Determine the functions of security components, Computer Network Security

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities.

  • Secure WEB server hosting environment
  • Provide Internet browsing capability for internal users
  • Internal users access to the WEB servers for maintenance.
  • VPN access to internal system from the internet.
  • Identify the use and location of Firewalls where necessary
  • Identify the use and location of IPS/IDS where necessary.

Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each, Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Posted Date: 2/25/2013 1:09:41 AM | Location : United States







Related Discussions:- Determine the functions of security components, Assignment Help, Ask Question on Determine the functions of security components, Get Answer, Expert's Help, Determine the functions of security components Discussions

Write discussion on Determine the functions of security components
Your posts are moderated
Related Questions
I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli