DMZ networks
• Internal and external firewalls
• Virtual Private Network (VPNs)
• distributed computing environment
• uses encryption and authentication in the lower protocol layers to provide a secure connection through an otherwise insecure network
• Distributed Firewalls
• Stand-alone firewall devices plus host based firewalls working together under
a central administrative control