Preview

You Decide week 5

Good Essays
Open Document
Open Document
831 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
You Decide week 5
You Decide
Professor:
To: Kim Brown, Branch Manager
CC: Ken Rogers, Corporate Manager
From
Subject: Access Control Lists
Date: 10/06/2013
Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;
1. Secured network against hackers through ACLs and the Firewall
2. Provide security against spoofy and DoS attacks



References: http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/12.2_55_se/configuration/guide/swacl.htmlhttp://www.gtcc-it.net/billings/acltutorial.htm

You May Also Find These Documents Helpful

  • Good Essays

    Week Four

    • 942 Words
    • 4 Pages

    Police corruption, misconduct, and brutality in the United States are all around from state to state, and going on for years. Abuses from public authority are worldwide police who are violating police departments regulations and rules. Corruptions by police are very illegal and are consequences of an officer authority may include selling drugs, extortion and fencing stolen goods. Police departments establishes codes of conduct, and investigate and remedial advice. Federal law specifically targets police misconduct applicable to local officers in officers working correctional (Howell Ron, 2002). Police misconduct and corruption is an international problem and historically factor development of police institutions, and a problem counterinsurgency. The U.S.- led North Atlantic Treaty organization police training program in Afghanistan have high police abuse and corruption by police corruption abuse and corruption and caused Afghans to seek assistance of Taliban against their government. The Blue-ribbon commissions have the most reliable and extensive knowledge about corruption by police many reports, created to sole purpose of conducting investigations of police corruptions. Commissions reduce police corruption by creating oversight over police with special focus on integrity, changing the organizations culture tolerating misbehavior less, and holding all commanders responsible for misbehavior of subordinates. Commission relay on contextual conditions that are not found in countries emerging conflict and facing threats to their security (Robert Perito,…

    • 942 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 4

    • 262 Words
    • 2 Pages

    Macro is designed for the do-it-yourselfer. The software program is ranked among the most useful tools of Microsoft programs. They took a task that would have been executed manually and made it automatic for many computer tasks. This can be from a simple task of creating spreadsheets or worksheets to a very complex task of exporting journal entries in an Excel program into an accounting package and the creating reports in Word. What makes Macros so great tis that in a lot of cases you don’t need to be an expert to set it up? You need to invest a little of time to learn the language they are written it…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 6 - You Decide

    • 894 Words
    • 4 Pages

    Part I: Discuss the various forms of organization that are available to Penelope, Mark, and John.…

    • 894 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 3 You Decide

    • 543 Words
    • 3 Pages

    Raymond Burke’s idea is great. It gives us the safest hit in the new market and keeps our risk low. The con is that we might lose our technological advantage in 2 years. Another con is that we lose most of our control and money if we partner with an existing company.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide, Week 5

    • 777 Words
    • 3 Pages

    Is Software Inc. liable for the cost of the ring Coleman stole? I would say no. Even though Coleman was on a business trip acting as an agent of the company, going to the jewelry store was not part of his job. “A person dealing with an agent cannot hold the principal liable for any act or transaction of the agent not within the scope of his/her actual or apparent authority” (USLEGAL, Inc., 2012). If Coleman had been in the jewelry store doing business, then Software Inc. could be held liable.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 6 You Decide

    • 1981 Words
    • 6 Pages

    You are a valued colleague and friend of this threesome, and they have come to you seeking advice as to how to structure their new business. They have the knowledge to figure it out themselves but are looking for the advice of an unbiased third party. Please consider the following tax and nontax considerations as you recommend an entity choice to Penelope, Mark, and John.…

    • 1981 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    It Week 5

    • 293 Words
    • 2 Pages

    The article from Product News Network (2007) introduces 4TOPS, a mail merger that can be embedded within Microsoft® Access®.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 3

    • 412 Words
    • 2 Pages

    1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities are to your infrastructure so that you know where the most attention is needed to make the…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Telecoms has not been updated in 15 years and is not integrated with customer service database to improve call management efficiency…

    • 782 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    9 True or False: Access control is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    7. Which of the following attack strategies has the highest success rate of making a particular system vulnerable?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve…

    • 477 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.…

    • 1206 Words
    • 7 Pages
    Powerful Essays