



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
That was the resub of network security course
Typology: Summaries
1 / 5
This page cannot be seen from the preview
Don't miss anything!
The way DMZ promotes the security: Web: Web is the part of Internet which have many pages and outpoured by any Browser. It is the short of World Wide Web. As instance, if any client wants to access his or her website but does not know whether the website is attacked with any virus or not. For this if a DMZ is placed with internet before the website will check if the application is okay or not. If it is not okay, then the DMZ will not send the website. It may also stop the spammer from getting access on the website Mail: DMZ helps people to feel safe by protecting their personal messages. As DMZ notices and aids the network from getting any messages that may be harmful or may
contain any sorts of virus when it is checked. It also makes sure that that the emails are not displayed to an undesired traffic. As DMZ supplies traffic strain that makes sure that individual traffic is safe and doesn’t have a risk to harm the network that can be gained, so DMZ is important. Attacks from spammers and viruses are also controlled. It moderates if any hacker is trying to access in the inner network and assist the network not to get attacked by outer source. As the servers that the business uses remains revealed and as employees uses the internet for their communication purpose, so DMZ helps to form a hurdle between the internet and the network. Static IP
The examples regarding the evolution of NAT: Web: When a person browses a website. NAT makes sure that the history of browsing remains private and cannot be known. It secures the privacy of the history of information to remain unknown. The information may be related to both personal and professional. Since hackers may attack so NAT is important NAT guarantees that the hackers cannot hack or steal any information and cannot know from where to start. It makes sure that any personal information of both employee and client cannot be accessed by outsiders. NAT makes sure about the privacy and security of the business and protects them. Email: NAT provides security by protecting emails and messages by reducing the risk of people outside the network not able to send virus attacked messages and emails which helps by not getting spam messages in the network. It also reduces any security threat and provides security. Data protection: If any private data is kept secret, the NAT makes sure that outsiders cannot access the network. It becomes difficult for them to steal data. When it provides security then it guarantees that any unauthorised people cannot access it. NAT not only
protects secret data, but it also secures the network and identifies unauthorised access and cyber-attack threats.