You will be required to provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your responses with facts and examples. This assignment should be

Santosh Vempaty 

COLLAPSE

Top of Form

System Authentication and DMZ

The computer security a demilitarized zone is a network area that deals with both internal and external networks. DMZ may not connect to the internal network and the hosts are dealing with the service providers from the external networks. Sometimes the internal net networks the legal ways to the external networks from the dead-end of the DMZ. The process mainly provided system security (Chen & al., 2017). Simple it would say about the settings between the two network systems. It would easy way to develop public services that are related to email, VPN, etc. in this DMZ they have some machines that are considered as low security when compared to the local area network systems.  It was working like a firewall system so it can’t allow others to access it. We accessing internet services the DMZ will protect the servers.

 In DMZ was designed as two types of architectures are there. The first one is with a single firewall and dual firewalls architecture systems. They are different benefits with the DMZ  approaches those are firewalls for different purposes, it can easily find out the traffic analysis in different areas of the particular network. In this technique, inherency was laser safe from accessing critical resources. These two firewalls called back to back DMZ technique (Garzón & Castellar, 2017). The fastest DMZ can process the packet filtering that shows increases the performance of the public provided services and second processes layer filtering was very slow that is working for the internal networks without impacting the performance of the other things. In DMZ they have typical components are there. For that kind of service, we made a web presence advertising the products of the particular services (Vats & al., 2020).

 In that public servers are being named to the several IP addresses. Internet application servers are working was more complex to work and relays the emails and mails from the intranet servers. In DMZ we have a different type of data zones are there (Chen & al., 2017). Those are the data management zone, demarcation zone, and perimeter network. DMZ is having their characteristics it accesses the different network ID from the internal network and this is used whether it is public or private addresses depends on the architecture. There was a subnet block was there that is called as ISP (Garzón & Castellar, 2017). And this would separate the internet and internal network. There is one drawback with this DMZ process that is vulnerability can exist with the firewalls and also with the shared network systems (Vats & al., 2020). 

Bottom of Form




Chandan Kumar 

Week 2 Group Discussion 2

COLLAPSE

Top of Form

In a DMZ place in a production environment, it must be configurable to achieve both redundant VPN and high availability; it recommends to configure at least two different VPN networks. When a physical system separates into two, the public/private VPN networks are always the same type and should always be connected. It is recommended not to join the VPN networks together in the complexity of Zone and Traffic Network Design. If there are different security levels in these different zones, it may be impossible to know what is going on in each zone (Schoenfield, 2015). But the IT dept could provide uniformity of zones and traffic through implementing variable transport policies. IT administrators would understand the underlying network topology and configuration. The physical connection between the virtual and physical networks will ignore, but most of the time, will find both services and systems on the physical web. There can be different types of Adjacency, depending on different security levels. For example, the trusted link traffic will pass directly to the given physical network, whereas the unsecured traffic will be disconnected (Peisert et al., 2018).

For Cloud-Based DMZ Architectures, the hard work done by the DMZ component of the Cross-network Web Application. On these online applications, there are several interconnecting high-density systems. Cloud-Based DMZ Architectures: Challenges Most DMZs not cover by WAN capabilities and were purely and elementally operational (Zhou et al., 2015). They could think of them as a natural field where they would build my Virtual Private Cloud. Typically, it would reuse existing hardware because they were only allowing one or two parties known as Scheduling Agents into their DMZ for performance reasons that lose out on the benefits of a right virtual private cloud. It is Applying for Web Application Trusts and Permissions in DMZ-Based Cross-Network Web Applications. Each IP address will represent by an IP Sharing and an IP address (Peisert et al., 2018).

It is the most critical discussion point for any security architecture, which is the source of many security vulnerabilities, once vulnerabilities get through the firewalls and software firewalls. To illustrate the end, the DMZ is one of the lowest layer attack vector to allow a user to spread malicious code over the virtual network. Just imagine a low-level malicious code that runs to the cloud device using any combination of techniques mentioned (Zhou et al., 2015). Most VPN protocols do this before tunnelling data over the VPN and would pass malicious codes through the secure protocol. Citrix offers two different Virtual Machine deployment options to suit the needs of various use cases. COTS and VSAN. VSAN base on Parallels Cloud, which also makes COTS virtualization easier. With container virtualization, the production deployment setup is less complicated. It might have an advantage for the smaller business. Container-based solutions offer an excellent capability to backup and manage the VM copies in case something goes wrong during the deployment (Schoenfield, 2015).

Bottom of Form



Prudhvi Narayana Yalavarthi 

Week 2

COLLAPSE

Top of Form

Authentication System in Demilitarized Zone

          The authentication system in the DMZ is used for providing the network with extra protection internally and externally for the corporate network access. The DMZ or demilitarized zone is said to be the network area that is close to the internet which has both the internal and the external network but the internal network is protected with an authentication gateway system that restricts any unauthorized access in the internal network. The authentication system creates protection to the internal demilitarized area to protect the confidential data from getting breached or hacked.

Authentication system protection

          The authentication system is the security measure that secures confidential data from any unauthorized access. The authentication is a procedure to protect the system through the verification of the authorized credentials of the user and provide the security management with the details of every access. The authentication system of a network can be protected with reinforced and authorized credentials. A strong password and username make the authentication system strong and complicated for the hacker to crack (Arppe-Tabbara et al.,  2019). There are also certain other ways through which the authentication system can be protected such as multifactor authentication which creates a multi-layer gateway for the user to get access, Token based authentication, certificate-based authentication, etc.

Placement facilitating authentication

          The placement of the authentication system in the demilitarized zone is to ensure that the security system of the network is through proper which is complicated for a hacker to hack the network (Khan & Alotaibi, 2020). The authentication system of a security system ensures consistent application of the security policies and configurations which are easy for the organization to get access into the internal network through the protective gateway while the unauthorized entity can only get access to the external network but it is not possible for the hackers to get through the internal network.

Placing the authentication system behind DMZ

          The authentication of a network implies the protection of the confidential data that is stored in the network. By moving the placement of the authentication system behind the demilitarized zone, it will protect the internal network and resources of the organization that is stored in it (Sajjad et al., 2019). With the authentication system, the internal system will be secured with double-layered protection as the user have to go through the gateway to get access into the internal network.

Implication of authentication performance

          The implication of the authentication system in the DMZ adds an extra layer of security to the organization’s security system that secures confidential data both physically and logically. The factors of the authentication system are used by the security system of the organization for the verification of the user identity for every access into the internal network.

Bottom of Form