High school
Coursework
Finance & Accounting
Pages 4 (1004 words)
Download 0
Full Paper Title Name University The Demilitarized Zone (DMZ) The demilitarized zone operates as a part of a firewall configuration in order to secure the local area networks. If a DMZ is configured on the whole network or on specific workstations, they are known to be in a DMZ…

Introduction

Furthermore, the most significant advantage for a DMZ is that it protects the local area network domains by segregating the network layer (RE: [FW1] DMZ advantages). Likewise, the disadvantages associated with DMZ are not significant, but one issue can be highlighted, as the segregation may create a hassle for the network administration because DMZ requires frequent updates and maintenance. Moreover, the hardware cost is high and requires dedicated hardware in order to implement DMZ within the network. Deployment includes a switch, separate firewall and IDS etc. Intranet / Extranet The most significant advantage that is shared by both of these technologies is communication. However, intranet provides limited communication as compared to extranet, but it is still effective. In order to implement intranet, local area network and a host is required. The network must adhere to the requirements of the intranet application. Moreover, the application will be deployed on a separate workstation called as a host or server. The star topology is recommended for intranet-based networks as the network administrator can manage and administer intranet issues in a centralized environment. Furthermore, presence of intranet will enable new trends for communication. For example, paper less communication between employees, chatting, e-mails and blogs etc. disadvantage includes maintenance and security issues. ...
Download paper
Not exactly what you need?

Related papers

What is Security? Why Network Security is Important
2007) It is the twentieth century where improved communication technologies are inventing one after another. Internet has become a powerful and interactive carrier providing extensive activities and web services. Organizations expand their resources with the help of Internet. Websites are created, for informational purposes, advertisement, online shopping etc. In the modernized countries, Internet…
network design
The following is an analysis of the new network design solution for the Storage and Logistics Company: BACKGROUND DESCRIPTION Scenario: The business scenario of this analysis is based on a storage and logistics company located in London. The company has twenty vans that make deliveries in the Greater London area. The company also has one warehouse located directly outside of London. In this case…
IT security
In this scenario, most of the data stored is extremely secret and not intended for common people screening in addition to the outside business access. In addition, a lot of companies are exclusively dependent on their business and economical data which is proficiently stored in computers like any web based enterprise. In case of such businesses we can have customer records, private employee’s…
Assessing IT Security Measures of HSBC Bank
Pre defined and anticipated risks have to be assessed meticulously and the adequacy of safety measures has to be ascertained to incorporate all the necessary and change and improvements required in the security systems. This current study aims to identify the various security issues that have blemished HSBC’s image and status in the recent past. The report also features the security policy that…
Network Security Research
Moreover, these authentication procedures initialize at random intervals (CHAP, challenge handshake authentication protocol). Extensible Markup Protocol is more advanced as compare to CHAP as it supports multiple authentication methods. One more significant advantage EAP has that it executes on the link layer without IP address. Consequently, it is designed to support its own operations for…
The Impact of Social Network in Tourism
A number of studies have tried to find out how social networking are used by travelers as well as travel companies in this tourism market. Travel agencies are also increasingly realizing the need for promoting their services through social networking sites as membership of various social networking sites are increasing significantly day by day. This study aims at examining the impact of social…
Financial Regulation & Supervision
These regulations not only protect the firms involved in online transactions but also the cardholders from being exploited by the online frauds. Such compliance requirements have posed new challenges as to how to minimize compliance costs and continuously monitor the security systems to stay ahead of web criminals. Nevertheless, the benefits seem to surpass the costs associated with these…