Preview

IS3230 Lab 7 Chris Wiginton

Satisfactory Essays
Open Document
Open Document
155 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Lab 7 Chris Wiginton
IS3230 Lab 7 Multi-Factor Authentication Process
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
1 May 2014

Multi-Factor Authentication Process

Area
Authentication Process(es)
Authentication Factors
Authentication and Authorization
LDAP /Kerberos Authentication, Token , Session Timeline
Username , Password
Token, Pin, Biometric
Device Support
Device should not be end of life and under support contract
Vendor Supported Firewalls using Approved Product List (APL)
Interoperability
ISO and IEEE Standards for Encryption
Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods.
Multiprotocol Support
TCP, UDP, ESP, SSL
ACL only allows trusted endpoints based on Port and Protocol
Packet Encryption
IKE - Internet Key Exchange
VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.
Router Management
Out-of-Band Management
Username and Password Authentication.
Traffic
VPN and Tunnel Based Traffic
ACL and Tunnel Traffic Established Between Trusted End Points.
UDP and TCP
Protocol Enforcement with Stateful Firewall Access list
Source and Destination, Address and Session established with Layer 7 Firewall Protection.

You May Also Find These Documents Helpful

  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    lab8 is3440

    • 129 Words
    • 1 Page

    1 Bascially RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The e-commerce server could be placed in the DMZ with the private and credit card data stored inside the internal network. The commerce server will have access to the private data and will pass it in an encrypted form to and from wherever it needs to go.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    References: Cisco Unified WAN Services: Services, Security, Resiliency, and Intelligence - Cisco. (n.d.). Retrieved from http://www.cisco.com/en/US/prod/collateral/routers/ps9343/solution_overview_c22-450358_ps9343_Products_White_Paper.html…

    • 681 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1230 Lab 10

    • 1546 Words
    • 8 Pages

    12. Take a screen shot showing of the Event Viewer console, showing the Critical & Warning custom view by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl + V.…

    • 1546 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAB 6

    • 5674 Words
    • 23 Pages

    CHM130 Lab 6 Exploring Density Name A. Data Tables Place your completed Data Tables here Part IIIa (3 points) Volume of water in graduated cylinder (mL)10 mlMass of rubber stopper (g)11.15Volume of water and rubber stopper (mL)16.5 Part IIIb (6 points) Volume of water in graduated cylinder (mL)20Mass of iron nail (g)3.66Volume of water and iron nail (mL)20.5 Part IV (20 points) Type of Aluminum FoilMass (g)Length (cm)Width (cm)Volume (cm3)Thickness (cm)Regular.63g15 cm 10.02 cm.21 cm3.0014 cm Heavy Duty.97g15 cm10.01 cm .36 cm3.0024 cm B. Follow Up Questions Show all work for questions involving calculations. Part I Use the concepts/vocabulary of density to explain why the liquids formed layers in Part I of the procedure. (8 pts) The liquids formed layers because they all had different densities. The liquids with light density were towards the top of the layers. What was the control used during the liquid portion of Part I of this experiment (8 pts) (Hint What did you do the same with each liquid to ensure a fair comparison) The control used during the portion of part I was the amount of liquid used. Rank the following in terms of relative density (9 pts) Isopropyl alcohol (rubbing alcohol) lowest relative density Liquid dishwashing detergent- intermediate relative density Dark corn syrup-high relative density Vegetable oil-second lowest relative density (intermediate) Glycerin-second highest relative density Rubber stopper- second highest relative density Cork stopper- low relative density (ended up with the alcohol Wood- low relative density (ended at the top with the rubber alchohol. Lead- highest relative density Part II (7 pts each) In Part II, what happened to the cans of soda when you placed them in water Use the concepts/vocabulary of volume and mass to explain the final positions of the cans in the sink full of water. The diet soda floated in the water while the regular soda sank. The regular soda had a higher relative…

    • 5674 Words
    • 23 Pages
    Satisfactory Essays
  • Powerful Essays

    As you can see that from the header the name of the company in which I choose to select is called International Goods 2 Go. Yes, this is a fictional company that focuses on the importing and exporting of goods internationally. International Goods 2 Go, seeks to establish long term customer relationships by bridging our customer 's needs with our supplier 's capabilities being mindful of all environmental, safety, and regulatory compliance requirements. International Goods 2 Go will continually expand our knowledge of specific industries and provide successful logistical solutions for our customers. The reason why I chose to do a company like this because I have been working in logistics for quite some time now and this industry really drives me and keeps me motivated. I liked the idea of the company being international because I believe in the benefits of building relationships overseas are as follows:…

    • 2699 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    bb321

    • 523 Words
    • 3 Pages

    Within this report I will be examining the positives and negative aspects of being a member of the Bra Boys. The Bra Boys is an Australian gang founded and based in Maroubra. Dating back to the 1990s, the gang has gained notoriety through violent clashes with members of the public and police. The gang achieved national and broad attention in with the release of a feature-length documentary entitled Bra Boys: Blood is Thicker than Water, written and directed by members of the gang.…

    • 523 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lb166

    • 1621 Words
    • 6 Pages

    Brompton Bicycles is a London based company, which is part of rapidly expanding global market. There is currently huge potential for growth within the industry.…

    • 1621 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CYPCore31 5

    • 206 Words
    • 1 Page

    The effects that transitions may cause children to suffer are bed wetting, thumb sucking and talking like a younger child. This is regression.…

    • 206 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IELM4200

    • 1317 Words
    • 6 Pages

    Basics of Supply-Chain Management IELM 4200, Fall 2011 Dr. Emily Au Dept. of IELM, HKUST Note02: Basics of OM 1 What is a supply chain? • A supply chain is a goal-oriented network of _________ and ____________ used to deliver goods and services to customers. Fundamental activity: flow of entities through processes Note02: Basics of OM 2 Key performance measures • Throughput (TH): the rate at which entities are processed by the system. • Work in Process (WIP): the number of entities in the system, which can be measured in physical units (e.g., parts, people, jobs) or financial units (e.g., dollar value of entities in system). • Cycle Time (CT): the time it takes an entity to traverse the system, including any rework, restarts due to yield loss, or other disruptions.…

    • 1317 Words
    • 6 Pages
    Satisfactory Essays