Unit4_IT541 - Unit 4 1 Running Head DMZ CONFIGURATION DMZ Configuration for XYZ Corporation Jennifer Angel Kaplan University IT 541 Computer and

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 4 1 Running Head: DMZ CONFIGURATION DMZ Configuration for XYZ Corporation Jennifer Angel Kaplan University IT 541 Computer and Network Security Dr. Steven Case February 2, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 4 2 Abstract Networks today need to take extra precautions when accessing information hosted on a server outside their company's internal intranet. Viruses, worms and Trojan horses are among the many unwanted gifts attackers send out. This paper will try to cover all the topics related to the design of a DMZ with all the necessities.
Background image of page 2
Unit 4 3 Table of Contents Title Page………………………………………………………………………………………. .1 Abstract………………………………………………………………………………………….2 Table of Contents………………………………………………………………………………. .3 DMZ Drawing Information……………………. ..………………………………………………4 References………………………………………………………………………………………. .7
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2010 for the course IT 541 taught by Professor Cs during the Winter '10 term at Kaplan University.

Page1 / 6

Unit4_IT541 - Unit 4 1 Running Head DMZ CONFIGURATION DMZ Configuration for XYZ Corporation Jennifer Angel Kaplan University IT 541 Computer and

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online