What happens when we place the authentication system in your demilitarized zone (DMZ)
Part1: What happens when we place the authentication system in your demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? What are the implications of doing so for authentication performance for security? (Minimum of 400 words)
Part2: You are also required to post a response with facts and examples to a minimum of 2 other student in the class. (80-100 Words per response)
Answer preview to what happens when we place the authentication system in your demilitarized zone (DMZ
APA
458 words