Course Hero Logo

TammyBattle Assignment2.docx - 22 2018 Border Defenses...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 5 out of 5 pages.

22, 2018Border DefensesBorder DefensesDUE DATE:04/22/2018IAS5200BY: TAMMY BATTLEPROFESSOR:Brett MillerPage 1
22, 2018Border DefensesAbstractBefore I got into Information Technology (IT) I always thought DMZ was a piece of land thatdivided North and South Korea.But since I been working in IT DMZ also means (DemilitarizedZone), where you can have a local or physical sub-network that house basically most of yourexternal network services that’s connected to the Internet[IDCnd].All companies goal is to makesure their local area network (LAN) is safe and secure, but if you use DMZ it’s primary goal is toprovide extra layer of security for LAN.Page 2
22, 2018Border DefensesDMZ DevicesWhether it’s private or public all companies that use or have users that surfs the internet shouldhouse a DMZ.Most DMZ have an Web Server, Mail Server, DNS, VoIP, FTP, Database Server, anda Firewall.To get though a cyberattack the DMZ services needs to be hardened, so it can withstandthe attack[Cobnd].According to Mike Cobb, “The term DMZ comes from the geographic bufferzone that was set up between North Korea and South Korea at the end of the Korean War. A DMZ isnow often referred to as aperimeter network[Cobnd]. “There’s two types of DMZ models which are Single Firewall Model (Three-Legged Model) andDual Firewall Model.Normally in your home network you want see an DMZ setup unless youhave several servers running, mail server, email server etc. set up in your home.Your network athome normally may have two computers, iPad, TV, and other devices that is configured on a localarea network (LAN) which is connected to a broadband router[Mit18].Effective Overall Secure Border StrategySince DMZ offers two models for protection on your LAN, when you are implementing makesure you have a front-end firewall and a back-end firewall.The front-end back wall is use forexternal traffic and back-end firewall for internal traffic, also when you implement DMZ make sureyou hardened and optimized all systems; because it permits traffic to the correct services and portsthat’s resides in the DMZ[Rei12].I think the over all outcome of using DMZ is for it to work foryou and you not working for it.Page 3
22, 2018Border DefensesDMZ Network DesignPage 4
22, 2018Border DefensesReferencesIDC. (n.d). DMZ (DeMilitarized Zone).IDC-online, 7.Mitchell, B. (2018). De-Militarized Zone in Computer Networking.Lifewire, 1.Reichenberg, N. (2012). Four Tips for Designing a Secure Network Perimeter.Security Week, 1.Rouse, M. (n.d). DMZ (demilitarized zone).Techtarget, 2.Page 5
End of preview. Want to read all 5 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Brent Miller
Tags
Korean Demilitarized Zone, DMZ, TAMMY BATTLE

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture