THE WHATIS.COM WORD-OF-THE-DAY   
February 21, 2002 

DMZ 
______________ 
TODAY'S SPONSOR: VeriSign - The Value of Trust 

FREE E-COMMERCE SECURITY GUIDE       

Secure your servers with 128-bit SSL encryption! Grab your copy of 
VeriSign's FREE Guide, "Securing Your Web site for Business," and 
you'll learn everything you need to know about using 128-bit SSL to 
encrypt your e-commerce transactions, secure your corporate intranets
and authenticate your Web sites. 128-bit SSL is serious security for
your online business. Get it now!
http://ad.doubleclick.net/clk;3915446;5058249;q?http://www.verisign.com/cgi-bin/go.cgi?a=n094573230057000
______________   
TODAY'S WORD: DMZ 

See our definition with hyperlinks at 
http://searchwebmanagement.techtarget.com/sDefinition/0,,sid27_gci213891,00.html

In computer networks, a DMZ (demilitarized zone) is a computer host
or small network inserted as a "neutral zone" between a company's
private network and the outside public network. It prevents outside
users from getting direct access to a server that has company data.
(The term comes from the geographic buffer zone that was set up
between North Korea and South Korea following the UN "police action"
in the early 1950s.) A DMZ is an optional and more secure approach to
a firewall and effectively acts as a proxy server as well. 

In a typical DMZ configuration for a small company, a separate
computer (or host in network terms) receives requests from users
within the private network for access to Web sites or other companies
accessible on the public network. The DMZ host then initiates
sessions for these requests on the public network. However, the DMZ
host is not able to initiate a session back into the private network.
It can only forward packets that have already been requested. 

Users of the public network outside the company can access only the
DMZ host. The DMZ may typically also have the company's Web pages so
these could be served to the outside world. However, the DMZ provides
access to no other company data. In the event that an outside user
penetrated the DMZ host's security, the Web pages might be corrupted
but no other company information would be exposed. Cisco, the leading
maker of routers, is one company that sells products designed for
setting up a DMZ.


RELATED TERMS; 

firewall
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html

proxy server
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212840,00.html

______________________ 
SELECTED LINKS: 

Matt Curtin and Marcus J. Ranum's "Internet Firewalls: Frequently
Asked Questions" discusses DMzs.
http://www.interhack.net/pubs/fwfaq/

Cisco offers a white paper, "Building a Perimeter Security Solution 
with the Cisco Secure Integrated Software."
http://www.cisco.com/warp/public/cc/pd/iosw/ioft/iofwft/tech/firew_wp.htm
______________________ 
QUIZ #21 | We're Going to the Zoo! 

Looking around whatis.com, we discovered some fascinating animals. 
See how many of the creatures in our IT menagerie you can identify. 

http://whatis.techtarget.com/definition/0,,sid9_gci796012,00.html 

_______________________ 
KNOW IT ALL QUESTION OF THE DAY: 

This is the name for the issuer of a PKI certificate. 
a) man in the middle 
b) certificate authority 
c) Resource Access Control Facility 
d) script kiddy 

See the CORRECT ANSWER here... 

http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci803190,00.html
 

_________________________ 
STORAGE MAGAZINE EDITORIAL HIGHLIGHTS: MARCH ISSUE 

Here's a preview of our March topics: 
** Strategies to Manage the Explosion of Customer Data. 
** Storage Professionals are Hot. (A snapshot of the evolution of the
storage profession.) 
** How to Make NAS Work with Microsoft Exchange. 
** A Guide to Secure SANS. 
** Plus how September 11 changed disaster recovery for all  of us, 
and what's been learned about the use of tape, electronic, and disk 
backup. 

FREE 42-page storage networking special report with your FREE 
subscription. Subscribe today at: 
http://ad.doubleclick.net/clk;3802452;5058249;i?http://www.storagemagazine.com 
______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] gremlin 
http://whatis.techtarget.com/definition/0,,sid9_gci802852,00.html 

[2] Certificate Revocation List 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci803160,00.html 

[3] summation 
http://whatis.techtarget.com/definition/0,,sid9_gci803210,00.html 

[4] Mathematical Symbols 
http://whatis.techtarget.com/definition/0,,sid9_gci803019,00.html 

[5] turnkey 
http://searchwindowsmanageability.techtarget.com/sDefinition/0,,sid33_gci802329,00.html
 

____________________________________________________________________ 
:::::::::::::::::::  WHATIS.COM CONTACTS   ::::::::::::::::::: 

LOWELL THING, Site Editor ([EMAIL PROTECTED]) 
____________________________________________________________________ 

MARGARET ROUSE, Assistant Editor ([EMAIL PROTECTED]) 
___________________________________________________________________ 
::::::::::::::::::::  ABOUT THIS NEWSLETTER   ::::::::::::::::::::: 

Created by TechTarget (http://www.techtarget.com) 
 TechTarget - The Most Targeted IT Media 
 Copyright 2002, All Rights Reserved. 

If you would like to sponsor this or any techtarget newsletter, 
please contact Gabrielle DeRussy at [EMAIL PROTECTED] 
If you no longer wish to receive this newsletter simply reply to this
message with "REMOVE" in the subject line.  Or, visit
http://WhatIs.techtarget.com/register and adjust your subscriptions
accordingly.

If you choose to unsubscribe using our automated processing, you must
send the "REMOVE" request from the email account to which this
newsletter was delivered.  Please allow 24 hours for your "REMOVE"
request to be processed.

Reply via email to