7040 Week 6 Discussion Comments

docx

School

Wilmington University *

*We aren’t endorsed by this school

Course

IST-7040

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by Admys

Report
Comment 1: Nice discussion. Let me add few more points. Network Access Control (NAC) ensures that users who get access to networks, data, devices, and software resources are appropriately permitted. In many circumstances, this is primarily a security concern, as it ensures that sensitive data and functionalities do not fall into the hands of those who may use them maliciously or mistakenly. Network NAC is vital for this reason because it can manage the policies that define and execute access requirements, ensuring that access from diverse endpoints is consistent. It ensures that any endpoint connected to a network meets a security state baseline, as well as allowing administrators to grant, deny, and quarantine access on an individual basis. Reference Professor Messer. (2011).  Network Access Control - CompTIA Security+ SY0-301: 1.3.  [Video]. Retrieved from https://www.youtube.com/watch?v=iVN18aSfQSk Comment 2: Great Post. I would like to add that access controls have four broad purposes: identity verification, authentication, authorization, and accountability. They enable us to limit who and what has access to our information resources. Together, these actions provide access to resources and place limitations on what a subject may do with them. One or more procedures are used in identity management to confirm a subject's identification who is seeking to access an item. It does not, however, completely guarantee the subject's identification. Instead, it offers a degree of assurance's plausibility. The likelihood relies on the identity verification procedures in place and how reliable they are overall. Reference Professor Messer. (2011).  Network Access Control - CompTIA Security+ SY0-301: 1.3.  [Video]. Retrieved from https://www.youtube.com/watch?v=iVN18aSfQSk Comment 3: Great Post. I would like to add that despite being quite complex, NAC will work extraordinarily well if we use it in the right situation. It may be utilized in geographically dispersed areas by merging all the parts. In order to set up a NAC, you'll need authentication servers, databases, and a means of using users and passwords to administer those databases. All of these things may be incorporated into an existing name service that customers use for other authentication methods. Before we implement network access control on a broad scale, all these various issues must be taken into account from a security viewpoint. If one of those systems goes down or fails, nobody will be
able to log into the network, hence all those systems will need to be redundant. Reference Professor Messer. (2011). Network Access Control - CompTIA Security+ SY0- 301: 1.3. [Video]. Retrieved from https://www.youtube.com/watch? v=iVN18aSfQSk
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help