a particular organization (Shinder 191). This essay discusses the features and functionality of the ‘Demilitarized Zone’ (DMZ) in a server environment.

A DMZ operates in such a manner that it acts as an external layer that shields the LAN against unwarranted access by other internet users. This normally occurs during communication where the DMZ does not allow an organizations email and web servers to be accessed by unauthorized individuals. It does so by only allowing the access to the equipment in the stead of the network (Shinder 191).Under ordinary network such hosts as email, web, Local Area Network, and Domain Name System are vulnerable to external attack by internet users.

Therefore, the DMZ provides limited connectivity to such hosts so that they only have access to the DMZ and not external networks. Manu organizations install the internal proxy in their DMZ so that users without the proxy login cannot have access to the network. In addition, the proxy filters the content of the central web. On the other hand, the organization may opt to use a reverse proxy that allows indirect access to the external users. The application layer firewall enables this by focusing on the nature of the network traffic rather than regulating access to the UDC and TCP ports (Shinder 191).

Works CitedShinder, Thomas. Building Dmzs for Enterprise Networks. Unknown: Syngress, 2003. Web.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Report Book /Review Example | Topics and Well Written Essays - 250 words - 1”, n.d.)
Report Book /Review Example | Topics and Well Written Essays - 250 words - 1. Retrieved from https://studentshare.org/information-technology/1622509-report
(Report Book /Review Example | Topics and Well Written Essays - 250 Words - 1)
Report Book /Review Example | Topics and Well Written Essays - 250 Words - 1. https://studentshare.org/information-technology/1622509-report.
“Report Book /Review Example | Topics and Well Written Essays - 250 Words - 1”, n.d. https://studentshare.org/information-technology/1622509-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Report

Case for Global Warming

Lujan Lab report W14s1 Debate on Global Warming: Scientific Basis Global warming refers to the increase in the temperature of the earth's surface and troposphere.... Lidia M.... The term global warming is used interchangeably with “climate change,” referring to the other climatic changes aside from or due to increased global temperatures....
3 Pages (750 words) Lab Report

Various Issues of Business

Business report Submitted to: Academia Research May 25....
12 Pages (3000 words) Book Report/Review

The Discovery of Stored Personally Identifiable EU Member Information

This paper ''Constructing report'' discusses that the US is competent of stipulating individuals' data of other countries which can only be transferred to the third countries that are competent of offering adequate protection of their right to their personal information.... Thus, for the forensic investigator to be able to gin access to any individual's, he must first include all the necessary details and activities involved in the forensic report to be presented....
7 Pages (1750 words) Report

Finance and Accounting Calculation: A-Cap Resources Limited

Finance and Accounting Calculation report Executive Summary A-Cap Resources Limited The company A-Cap Resources has suffered from huge amount of losses in the 2012, though less as compared to 2011.... Though the revenue from sales earned by the company in 2012 was less than 2011 because of the decrease in spot prices of uranium in 2011, yet the company was able to reduce the losses incurred in 2012 as compared to 2011 because of the Letlhakane Uranium Project which grew by 90 million pounds in 2011....
14 Pages (3500 words) Book Report/Review

Burton Report

The Burton report set out wide - ranging recommendations for the MOD to implement procedural and security changes that arguably support the 10 principles of governance as outlined by the Harvard Business School.... The Burton report itself had been written in response to a series of widely reported security lapses within the MOD, lapses that undermined public confidence in the ministry's ability to maintain national security. ... he objective of the Burton report recommendations was after all primarily concerned with ensuring that MOD would be far more effective at protecting British national security interests and protecting sensitive data and information....
4 Pages (1000 words) Book Report/Review

Maximum Height Travelled by a Model Rocket

In this lab, the major objective was to predict how high a rocket model could fly once launched.... This involved acquiring a model rocket, then launching it to… Another related objective was to apply equations for basic projectile motion in determining how high a rocket can fly.... Since launching the model rocket, this is considered a projectile motion influenced by height of launch pad, Consequently, there was need for compiling this towards calculating the maximum height fled by the model....
2 Pages (500 words) Lab Report

Decline in Sales of the Products of Best Bakers

A report about a Research Carried Out by Committee Select to Seek the Possible Causes of Decline in Sales of the Products of ‘Best Bakers' in the Market as Authorized by Best Bakers' Management Board. ... ... akers, established in the year 2005 is located in Chicago.... The… Located in the heart of Chicago, the pastry enterprise serves as the greatest provider of pastry products in the city....
11 Pages (2750 words) Book Report/Review

Analysis of Financial Indicators

To get a percent frequency distribution for age variable it necessary to determine the number of bins, width of the bin, and determine the frequency for each bin (Anderson, Sweeney, and Williams, 37-95).... At the first stage, the maximum and minimum value are determined.... Using… Six bins may be defined: 20-30 years; 31-40 years; 41-50 years; 51-60 years; 61-70 years; and 71-80 years....
3 Pages (750 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us