University of the Cumberlands
School of Computer and Information Sciences
Instructor: Dr. Charles DeSassure
Class: ISOL536-Security Architecture and Design
Assignment: Week 3 Group Discussion 2
Length: Minimum of 400 words
Total points: 100 points
Due date: Sunday, May 24, 2020
You are required to create 1 new thread and provide substantive comments on at least 2 threads
created by other students.
• APA writing required.
• Your initial post should have two refernces with in-text citation.
• Make sure to explain and backup your responses with facts and examples.
• It is recommended that you conduct reserech for better undrestand of any key terms if it is not
clear.
What happens when we place the authentication system in your demilitarized zone (DMZ)—that is,
in the layer closest to the Internet? What do we have to do to protect the authentication system?
Does this placement facilitate authentication in some way? How about if we move the authentication
system to a tier behind the DMZ, thus, a more trusted zone? What are the implications of doing so
for authentication performance? For security?