Determine the functions of security components, Computer Network Security

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities.

  • Secure WEB server hosting environment
  • Provide Internet browsing capability for internal users
  • Internal users access to the WEB servers for maintenance.
  • VPN access to internal system from the internet.
  • Identify the use and location of Firewalls where necessary
  • Identify the use and location of IPS/IDS where necessary.

Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each, Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Posted Date: 2/25/2013 1:09:41 AM | Location : United States







Related Discussions:- Determine the functions of security components, Assignment Help, Ask Question on Determine the functions of security components, Get Answer, Expert's Help, Determine the functions of security components Discussions

Write discussion on Determine the functions of security components
Your posts are moderated
Related Questions
WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at


Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S