Security Architecture and Design Authentication System in DMZ Discussion
I’m studying for my Computer Science class and need an explanation.
Course: Security Architecture and Design
Discussion Topic:
What happens when we place the authentication system in your demilitarized
zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do
to protect the authentication system? Does this placement facilitate
authentication in some way? How about if we move the authentication system to
a tier behind the DMZ, thus, a more trusted zone? What are the implications of
doing so for authentication performance? For security?
NOTE: Address the
questions in an essay format. Please do not retype and answer the questions
separately because they are not. Your writing should fit and flow together.
Part A: Initial discussion should be minimum of 400 words
Part B: respond to 2 peer students discussion topics
– Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Reference:
Title: Securing Systems
Subtitle: *PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS
ISBN: 9781482233971
Authors: Brook S. E. Schoenfield
Publisher: CRC Press
Publication Date: 2015-05-20