There are many scenarios one might encounter when examining defense perimeters. These include the single router, defense-in-depth, and demilitarized zone (DMZ) methods. Each has a strategic approach geared specifically toward the environment in which they are housed.
In your discussion post:
- Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently different from all others
- Justify its use based on an organization's structure and needs; take a moment and think about if an organization is large or small or covert or publicly operated.
- Explain if you think all of these configurations are constructed to, basically, defend themselves against the same threats. For example, can a DMZ provide a better defense perimeter against all threats than a single, web-facing router? If so, how and are there any special security issues one might address not found in the others?