Let's talk about the various mitigation techniques that are used for security threats on a network infrastructure a little bit more.
Mitigation techniques
Network segmentation – Demilitarized Zone (DMZ)
Most organizations have servers that are accessible by users of the public internet. Some of these servers are web servers and email servers. It's definitely not recommended to allow any traffic originating from the internet to access your internal, private network. Creating a DMZ to place these publicly accessible servers is highly recommended.
The DMZ is a semi-trusted segment of the company's network that allows users from the internet limited access to devices in this area, which is why it's...