CFP last date
22 April 2024
Reseach Article

DeMilitarized Zone: Network Architecture for Information Security

by Sourabh Shrimali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 5
Year of Publication: 2017
Authors: Sourabh Shrimali
10.5120/ijca2017915389

Sourabh Shrimali . DeMilitarized Zone: Network Architecture for Information Security. International Journal of Computer Applications. 174, 5 ( Sep 2017), 16-19. DOI=10.5120/ijca2017915389

@article{ 10.5120/ijca2017915389,
author = { Sourabh Shrimali },
title = { DeMilitarized Zone: Network Architecture for Information Security },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 5 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number5/28402-2017915389/ },
doi = { 10.5120/ijca2017915389 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:20.315445+05:30
%A Sourabh Shrimali
%T DeMilitarized Zone: Network Architecture for Information Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 5
%P 16-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information Security refers to the protection of any network and its underlying data. It prevents a network from an unauthorized access, misuse, modification, and deletion of any data inside the network. It targets various security threats and stops them from entering or spreading into the network. It consists of multiple layers of defense in the network; this is known as Defence in Depth Principle. In this each layer has its own policies and protocols to implement; its main aim is to give access to authorized users while blocking malicious users that are carrying threats. DeMilitarized Zone is the kind of Network Security that based on the Principle of Defence in Depth. It is also represent as “DMZ”.

References
  1. DMZ (Computing), available at https://www.wikipedia.org/DMZ_(Computing)
  2. Network DeMilitarized Zone – Jack Webb, available at http://www.infosecwriters.com/Papers/jwebb_network_demilitarized_zone.pdf
  3. DeMilitarized Zone (DMZ) – Secure your server network, available at http://omni-bridge.com/blog/2015/09/demilitarized-zone-dmz-secure-your-server-network
  4. Graphical Network Simulator, available at https://www.csd.com/material/GNS3-0.5-tutorial.pdf
  5. Wireshark: Getting Started, available at http://www.staff.ustc.edu.cn/~bhua/Kurose_Labs/Wireshark_INTRO_July_22_2007.pdf
  6. Network Security, available at https://www.cisco.com/products/security/network-security.html
  7. Designing a DMZ – SANS Institute, available at https://www.sans.org/readingroom/whitepapers/firewalls/designing-dmz-950
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Information Security Defence in depth Principle DeMilitarized Zone Perimeter Network Confidential Data and Cyber Breach.