Question

In: Computer Science

Suggest possible security strategies needed to support encryption and network access control.

Suggest possible security strategies needed to support encryption and network access control.

Solutions

Expert Solution

These are the points to be kept in the mind while building encryption and network access control

1. Try to install NAC server.Allow all netwoking devices (wireless access points and switches) to get authentication from the NAC server.
2. Set a good authentication rules on the NAC server.So that only the authenticated users or resources(devices)can access the network
3. Try to protect your storage device(internal and external) with a strong password.
4. Enable multi-factor authentication:By providing two forms of authentication it becomes difficuilt for an unauthorized user again access.
5.Packet filters should be set up on routers,firewalls and servers.
6.Provide a full disk encryption.Try to install softwares like FileVault2 to provide full disk encryption .
7.Try to provide proxy Authentication to ensure three-tier security
8.Provide a discretionary access control so that only the verfied user get the privileged access to perform an operation.
9. Profiling should be done to scan end-user and their devices to ensure they are not potential threats to the network resources.
10.Try to avoid Guest access that NAC solution is providing now.
11.Security analytics should be strengthen in order to detect malicious behavior that could lead to exfiltration, stolen credentials,attack to the network infrastructure.


Related Solutions

For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
In reference to network access control, describe some of the access control mechanism used by a...
In reference to network access control, describe some of the access control mechanism used by a network administrator to filter, inspect and detect different forms of traffic.
How do the IEEE 802.1x standards improve network access control?
How do the IEEE 802.1x standards improve network access control?
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about...
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about other countries including terrorist activities?
suggest two or three possible techniques that can be utilized to minimize or reduce network congestion...
suggest two or three possible techniques that can be utilized to minimize or reduce network congestion and explain why this is an appropriate technique. 250 words
Windows administration answer this question for computer network To provide support to Active Directory, suggest your...
Windows administration answer this question for computer network To provide support to Active Directory, suggest your DNS strategy: Active Directory is dependent on DNS as a domain controller location mechanism and uses DNS domain naming conventions in the architecture of Active Directory domains. There are three components in the dependency of Active Directory on DNS: Domain controller locator (Locator) Active Directory domain names in DNS ● Active Directory DNS objects Internal DNS External DNS 1) What is the advantage of...
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
My employer has me creating a system and tasked me to select network and access security...
My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
Describe the difference between authentication and access control. How do each of these concepts support the...
Describe the difference between authentication and access control. How do each of these concepts support the confidentiality and integrity of the data they protect? How does the “principle of least privilege” increase this support on the access control side? Describe how multi-factor authentication increases the confidence that someone is who they claim to be (i.e. that the person logging in is actually that person.)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT