In: Computer Science
For Network Access Control and Cloud Security
You are required to research and report on this topic according to the Detail of Question below.
A. Select one paper to: Read, understand in order to present three main parts:
1. Summary:
o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space!
2. Main points:
o The main issues as you see them.
o This is different than the summary.
3. Strengths and Weaknesses:
o Provide some critical analysis of the paper under review, positive and/or negative.
Today's network sites entities are packed with full of security.
The security describes that it provides the password authentication in order to login to any other confidential website.
Employees bring their laptops and mobile phones in and out of the office so all the PC's should be secured. Business outsources requires direct partnership access into the internet. Whereas outside vendors need indirect access and they need the password inorder to login to the website for business and transactions.
According to the cyber security, Insider attacks are causing much more damage and the damages are loss of money, disclosure of confidential information and violation of some of the privacy laws.
The main points in the Network access control are:
These network access technology consists of basically two types:
> User authentication
> Device compliance evaluation
Strengths and weakness of Network access protocol are :
> Control who can get onto your LAN and limit what resources they can reach;
> Protect your valuable IP;
>
Limit the reach of less-trusted or less-known users, such as contractors, technicians, remote users, or offshore workers;
> Restrict who can access sensitive financial or customer records;
> Control access to data based on role, time of day, location, and application;
> Segment users to meet compliance requirements;
Protect against known and unknown malware;
> Simplify incident response;
> Protect critical application services.
Potential threats for cloud security is :
> Man in the middle attack
> Distributed Denial of service.
> Account or service traffic hacking.
Thses are the main points and strength and weakness of network access control and cloud security.