security architecture and design discussion 2

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? How about if we move the

Don't use plagiarized sources. Get Your Custom Essay on
security architecture and design discussion 2
Just from $13/Page
Order Now

authentication system to a tier behind the DMZ, thus, a more trusted zone? What are the implications of doing so for authentication performance? For security?

Length: Minimum of 400 words

This assignment should be in APA format and have to include at least two references.