0% found this document useful (0 votes)
21 views

Network Security Assignment

The document discusses a research on DMZ networks. A DMZ provides an extra layer of security by isolating an organization's internal LAN from untrusted external traffic. In a DMZ, external-facing servers like web and mail servers are placed and isolated with limited access to the internal LAN, making it difficult for hackers to gain direct access. The DMZ acts as a buffer between the internet and private network, isolated by firewalls.

Uploaded by

richard senior
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Network Security Assignment

The document discusses a research on DMZ networks. A DMZ provides an extra layer of security by isolating an organization's internal LAN from untrusted external traffic. In a DMZ, external-facing servers like web and mail servers are placed and isolated with limited access to the internal LAN, making it difficult for hackers to gain direct access. The DMZ acts as a buffer between the internet and private network, isolated by firewalls.

Uploaded by

richard senior
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

NETWORK SECURITY ASSIGNMENT

INDEX NUMBER: BT/ITN/23/044


NAME: FRANCIS BAIDOO

Question1.
A research on DMZ (demilitarized zone).

A DMZ, also known as a demilitarized zone, is a perimeter network that


provides an extra layer of security for an organization’s internal local-area
network (LAN) by isolating it from untrusted traffic.
The primary goal of a DMZ network is to allow the organization to access
untrusted networks (such as the internet) while ensuring the security of its
private LAN.
In a DMZ, external-facing services (such as web servers, DNS servers, FTP
servers, mail servers, and VoIP servers) are placed. These servers are isolated
and have limited access to the internal LAN, making it difficult for hackers
to gain direct access to the organization’s data and internal servers via the
internet1.
How Does a DMZ Network Work?:
Businesses with public websites need to make their web servers accessible to
the internet. To protect the corporate LAN, the web server is installed on a
separate computer within the DMZ.
The DMZ acts as a buffer between the internet and the private network. It is
isolated by a security gateway (such as a firewall) that filters traffic between the
DMZ and the LAN.
Ideally, the DMZ is located between two firewalls. Incoming network packets
are observed by a firewall (or other security tools) before reaching the servers
hosted in the DMZ.
Even if an attacker bypasses the first firewall, they must also access the
hardened services in the DMZ before causing damage. If they compromise a
system in the DMZ, they still need to get past an internal firewall to access
sensitive corporate data.
Some organizations install a proxy server in the DMZ to simplify
monitoring, centralize web content filtering, and ensure controlled internet
access1.
In summary, a DMZ provides an essential security layer, allowing organizations
to balance external accessibility with internal network protection.

Question 2

Importance of firewalls.

Firewalls play a crucial role in network security. Here are some key benefits of
using firewalls:
Monitors network traffic: Firewalls analyse data coming in and out of your
systems, helping to identify and prevent threats. By enforcing pre-established
rules and filters, firewalls act as a first line of defence against external threats,
malware, and hackers.
Stops virus attacks: Firewalls control system entry points, preventing virus
attacks. With the constant emergence of new threats, having a firewall in place
is essential to keep your systems healthy and secure.
Prevents hacking: As businesses increasingly rely on digital operations,
firewalls become even more critical. They prevent unauthorized access by
hackers, safeguarding your data, emails, and systems.
Stops spyware: Spyware and malware can infiltrate systems, steal data, and
control computers. Firewalls act as a vital barrier against these malicious
programs, protecting your network.
Promotes privacy: By proactively securing data, firewalls build an
environment of privacy that clients can trust. Upgraded data-protection systems
can also be a competitive advantage.
In summary, firewalls are essential for maintaining the security and integrity of
your network and data.

You might also like