Question

In: Computer Science

For Network Access Control and Cloud Security You are required to research and report on this...

For Network Access Control and Cloud Security

You are required to research and report on this topic according to the Detail of Question below.

A. Select one paper to: Read, understand in order to present three main parts:

1. Summary:

o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space!

2. Main points:

o The main issues as you see them.

o This is different than the summary.

3. Strengths and Weaknesses:

o Provide some critical analysis of the paper under review, positive and/or negative.

Solutions

Expert Solution

Today's network sites entities are packed with full of security.

The security describes that it provides the password authentication in order to login to any other confidential website.

Employees bring their laptops and mobile phones in and out of the office so all the PC's should be secured. Business outsources requires direct partnership access into the internet. Whereas outside vendors need indirect access and they need the password inorder to login to the website for business and transactions.

According to the cyber security, Insider attacks are causing much more damage and the damages are loss of money, disclosure of confidential information and violation of some of the privacy laws.

The main points in the Network access control are:

These network access technology consists of basically two types:

> User authentication

> Device compliance evaluation

Strengths and weakness of Network access protocol are :

> Control who can get onto your LAN and limit what resources they can reach;

> Protect your valuable IP;

>

Limit the reach of less-trusted or less-known users, such as contractors, technicians, remote users, or offshore workers;

> Restrict who can access sensitive financial or customer records;

> Control access to data based on role, time of day, location, and application;

> Segment users to meet compliance requirements;

Protect against known and unknown malware;

> Simplify incident response;

> Protect critical application services.

Potential threats for cloud security is :

> Man in the middle attack

> Distributed Denial of service.

> Account or service traffic hacking.

Thses are the main points and strength and weakness of network access control and cloud security.


Related Solutions

Discuss security in the cloud using the shared responsibility model and identity and access management (IAM)....
Discuss security in the cloud using the shared responsibility model and identity and access management (IAM). Discuss the networking services that can be used to build a VPC for the company.
How does the cloud consumer interact with the appropriate systems to gain access to the required...
How does the cloud consumer interact with the appropriate systems to gain access to the required services. What different portals help the consumer to achieve this?
How do the IEEE 802.1x standards improve network access control?
How do the IEEE 802.1x standards improve network access control?
cloud computing (research paper): The report will contain a more in depth explanation. The report should...
cloud computing (research paper): The report will contain a more in depth explanation. The report should be two pages long in MLA format.
A research project focused on developing a security policy for the use of cloud computing and...
A research project focused on developing a security policy for the use of cloud computing and mobile devices in a selected business environment. Developing a security policy for the use of cloud computing and mobile devices. A summary that would be appropriate to give your manager so that he/she would know the essence of your project. • Description of the business environment. • Compliance or other regulatory requirements under which this business operates. • Description of the specific cloud service...
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?  
You are required to research and report on this topic according to the Detail of Question...
You are required to research and report on this topic according to the Detail of Question below. Detail of Questions A. Alice is sending an encrypted message to Bob. 1. Discuss Kerckhoff’s principle. 2. What should be kept secret? B. By using the plain text, key and IV, convert the following plaintext to cipher-text using the below mode: 1. Block Cipher Chain (CBC) Plain Text: 111100011000001 Key: 1 2 3 4 4 1 2 3 IV = 0111 C. The...
You can use up to three levels of security and protection to control who can access...
You can use up to three levels of security and protection to control who can access and change your Excel data. Please describe two of the three levels and how you access each of them.
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
My employer has me creating a system and tasked me to select network and access security...
My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT