What is the typical relationship between the untrusted network the firewall and the Trusted network?

It is amazing what technology is able to do today. Firewalls can prevent catastrophe and networks can be made so that they are incredibly secure and only in need of minor daily monitoring to make sure that no one was able to break in. Very informative; thank you!

sheilt IAM Blog

We shall begin with a definition of the three items; an untrusted network is external to an organizations owned and operated network. The organization has no control and or administration of the untrusted networks even though they must traverse them to get to their desired endpoints.  The Firewall is a combination of physical hardware and software built to control network traffic inbound or outbound to networks that have different levels of security postures (National Institute of Standards and Technology (NIST), 2017).  The trusted network is internal to an organization’s network in which they have full control with administrative power (Fossbytes Media Pvt Ltd, 2017).

Typically devices on an untrusted network are there to provide some sort of service to the global user community. For instance a mail forwarding server for users of an open source email application.   The server and application are funded by users who use the service.  Also…

View original post 425 more words

Skip to content

We shall begin with a definition of the three items; an untrusted network is external to an organizations owned and operated network. The organization has no control and or administration of the untrusted networks even though they must traverse them to get to their desired endpoints.  The Firewall is a combination of physical hardware and software built to control network traffic inbound or outbound to networks that have different levels of security postures (National Institute of Standards and Technology (NIST), 2017).  The trusted network is internal to an organization’s network in which they have full control with administrative power (Fossbytes Media Pvt Ltd, 2017).

Typically devices on an untrusted network are there to provide some sort of service to the global user community. For instance a mail forwarding server for users of an open source email application.   The server and application are funded by users who use the service.  Also the users really like the application because it’s not fat-ware like other email applications (Outlook, GroupWise etc…) that chew up gigabytes of hard drive space and slow the computer processing times.  Other devices are out in the untrusted network (where the user has no control over the network), but the device and application is on a network segment that is under some organizational control.

The firewall is a hardware and software system that protects network traffic inbound from possible cyber-crime and also protects user outbound by limiting there possible destinations of known bad sites. The software portion of the firewall is quite intense in what it can do and it also depends on where the firewall is placed on the network.  There could be several layers of firewalls that form a defense in depth framework that gets more and more detailed in what can come in and what can go out of the networks.  Another thing about firewalls is there are several types that are used at the different levels performing work in conjunction with other network devices like an authentication service, a domain name service or a remote access service.  The US Government several years ago (2009) instituted a government wide effort to protect the inside networks from the outside networks.  This effort “Trusted Internet Connection (TIC) Initiative”, as outlined in OMB Memorandum M-08-05 is to optimize and standardize internal government connections (Department of Homeland Security, 2017).

The trusted network is all about the connections, data and users that are protected by the overarching control of that organization. As the document from DHS TIC Architecture 2.0 states “The initiative will improve the Federal Government’s security posture and incident response capability through the reduction and consolidation of external connections …awareness of external untrusted network connections”. One of the main points of the TIC initiative is to organize the networks based on a zone of trust level that dictates the level of control an organization will have over each of the zones utilized.  The Internal zone (Trusted Network) requires specific security functions than the External zone (Untrusted Network) requires.  That said, when a government agency designs a trusted network they must follow the TIC guidelines and add the appropriate levels of security to each level.

References

Department of Homeland Security. (2017). Trusted Internet Connections. Retrieved from Homeland Security: https://www.dhs.gov/trusted-internet-connections

Fossbytes Media Pvt Ltd. (2017). What is. Retrieved from Fossbytes Media Pvt Ltd. Web site: https://fossbytes.com/types-of-networks-trusted-untrusted-and-unknown-networks/

National Institute of Standards and Technology (NIST). (2017). NIST Special Publications. Retrieved from NIST Computer Security Division: http://csrc.nist.gov/publications/PubsSPs.html

Post navigation


What is typical relationship among the untrusted network the firewall and the Trusted network?

-The untrusted network refers to the internet. -The trusted network refers to the privately owned network. -The firewalls filters traffic from the untrusted network to the trusted network to ensure it is legitimate and not harmful.

What is the difference between a trusted network and an untrusted network?

Computers using trusted networks are more secured and confidential because of strong firewalls. Untrusted networks: Such networks are usually administered by the owners. They can allow improper access to sensitive or personal data. These machines are usually separate.

What is the barrier between trusted and untrusted network?

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

Is an intermediate area between a trusted network and an untrusted network?

(DeMilitarized Zone) A middle ground between an organization's trusted internal network and an untrusted, external network such as the Internet. Also called a "perimeter network," the DMZ is a subnetwork (subnet) that may sit between firewalls or off one leg of a firewall.