Question

any articles discussion about security design elements (DMZs, VPNs, VLANs, trunks, Remote Access, NATs, etc.)

any articles discussion about security design elements (DMZs, VPNs, VLANs, trunks, Remote Access, NATs, etc.)

Homework Answers

Answer #1

DMZ is the method with which we can have great level of security. This is called the demilitarized zone, a logically different network which is separated from the untrusted networks and servers. So in this, there are very limited servers which are accessible from the outside but the internal LAN will remain disconnected from the other untrusted networks.

VPN's: This is another way to work with security, this creates a tunnel between the host and the server and thus there could be no hacker present between them both and the content sent across the tunnel is sent after encryption. Thus if someone got some packets, one is not able to retrieve the information out of it. Thus this could be a helpful method for secure connections.

VLAN's: This is called virtual local network, this basically divides the local area network into more discrete small networks, Thus if we want to not share information between some set of endpoints then we can put them to other VLAN's in order to make them not connect to some.

Remote Access: This is another security method to connect to a computer which is present at some other place. This also creates a VPN tunnel between two machines and let one connect to other machines remotely and can control it from other location.

NAT's: This is another method which can help to provide the same set of IP addresses to computers connected to a network. With this, there could be the same IP address PC present in two different networks. But due to this NAT i.e network address translation, we are able to convert the addresses while sending a packet from the network or receiving.

Thus above are some of the security design elements.

Thanks

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Discussion about: Essential Elements Some elements are essential to our health, like oxygen that makes up...
Discussion about: Essential Elements Some elements are essential to our health, like oxygen that makes up carbohydrates, fats, proteins, and DNA. Mention another two elements (essential or non-essential) and discuss their function in our body and why they are important to the well-being of human body. Do not repeat other students answers. Best Regards,
Part 2: Identify one or more review articles (or primary literature articles) about your cell part....
Part 2: Identify one or more review articles (or primary literature articles) about your cell part. You may use either PubMed, Google Scholar, Science Direct, and/or Web of Knowledge. If you have trouble finding articles about your cell part, be sure that you search using multiple different search terms and in multiple different places. For example if you were assigned Nucleus you might search for “Nucleus”, “Nuclear trafficking”, “Nuclear Lamina”, “Nuclear Pore complex” etc. When using PubMed, be sure to...
After trying other design models, think about what elements you need to address in your project...
After trying other design models, think about what elements you need to address in your project on the User interface of a new smartwatch built specifically for athletes. Make a list to discuss #No plagiarism, please
Network security implementation can be explained with any of the following, except one. Justify your choice....
Network security implementation can be explained with any of the following, except one. Justify your choice. Network security implementation is the act of designing, installing, deploying, and configuring network security. Confidentiality, integrity, availability, privacy, authentication, authorization, nonrepudiation, and accounting are common security goals in network design and defense in depth. A significant portion of network security is about making the right technology choices without falling into easy traps or defaults—hence, it is notable that Internet Protocol Version 4 (IPv4) typically...
Q1- Design and write about any IT project scope statement.    Q2- Develop project plan and...
Q1- Design and write about any IT project scope statement.    Q2- Develop project plan and estimate project duration and budget.
Let's use this discussion forum to talk about which firm you intend to write about for...
Let's use this discussion forum to talk about which firm you intend to write about for your first paper. I will respond to your ideas and try to steer you in the right direction. Remember that when we say "the firm," we're talking about any hypothetical private business. For this paper assignment, you need to write about one, particular firm. So, for example, Microsoft is a firm, while the Gates Foundation is not. Please note: This either needs to be...
Any topic about design an experiment has two outcomes with success and failure. (binomial experiment) example?...
Any topic about design an experiment has two outcomes with success and failure. (binomial experiment) example? Why you choose and why did it interest you? What counts as a success and failure? THANKYOU!!!
I need to submit research design paper about seven or ten pages (any topic is ok)...
I need to submit research design paper about seven or ten pages (any topic is ok) a sketch of a research project, the contribution that it will make, the methods of research, the types of data to be examined, the mode of analysis, the nature of conclusions anticipated and also, an analytic critique of research design, indicating its strengths and weaknesses in solving the research puzzle and contribution and limitation to progress in scientific knowledge of research discipline must be...
Not sure how to go about this... Design a brief 5-item survey on any topic you'd...
Not sure how to go about this... Design a brief 5-item survey on any topic you'd like. Provide a brief introduction to your survey. Make sure to use at least one closed-ended question, one partially close-ended question, and one open-ended question. Pay attention to the layout and presentation of your survey so it is not confusing to readers.
This week you learned about childhood neurological disorders (autism, ADHD, Intellectual functioning, etc.) and those which...
This week you learned about childhood neurological disorders (autism, ADHD, Intellectual functioning, etc.) and those which arise in older age called neurocognitive disorders (Alzheimer's, Delirium, etc.). Unfortunately for most of these disorders, there is no cure. Two disorders in particular we can anticipate to see an increase are Alzheimer's and Autism. Both of these disorders are lifelong conditions. For neurodevelopmental disorders, the number of children with autism has risen in the past decade. There may be a number of explanation...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT