Question

In: Computer Science

I am creating a system for a security design and need to choose controls for network...

I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.

Solutions

Expert Solution

Access control

Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device. Then you can enforce your security policies. You can block noncompliant endpoint devices or give them only limited access. This process is network access control (NAC).

Antivirus and antimalware software

"Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage.

Data loss prevention

Organizations must make sure that their staff does not send sensitive information outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner.

Firewalls

Firewalls put up a barrier between your trusted internal network and untrusted outside networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both. Cisco offers unified threat management (UTM) devices and threat-focused next-generation firewalls.

Intrusion prevention systems

An intrusion prevention system (IPS) scans network traffic to actively block attacks. Cisco Next-Generation IPS (NGIPS) appliances do this by correlating huge amounts of global threat intelligence to not only block malicious activity but also track the progression of suspect files and malware across the network to prevent the spread of outbreaks and reinfection.

Three principal types of Access Control Systems are available:

  • Stand-alone systems: Do not require any type of infrastructure or connectivity, the Access Control terminal itself has the memory and the capability to manage users. These entry-level systems are usually limited by the number of users which can be stored and generally don’t allow for scheduling. One or two entrances can be controlled. They are ideal for small shops, offices, warehouses, etc. with a maximum of 30 registered users.

  • Managed systems: Are networked and connected to a central software application from which users are administered, hours and calendars are controlled together with entry permissions. Managed systems also allow for system-wide monitoring and complete audits to be produced showing who entered where and when. These functions, when combined with CCTV surveillance and intrusion can offer very high levels of security at relatively low cost. For organisations of up to 2,000 employees

  • Corporate systems: Offer a complete web-based, multi-platform, multi-site software management system which can parameterise many different types of entry requirements. These solutions allow for seamless integration with third party systems: CCTV surveillance, intrusion, vehicle access, intercoms, alerts, messaging, asset management, cyber-security (mange both physical and logical access), time and attendance, tele-assistance, etc.


Related Solutions

My employer has me creating a system and tasked me to select network and access security...
My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.
Need answers for Normalization, Physical Design, Sql, And Security exam. 1. The database you're creating will...
Need answers for Normalization, Physical Design, Sql, And Security exam. 1. The database you're creating will be installed on a group of three servers. What feature of an enterprise RDBMS will allow one server to pick up the processing work if the main server becomes nonoperational? A. Failover B. Business intelligence C. Data warehouse D. Load balancing 2. What type of clause must you always use with DELETE or UPDATE to avoid inadvertently changing data elsewhere in the database? A....
C# Yahtzee Program I am creating a Yahtzee program where you have the option to choose...
C# Yahtzee Program I am creating a Yahtzee program where you have the option to choose 5 or more dice that will be rolled. I just need help trying to create a random dice roll and seeding it. Could you give me some code examples of getting a dice roll of a six sided die that won't display similar results.
I am doing this assignment using Kali Linux (COMPUTER SECURITY) I need to use crunch to...
I am doing this assignment using Kali Linux (COMPUTER SECURITY) I need to use crunch to generate all words which start with a lowercase letter, and then "YOURNAME(uppercase letter)", and then end with 2 digits. (e.g., "aIMAN23") I just need the screenshot of the crunch commands to follow. Using John the Ripper (In Kali Linux) I need the john command so I can use to Break test user's password: test:$6$fFEVS9TQoNU/aQsm$hxv5R1cSxwENUcdjxlI9WwbF8F3uruxAlDUf0vXaOAJRZnWhxr7zzLlFNJPGvc1pTdVV.lsuQkQh3mSjpy6SG/:18535:::::: I just need the screenshot to follow.
Scenario: I am creating a course for inclusion into an established nursing curriculum. I am supposed...
Scenario: I am creating a course for inclusion into an established nursing curriculum. I am supposed to describe the program level of the course am proposing. What do they mean by program level? This is a hypothetical community college with a two year nursing program.
I am working on creating a Broadcast Receiver. I am extremely new to Android development and...
I am working on creating a Broadcast Receiver. I am extremely new to Android development and Java. I added my code at the bottom. Whenever I press the button the app crashes. I'm assuming something is wrong with connecting the broadcastIntent() function. I appreciate any help :) Here are the directions from my professor: Create an empty project Create a method in MainActivity.java which creates a Broadcast. public void broadcastIntent(View view){        Intent intent = new Intent();        intent.setAction("my.CUSTOM_INTENT"); sendBroadcast(intent);...
I am working on creating a Broadcast Receiver. I am extremely new to Android development and...
I am working on creating a Broadcast Receiver. I am extremely new to Android development and Java. I added my code at the bottom of this, but whenever I press the button the app crashes. I'm assuming something is wrong with connecting the broadcastIntent() function. If you could really focus on the first part that would be great!! I appreciate any help :) Here are the directions from my professor: Create an empty project Create a method in MainActivity.java which...
Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select ONE of the six steps of the framework illustrated in the Risk Management Framework. In at least 250 words, discuss the following: Identify the step and associated government document. Discuss the importance of the...
Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select Three of the six steps of the framework illustrated in the Risk Management Framework below: STEPS: 1: Categorize Information System 2: Implement Security Controls 3: Assess Security Controls 4: Select Security Controls 5: Authorize...
What network security specialist do to fight hackers? I need all the information and clear explanation
What network security specialist do to fight hackers? I need all the information and clear explanation
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT