View Single Post
Old 03-15-2014, 02:45 PM   #18
theducks
Well trained by Cats
theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.theducks ought to be getting tired of karma fortunes by now.
 
theducks's Avatar
 
Posts: 31,122
Karma: 60406498
Join Date: Aug 2009
Location: The Central Coast of California
Device: Kobo Libra2,Kobo Aura2v1, K4NT(Fixed: New Bat.), Galaxy Tab A
Quote:
Originally Posted by chaley View Post
Still

Because the same processor that controls the router security has direct access to the disc. Should some bad guy figure out how to penetrate the router, job done. If the storage is across the local LAN, then the bad guy must penetrate the router, and then penetrate the machine hosting the storage using only the access the LAN gives, adding a second layer of difficulty and another opportunity to detect the intrusion.

The is the same logic that people use when they set up a DMZ: a section of the LAN that is behind the entry router but in front of the company's assets. Customer-facing servers live there, getting their data through a security gateway between the DMZ and the company's computing infrastructure. Some people actually use 2 DMZs, putting the internal/external shared data in the second while putting the rest of the infrastructure after the second.
Still Point taken
theducks is offline   Reply With Quote