I’m studying for my Computer Science class and don’t understand how to answer this. Can you help me study?
Course: Security Architecture and Design
Part B: Discussion Topic
What happens when we place the authentication system in your demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? What are the implications of doing so for authentication performance for security?
Step 1: Initial discussion should be minimum of 400 words
Step 2: respond to 2 peer students discussion topics
– Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Part D: Power Shell related question
See attached Part-D attachment in which highlighted in yellow need to be answered
Reference:
Title: Securing Systems
Subtitle: *PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS
ISBN: 9781482233971
Authors: Brook S. E. Schoenfield
Publisher: CRC Press
Publication Date: 2015-05-20