• Home
  • Blog
  • Security Architecture & Design Discussion

Security Architecture & Design Discussion

0 comments

What happens when we place the authentication system in your demilitarized
zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do
to protect the authentication system? Does this placement facilitate
authentication in some way? How about if we move the authentication system to
a tier behind the DMZ, thus, a more trusted zone? What are the implications of
doing so for authentication performance? For security?

NOTE: Address the
questions in an essay format. Please do not retype and answer the questions
separately because they are not. Your writing should fit and flow together.

You are required to provide substantive comments on two threads created by other students.

• APA writing is required.

• Your initial post should have two references with in-text citations.

• Make sure to explain and back up your responses with facts and examples.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}