2023 IT Examiner School
Internal Use Only
Network Topology: Security Zones The topology can be broken down into three risk zones: • Trusted (Intranet) • Semi-trusted (Demilitarized Zone or DMZ, Third Party, Cloud) • Untrusted (Internet)
Internal Use Only
Network Topology: Trusted
Made with FlippingBook - Share PDF online