Determine the functions of security components, Computer Network Security

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities.

  • Secure WEB server hosting environment
  • Provide Internet browsing capability for internal users
  • Internal users access to the WEB servers for maintenance.
  • VPN access to internal system from the internet.
  • Identify the use and location of Firewalls where necessary
  • Identify the use and location of IPS/IDS where necessary.

Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each, Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Posted Date: 2/25/2013 1:09:41 AM | Location : United States







Related Discussions:- Determine the functions of security components, Assignment Help, Ask Question on Determine the functions of security components, Get Answer, Expert's Help, Determine the functions of security components Discussions

Write discussion on Determine the functions of security components
Your posts are moderated
Related Questions
doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

Explain the architecture of ISDN.....?

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

LOCALITY OF REFERENCE PRINCIPLE:  Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows: a) Spatial loca

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b