Discussion: Information System Security
a. What is the typical relationship among the untrusted network, the firewall, and the trusted network?
b. Describe how the various types of firewalls interact with network traffic at various levels of the OSI model.
c. What is a DMZ? Is this really an appropriate name for the technology, considering the function this type of subnet performs?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.