Question

In: Computer Science

For Network Access Control and Cloud Security You are required to research and report on this...

For Network Access Control and Cloud Security

You are required to research and report on this topic according to the Detail of Question below.

A. Select one paper to: Read, understand in order to present three main parts:

1. Summary:

o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space!

2. Main points:

o The main issues as you see them.

o This is different than the summary.

3. Strengths and Weaknesses:

o Provide some critical analysis of the paper under review, positive and/or negative.

Solutions

Expert Solution

Today's network sites entities are packed with full of security.

The security describes that it provides the password authentication in order to login to any other confidential website.

Employees bring their laptops and mobile phones in and out of the office so all the PC's should be secured. Business outsources requires direct partnership access into the internet. Whereas outside vendors need indirect access and they need the password inorder to login to the website for business and transactions.

According to the cyber security, Insider attacks are causing much more damage and the damages are loss of money, disclosure of confidential information and violation of some of the privacy laws.

The main points in the Network access control are:

These network access technology consists of basically two types:

> User authentication

> Device compliance evaluation

Strengths and weakness of Network access protocol are :

> Control who can get onto your LAN and limit what resources they can reach;

> Protect your valuable IP;

>

Limit the reach of less-trusted or less-known users, such as contractors, technicians, remote users, or offshore workers;

> Restrict who can access sensitive financial or customer records;

> Control access to data based on role, time of day, location, and application;

> Segment users to meet compliance requirements;

Protect against known and unknown malware;

> Simplify incident response;

> Protect critical application services.

Potential threats for cloud security is :

> Man in the middle attack

> Distributed Denial of service.

> Account or service traffic hacking.

Thses are the main points and strength and weakness of network access control and cloud security.


Related Solutions

Suggest possible security strategies needed to support encryption and network access control.
Suggest possible security strategies needed to support encryption and network access control.
For Cloud Database Encryption Technology Based on Combinatorial Encryption You are required to research and report...
For Cloud Database Encryption Technology Based on Combinatorial Encryption You are required to research and report on this topic according to the Detail of Question below. A. understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as you see them....
In reference to network access control, describe some of the access control mechanism used by a...
In reference to network access control, describe some of the access control mechanism used by a network administrator to filter, inspect and detect different forms of traffic.
Assume that you are an IT Security Manager who needs to develop access control policies for...
Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area...
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
How does the cloud consumer interact with the appropriate systems to gain access to the required...
How does the cloud consumer interact with the appropriate systems to gain access to the required services. What different portals help the consumer to achieve this?
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM)....
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM). Discuss the networking services that can be used to build a VPC for the company.
How do the IEEE 802.1x standards improve network access control?
How do the IEEE 802.1x standards improve network access control?
cloud computing (research paper): The report will contain a more in depth explanation. The report should...
cloud computing (research paper): The report will contain a more in depth explanation. The report should be two pages long in MLA format.
You are required to research and report on this topic according to the Detail of Question...
You are required to research and report on this topic according to the Detail of Question below. Detail of Questions A. Alice is sending an encrypted message to Bob. 1. Discuss Kerckhoff’s principle. 2. What should be kept secret? B. By using the plain text, key and IV, convert the following plaintext to cipher-text using the below mode: 1. Block Cipher Chain (CBC) Plain Text: 111100011000001 Key: 1 2 3 4 4 1 2 3 IV = 0111 C. The...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT