Determine the functions of security components, Computer Network Security

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities.

  • Secure WEB server hosting environment
  • Provide Internet browsing capability for internal users
  • Internal users access to the WEB servers for maintenance.
  • VPN access to internal system from the internet.
  • Identify the use and location of Firewalls where necessary
  • Identify the use and location of IPS/IDS where necessary.

Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each, Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Posted Date: 2/25/2013 1:09:41 AM | Location : United States







Related Discussions:- Determine the functions of security components, Assignment Help, Ask Question on Determine the functions of security components, Get Answer, Expert's Help, Determine the functions of security components Discussions

Write discussion on Determine the functions of security components
Your posts are moderated
Related Questions
Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G