Saturday, May 23, 2020
Duke Energy Plan And Address The Security Aspects Of Its...
Firewall Application Introduction Duke Energy should carefully plan and address the security aspects of its network by implementing appropriate firewalls. Duke Energy should implement appropriate security management practices and controls when maintaining and operating a secure network. It is imperative to ensure that the architecture of its network complies with industry standard security requirements. Duke Energy s IT organizations should commit to the ongoing process of maintaining the security of device connected to their network. Securing Network of Duke Energy Duke Energy is a large utility company in the United States and it is vital that they proactively safeguard its IT infrastructure. Duke Energy s infrastructure assistsâ⬠¦show more contentâ⬠¦Firewalls are used to separate networks with differing security requirements, such as the Internet and an internal network that houses servers with sensitive data. Duke Energy should use firewalls wherever their internal networks and systems interface with external networks and systems, and where security requirements vary among their internal networks. Threats have gradually moved from being most prevalent in lower layers of network traffic to the application layer, which has reduced the general effectiveness of firewalls to stop threats carried through network communications (Scarfone, Hoffman, 2009). However, firewalls are still needed to stop the significant threats that continue to work at lower layers of network traffic. Firewalls protect sites from an exploitation of inherent vulnerabilities in the TCP/IP protocol suite (Wack, Cutler, Pole, 2002). Additionally, firewalls help mitigate security problems associated with insecure systems and the problems inherent in providing robust system security for large numbers of computers. There are several types of firewalls, ranging from boundary routers that can provide access control on Internet Protocol packets, to more powerful firewalls that can close more vulnerability in the TCP/IP protocol suite, to even more powerful firewalls that can filter on the content of the traffic (Wack et al., 2002). Firewall Ruleset Firewall rules are generally specified in a structured textual form. To
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.