Means "demilitarized zone." In computing, a DMZ is a section of a network between the intranet and a public network such as the Internet. It may contain a number of computer systems or single host.
The purpose of a DMZ is to protect an intranet from external access. By separating the intranet from hosts that can be accessed outside of a local area network (LAN), internal systems are protected against unauthorized access from outside the network. For example, a company may have an intranet consisting of their workstations. Public enterprise servers, such as web server and mail server can be placed in a DMZ so that they are separate workstations. If the servers were compromised by an external attack, internal systems would not be affected.
A DMZ can be configured in several different ways, but two of the most common include a basic firewall architectures and dual firewall. In a configuration of single firewall, intranet and DMZ are on separate networks, but share the same firewall, which monitors and filters traffic on the ISP. Configuration in a double firewall, a firewall is placed between the intranet and the DMZ and another firewall is placed between the DMZ and the Internet connection. This configuration is safer because it provides two layers of defense against external attacks.
NOTE: The term "DMZ" or "DMZ" is a military term used to describe a neutral zone where military operations are not allowed to take place. These areas usually exist along the boundary between two different countries. They act as a buffer and are designed to avoid unnecessary escalation of military action. Similarly, a DMZ is a neutral zone within a computer network which can be accessed by both internal and external computer systems.