In: Computer Science
For Network Access Control and Cloud Security (Cloud Database Encryption Technology Based on Combinatorial Encryption)
You are required to research and report on this topic according to the Detail of Question below.
A. understand in order to present three main parts:
1. Summary:
o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space!
2. Main points:
o The main issues as you see them.
o This is different than the summary.
3. Strengths and Weaknesses:
o Provide some critical analysis of the paper under review, positive and/or negative.
Hi, I would love to answer this question for you. I hope you would love an answer and get a clear idea related to the same. So not wasting much time let's get started.
Network Access Control and Cloud Security
Network Access Control or NAC is the security measure for the endpoint security inside the network and is been used in most organizations for providing security to the devices and the network in the form of intrusion prevention, vulnerability assessment, host intrusion detection, and firewall measures so as to prevent the internal network. Apart from this when someone tries to enter the network the authentication and the authorization is been performed so as to check the legitimacy of the user in the network.
Strengths and Weakness:- The strength of the NAC is that it provides the proper authentication and the prevention of the network on the cyber or the logical level and the weakness refers as that the no physical security is been provided.
While talking about Cloud Security this is the security measure for the prevention of the data on the cloud and hence preventing the user data from the attacker and preventing the data breaches. This is in both physical and the cyber form of security as the data centres need physical security too and is one of the major factors too. The use of the firewalls, IDS, IPS is the most in the Cloud security, to enhance the security the sandbox and the honeypots are been used to trap the attackers and sometimes trick them.
Strengths and Weakness:- The strength of cloud security is that the trapping techniques are been used to trap the attacker and making the data safer and preventing the breaches. The weakness in cloud security is that if the proper security not provided and if lead to the invasion will lead to the huge user data loss.
I hope you got an answer and a clear idea on the question
Please do comment for any queries and give thumbs up to an answer
Thanks and Happy to help :)
HAPPY LEARNING