THE WHATIS.COM WORD-OF-THE-DAY February 21, 2002 DMZ ______________ TODAY'S SPONSOR: VeriSign - The Value of Trust
FREE E-COMMERCE SECURITY GUIDE Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide, "Securing Your Web site for Business," and you'll learn everything you need to know about using 128-bit SSL to encrypt your e-commerce transactions, secure your corporate intranets and authenticate your Web sites. 128-bit SSL is serious security for your online business. Get it now! http://ad.doubleclick.net/clk;3915446;5058249;q?http://www.verisign.com/cgi-bin/go.cgi?a=n094573230057000 ______________ TODAY'S WORD: DMZ See our definition with hyperlinks at http://searchwebmanagement.techtarget.com/sDefinition/0,,sid27_gci213891,00.html In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. (The term comes from the geographic buffer zone that was set up between North Korea and South Korea following the UN "police action" in the early 1950s.) A DMZ is an optional and more secure approach to a firewall and effectively acts as a proxy server as well. In a typical DMZ configuration for a small company, a separate computer (or host in network terms) receives requests from users within the private network for access to Web sites or other companies accessible on the public network. The DMZ host then initiates sessions for these requests on the public network. However, the DMZ host is not able to initiate a session back into the private network. It can only forward packets that have already been requested. Users of the public network outside the company can access only the DMZ host. The DMZ may typically also have the company's Web pages so these could be served to the outside world. However, the DMZ provides access to no other company data. In the event that an outside user penetrated the DMZ host's security, the Web pages might be corrupted but no other company information would be exposed. Cisco, the leading maker of routers, is one company that sells products designed for setting up a DMZ. RELATED TERMS; firewall http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html proxy server http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212840,00.html ______________________ SELECTED LINKS: Matt Curtin and Marcus J. Ranum's "Internet Firewalls: Frequently Asked Questions" discusses DMzs. http://www.interhack.net/pubs/fwfaq/ Cisco offers a white paper, "Building a Perimeter Security Solution with the Cisco Secure Integrated Software." http://www.cisco.com/warp/public/cc/pd/iosw/ioft/iofwft/tech/firew_wp.htm ______________________ QUIZ #21 | We're Going to the Zoo! Looking around whatis.com, we discovered some fascinating animals. See how many of the creatures in our IT menagerie you can identify. http://whatis.techtarget.com/definition/0,,sid9_gci796012,00.html _______________________ KNOW IT ALL QUESTION OF THE DAY: This is the name for the issuer of a PKI certificate. a) man in the middle b) certificate authority c) Resource Access Control Facility d) script kiddy See the CORRECT ANSWER here... http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci803190,00.html _________________________ STORAGE MAGAZINE EDITORIAL HIGHLIGHTS: MARCH ISSUE Here's a preview of our March topics: ** Strategies to Manage the Explosion of Customer Data. ** Storage Professionals are Hot. (A snapshot of the evolution of the storage profession.) ** How to Make NAS Work with Microsoft Exchange. ** A Guide to Secure SANS. ** Plus how September 11 changed disaster recovery for all of us, and what's been learned about the use of tape, electronic, and disk backup. FREE 42-page storage networking special report with your FREE subscription. Subscribe today at: http://ad.doubleclick.net/clk;3802452;5058249;i?http://www.storagemagazine.com ______________________________ RECENT ADDITIONS AND UPDATES [1] gremlin http://whatis.techtarget.com/definition/0,,sid9_gci802852,00.html [2] Certificate Revocation List http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci803160,00.html [3] summation http://whatis.techtarget.com/definition/0,,sid9_gci803210,00.html [4] Mathematical Symbols http://whatis.techtarget.com/definition/0,,sid9_gci803019,00.html [5] turnkey http://searchwindowsmanageability.techtarget.com/sDefinition/0,,sid33_gci802329,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Assistant Editor ([EMAIL PROTECTED]) ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Created by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. If you would like to sponsor this or any techtarget newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://WhatIs.techtarget.com/register and adjust your subscriptions accordingly. If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.