Preview

lab 5

Good Essays
Open Document
Open Document
718 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab 5
Lab 5 Assessment Questions
1. What are the three major categories used to provide authentication of an individual?
a. Password
b. Token
c. Shared Secret

2. What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process

3. Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at LAN-to-WAN Domain level.
a. Remote Access Servers
b. Authentication Servers
c. Logical IDS

4. When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control?
a. MAC Address Authorization configured for to protected each network port
b. MAC Address Profiling
c. Secured VLAN deployment for devices that meet this standard and cannot meet more intelligent solutions such as security posture assessment.

5. What is a Network Access Control (NAC) System? Explain its benefits in securing access control to a network. Network Access Control (NAC) System enforces network security policies at the network access point rather than the client operating system. NAC systems also require authorization of the client operating system security posture before being allowed access to resources on the network. Endpoints or users that fail authentication are blocked from any network access either by physically shutting down the port or logically by blocking the MAC or IP addresses.

6. Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites.
The PKI infrastructure provides for the generation, production,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1) Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    7. For each of the seven domains of a typical IT infrastructure, what process or procedures would you perform to obtain information about security controls and safeguards?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cloud Computing

    • 1194 Words
    • 5 Pages

    Network security architecture is the design and planning of the campus network that are aimed at reducing security risks in accordance with the institution’s risk and analysis policies. The traditional network design focused on creating a secure network perimeter and strategically places a firewall at the point where the network is connected to the internet. However, the traditional design is problematic and there is concern about security threats from inside the perimeter that is protected by the firewall.…

    • 1194 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    * Security – Port security at the access level and policies at the distribution level make the network more secure.…

    • 1870 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Review Related Litterature

    • 15100 Words
    • 61 Pages

    the roles of each type of server in a domain, and why an administrator might…

    • 15100 Words
    • 61 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Security

    • 495 Words
    • 2 Pages

    For the first few decades of their existence, computer networks where primarily used by university researchers. Network security involves the authorization of access to data . Users assigned an ID and password that allows them to access the information and programs with in their authority. Network security covers verity of computer networks both public and private that are used in everyday jobs conducting transactions and communications among business, government agencies and individuals.…

    • 495 Words
    • 2 Pages
    Satisfactory Essays