22, 2018Border DefensesDMZ DevicesWhether it’s private or public all companies that use or have users that surfs the internet shouldhouse a DMZ.Most DMZ have an Web Server, Mail Server, DNS, VoIP, FTP, Database Server, anda Firewall.To get though a cyberattack the DMZ services needs to be hardened, so it can withstandthe attack[Cobnd].According to Mike Cobb, “The term DMZ comes from the geographic bufferzone that was set up between North Korea and South Korea at the end of the Korean War. A DMZ isnow often referred to as aperimeter network[Cobnd]. “There’s two types of DMZ models which are Single Firewall Model (Three-Legged Model) andDual Firewall Model.Normally in your home network you want see an DMZ setup unless youhave several servers running, mail server, email server etc. set up in your home.Your network athome normally may have two computers, iPad, TV, and other devices that is configured on a localarea network (LAN) which is connected to a broadband router[Mit18].Effective Overall Secure Border StrategySince DMZ offers two models for protection on your LAN, when you are implementing makesure you have a front-end firewall and a back-end firewall.The front-end back wall is use forexternal traffic and back-end firewall for internal traffic, also when you implement DMZ make sureyou hardened and optimized all systems; because it permits traffic to the correct services and portsthat’s resides in the DMZ[Rei12].I think the over all outcome of using DMZ is for it to work foryou and you not working for it.Page 3