StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Access Control - Assignment Example

Cite this document
Summary
The author of the current paper "Network Access Control" will begin with the statement that with the growth of technology, it is almost impossible today for business enterprises to face real system threats via malicious access, poor configuration, or misuse…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful

Extract of sample "Network Access Control"

Most security threats are caused by desktop settings and expired security patches. The fact that technologies in place such as vulnerability and patch management systems provide reactive mechanisms to keep systems up-to-date. They leave out important elements of adequate solutions: accommodating out-of-date systems and putting in place ways to repair them without integration with the IT help desk. These problems are addressed by network access control mechanisms that audit endpoints' security prior to connection to the standard corporate network. Which in turn keeps off the network worms and viruses, it also gives room for application-level security protocol enforcement.

We will rely on the Bradford cloud platform which is capable of helping businesses provide secure network access from trusted devices in a bring-your-device scenario; it can also prove compliance with regulations like Health Insurance Portability and Accountability Act by giving the ability to differentiate between corporate and individual devices, and network access provision accordingly; gaining inventory of all devices and users within their network range; and automatic network provisioning and control based on responsibility, type of device, location, time of day among other factors.

For this project we are going to use Sygate’s Compliance on Contact technology which stands up to the promise of network access control today, putting in place policies through various access methods and network protocols. The scope of Sygate’s solution, factors in not only the basics of the network access control solution but also the range of features needed to make a scalable and acceptable solution, this makes Sygate the best choice for real-world network access control deployments. Partnering with Microsoft, Cisco, and the Trusted Computing Group, Sygate provides an answer that doesn’t constrain administrators to choose between these three architectures but even permits administrators to make use of the best features of each to solve problems.

This project will look at the goals of network access control in addressing security; we will look at policy enforcement, mitigation of zero-day attacks, and identity and access management. The major challenges we expect to face are first analyzing the major different data sources within the project period time might not be enough to sort all the data and center on only reliable ones, since it’s a group project it might also be hard for us to find time to converge together and put down our research outcome and agreeing on important issues from our different views, cost also might be a problem since it might be bound to rise.

The paper will be based on the framework of the goal evaluation. The project is focused more on goal evaluation from the view that it looks into the various goals of network access control broadly.

 

Research Schedule

ITEM

TIME FRAME

Literature search

November 27 to December 2

Data collection

December 3 to December 6

Data analysis and interpretation

December 7 to December 11

Report writing

December 12 to December 16

Consultation and correction

December 17 to December 19

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Access Control Example | Topics and Well Written Essays - 586 words, n.d.)
Network Access Control Example | Topics and Well Written Essays - 586 words. https://studentshare.org/logic-programming/2046843-network-access-control
(Network Access Control Example | Topics and Well Written Essays - 586 Words)
Network Access Control Example | Topics and Well Written Essays - 586 Words. https://studentshare.org/logic-programming/2046843-network-access-control.
“Network Access Control Example | Topics and Well Written Essays - 586 Words”. https://studentshare.org/logic-programming/2046843-network-access-control.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Access Control

QuickTest or WinRunner

Its unique Keyword-driven testing approach enables the test automation experts to have full access to the underlying test and object properties, via an integrated scripting and debugging environment that is round-trip synchronized with the Keyword View (Mercury QuickTest Professional, 2007, para....
5 Pages (1250 words) Essay

Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway

The hardware address is as well known as the media access control (or MAC) address.... To verify the network segment a media access control address fits in, bridges employs one of (Tutorials Web, n.... The author of the paper compares and contrasts the functioning of the components of the repeater, bridge, network routers, and gateway.... Then the author of the paper examines the sharing and transmitting of the data files to some other attached LAN network… A gateway establishes a connection between the internet and telephone network....
8 Pages (2000 words) Assignment

Securing Jacket-X Corporations Network against Cyber Threats

Also in order for Jacket-X to gain control of their network from unauthorized access would involve the use of MAC address filtering.... By using firewalls Jacket-X can be able to examine and validate address information on all packets of data as well as protect data stored in the network from unauthorized access (Roberta Bragg, 2004).... In the case of Jacket-X's wireless network, it would be advisable to enable WPA (Wi-Fi Protected access) encryption to facilitate the protection of data that is transmitted over a wireless network....
5 Pages (1250 words) Coursework

Access Control and Policies

Network Access Control for dummies.... This paper will review advantages and disadvantages of the access control models present.... It will Access Controls and Policies Access Controls and Policies access control involves the mediation of whether certain data and resources can be attained by persons.... This paper will review advantages and disadvantages of the access control models present.... Advantages and disadvantages of the access controls One advantage of the access control Lists (ACLs) is the protection it offers users of a system....
2 Pages (500 words) Assignment

Information Security Access Control Methods

) Network Access Control:It is a method of strengthening the network security by limiting the accessibility of network resources to communicating devices that fulfill with a proposed security policy.... Network Access Control method restricts the end users from accessing particular resources within the network.... 396-397) A well planned Network Access Control strategy includes anti-threat applications like anti-viruses, intrusion detection systems, spywares prevention programs, as well as access control lists (ACLs)....
1 Pages (250 words) Assignment

Security Policy Implementation

Competitors can also access information and make the same brand.... Tier 1 will have an effective information security which will guarantee safety of company's data. Organization's information is sensitive and an organization should… Tier 1 can suffer loss of information....
3 Pages (750 words) Essay

Zigbee Networks and Specifications

The abundance of technological inventions in the environment generates the desire to control all of them with a centralized mechanism.... Gohn (2007) stated that the advancement in the domain of wireless networking and information technology has made an age-old dream come true of automating one's house with a centralized source of control.... This case study "Zigbee Networks and Specifications" presents Zigbee as a set of specifications that facilitate a low cost, low consumption power, low data transfer load, and non-complex wireless mesh network....
6 Pages (1500 words) Case Study

The Role of Information Security Policy

The author of "The Role of Information Security Policy" paper explores the various measures a company can take to safeguard its information theft and other elements.... No data is safe unless it is properly protected from both inside and outside influences.... hellip; Information security is vital to a company since it stores most of its information in large servers, which have the capacity of storing large amounts of data....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us