What are some of the risks of not securing a DMZ?

5 pts.
Tags:
DMZ
Security
A user has been included in an Organizations DMZ. What are the risks of this and how can damage be prevented?

Answer Wiki

Thanks. We'll let you know when a new response is added.

In most circumstances, a network’s DMZ, or demilitarized zone, serves as a semi-secure buffer between the Internet and the private information stored on the internal network. This allows hosts from outside the secure area to interact with specific hosts in the internal network, in a limited capacity, and for certain internal hosts to reach out to the Internet. By lowering the security of the DMZ, either by opening access to additional internal hosts from the Internet or allowing more interactions with the accessible internal hosts, more sensitive information may be exposed to tampering, and the firewalls protecting the DMZ and the internal network can be more easily compromised. One common method of mitigating these risks is to configure a separate CMZ, or classified militarized zone, to handle the Web servers under closer monitoring, while the DMZ handles tasks like the application firewall and file transfer protocols.

Discuss This Question:  

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: