7040 Week 6 Discussion Comments
docx
keyboard_arrow_up
School
Wilmington University *
*We aren’t endorsed by this school
Course
IST-7040
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by Admys
Comment 1:
Nice discussion. Let me add few more points. Network Access Control (NAC) ensures that users
who get access to networks, data, devices, and software resources are appropriately permitted. In many circumstances, this is primarily a security concern, as it ensures that sensitive data and functionalities do not fall into the hands of those who may use them maliciously or mistakenly. Network NAC is vital for this reason because it can manage the policies that define and execute access requirements, ensuring that access from diverse endpoints is consistent. It ensures that any
endpoint connected to a network meets a security state baseline, as well as allowing administrators to grant, deny, and quarantine access on an individual basis.
Reference
Professor Messer. (2011).
Network Access Control - CompTIA Security+ SY0-301: 1.3.
[Video]. Retrieved from
https://www.youtube.com/watch?v=iVN18aSfQSk
Comment 2:
Great Post. I would like to add that access controls have four broad purposes: identity verification, authentication, authorization, and accountability. They enable us to limit who and what has access to our information resources. Together, these actions provide access to resources
and place limitations on what a subject may do with them. One or more procedures are used in identity management to confirm a subject's identification who is seeking to access an item. It does not, however, completely guarantee the subject's identification. Instead, it offers a degree of
assurance's plausibility. The likelihood relies on the identity verification procedures in place and how reliable they are overall.
Reference
Professor Messer. (2011).
Network Access Control - CompTIA Security+ SY0-301: 1.3.
[Video]. Retrieved from
https://www.youtube.com/watch?v=iVN18aSfQSk
Comment 3:
Great Post. I would like to add that despite being quite complex, NAC will work extraordinarily well if we use it in the right situation. It may be utilized in geographically dispersed areas by merging all the parts. In order to set up a NAC, you'll need authentication servers, databases, and a means of using users and passwords to administer those databases. All of these things may be incorporated into an existing name service that customers use for other authentication methods. Before we implement network access control on a broad scale, all these various issues must be taken into account from a security viewpoint. If one of those systems goes down or fails, nobody will be
able to log into the network, hence all those systems will need to be redundant.
Reference
Professor Messer. (2011).
Network Access Control - CompTIA Security+ SY0-
301: 1.3.
[Video]. Retrieved from
https://www.youtube.com/watch?
v=iVN18aSfQSk
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help