Determine the functions of security components, Computer Network Security

Assignment Help:

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities.

  • Secure WEB server hosting environment
  • Provide Internet browsing capability for internal users
  • Internal users access to the WEB servers for maintenance.
  • VPN access to internal system from the internet.
  • Identify the use and location of Firewalls where necessary
  • Identify the use and location of IPS/IDS where necessary.

Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each, Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.


Related Discussions:- Determine the functions of security components

Evaluate the percentage availability of the network, QUESTION a) "Two ...

QUESTION a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite." Decribe what you understand by this statement. b) A

Discuss five alternative testing techniques, QUESTION Testing of a Busi...

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Computer security, Implementing an effective online authentication scheme i...

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

Ciphertext, Encode the following plaintext, using the Caesar cipher: ...

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

The cost benefit analysis (cba) formula, The Cost Benefit Analysis (CBA) Fo...

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

Discuss the importance of ontologies in agent communication, Question 1...

Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Plaintext, how to encryt the data in plaintext cipher

how to encryt the data in plaintext cipher

Firewall architectures-screened subnet architecture, Screened Subnet Archit...

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

Factors of informtion security, Confidentiality Confidentiality of inform...

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd