Access over 20 million homework & study documents

Compliance Plan

Content type
User Generated
Subject
Business
School
ashford university
Type
Homework
Rating
Showing Page:
1/15
1
Firewall Compliance Plan
Student's name
Institutional Affiliation
Course
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/15
2
Introduction
Every organization that serves under any network uses load balancing to ensure that
requests from each server are serviced on time and thus efficiency and minimal waiting times. As
these load balancers manage data traffic from the servers to the endpoint devices, security becomes
a critical concern. Denial of Service attacks is amongst the biggest threats to networked
environments and even websites. When DoS affects a system, the network's performance is
reduced since they send unnecessary traffic to the server (Shan et al., 2017). This means that ABC
customers are likely to experience delays and unavailability as they perform their tasks. As a result,
firewalls can be used to mitigate this security risk. In this case, proxy firewalls can be suitable for
ABC. Proxy firewalls operate at the application layer of the network and are thus referred to as
application-level gateways. Their goal is to block any malicious data packets and traffic requests
while permitting legitimate data traffic. Therefore, for the reverse proxy firewalls to work, they
first need to establish a connection with the traffic source. This standard is contrary to the rest of
the packets that allow direct connection to traffic. The link formed between the traffic sources is
vital in the inspection of any incoming data packets. Inspection may involve deep searching of
malware on packet content or evaluation of both the TCP handshake and the packet (Upadhyay,
2020). Once the inspection is over, the proxy sends the packet to its destination. Proxy firewalls
qualify as a security standard for ABC due to two reasons. Since they can perform deep packet
inspection, they can save servers from unsuspected malicious packets. This would benefit
customers since they would access the web servers without any worries of availability. ABC would
also benefit from a comprehensive security standard since proxy firewalls make it easier to spot
methods of a cyber-attack.
Type of Network Design

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/15

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 15 pages?
Access Now
Unformatted Attachment Preview
1 Firewall Compliance Plan Student's name Institutional Affiliation Course Date 2 Introduction Every organization that serves under any network uses load balancing to ensure that requests from each server are serviced on time and thus efficiency and minimal waiting times. As these load balancers manage data traffic from the servers to the endpoint devices, security becomes a critical concern. Denial of Service attacks is amongst the biggest threats to networked environments and even websites. When DoS affects a system, the network's performance is reduced since they send unnecessary traffic to the server (Shan et al., 2017). This means that ABC customers are likely to experience delays and unavailability as they perform their tasks. As a result, firewalls can be used to mitigate this security risk. In this case, proxy firewalls can be suitable for ABC. Proxy firewalls operate at the application layer of the network and are thus referred to as application-level gateways. Their goal is to block any malicious data packets and traffic requests while permitting legitimate data traffic. Therefore, for the reverse proxy firewalls to work, they first need to establish a connection with the traffic source. This standard is contrary to the rest of the packets that allow direct connection to traffic. The link formed between the traffic sources is vital in the inspection of any incoming data packets. Inspection may involve deep searching of malware on packet content or evaluation of ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents