Preview

IS3230 Lab 5 Chris Wiginton

Satisfactory Essays
Open Document
Open Document
1152 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Lab 5 Chris Wiginton
IS3230 Lab 5
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
17 April, 2014

1. What are the three major categories used to provide authentication of an individual?
a) something you know (e.g., a password)
b) something you have (e.g., a certificate with associated private key or smart card)
c) something you are (a biometric)
2. What is Authorization and how is this concept aligned with Identification and Authentication?
a) Authorization is the process of determining whether an entity, once authenticated, is permitted to access a specific asset.
b) Authorization is what takes place after a person has been both identified and authenticated; it’s the step that determines what a person can then do on the system.
3. Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at the LAN-to-WAN Domain level.
a) Firewalls: Controls the traffic flow between a trusted network and an untrusted network. Usually firewalls are used to protect the boundaries of a network.
b) Access control lists (ACL): Include restrictions on inbound and outbound connections, as well as connections between LAN segments internal to the site/enclave.
c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.
4. When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control? Name and define at least three.
a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.
b) Logical Network Port Security – Implemented by configuring the network switch such that specific ports accept connections from one or more specific MAC address (es). Only a device configured with the authorized MAC address is allowed to access that network port.
c) Port

You May Also Find These Documents Helpful

  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    C) the ability to remotely access the Internet. D) the Internet is an open, vulnerable design.…

    • 2051 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    • Question 13 The ____ is the most important part of any network, so usually it is given a higher level of security.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3350 Unit 4

    • 572 Words
    • 3 Pages

    | Edexcel Registration No: | | Unit Title | Networking Technologies | Assignment Reference | HND U24 LO 2…

    • 572 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. The goals for secure networking are availability for authorized users to access the network; confidentiality for preventing unauthorized users acces; functionality for preventing attackers from altering the operation capabilities and the access control policy driven controls…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    15 1. Physical Security Mechanisms: 15 2. System It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Good Essays

    7 Technical Feasibility……………………. 8 References………………………………. 10 APPENDIX I……………………………. 11 AAPENDIX II…………………………... 12 MOTIVATION Intrusion detection is defined to be the problem of identifying individuals who are using a computer system without authorization (i.e., crackers) and those who have legitimate access to the system but are exceeding their privileges (i.e., the insider threat). Work is being done elsewhere on Intrusion Detection Systems (IDS’s) for a single host and for several hosts connected by a network .…

    • 6146 Words
    • 25 Pages
    Good Essays
  • Good Essays

    General Computer Security

    • 2174 Words
    • 9 Pages

    ibm.com/developerWorks Section 1. Tutorial tips Should I take this tutorial? The objective of this tutorial is to give an overview of the security process surrounding computer systems. It is aimed at the computer professional who may or may not already have some security background. This tutorial is general in scope. Many of the issues covered here will be examined in more depth in future tutorials.…

    • 2174 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    b. Unwanted access can be turned off, or excluded when logged in via a monitoring service, as well as time restricted login. Any unauthorized logins will be recorded and terminated as well as site information and tracing information. Security measures are implied (camera, onsite security, etc.).…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Adobe Pass Case Study

    • 2760 Words
    • 12 Pages

    5. Architecture of Adobe Pass The following discusses the central entitlement transactions of authentication and authorization. Authentication is the process of confirming with a Pay TV provider that a given user is a known customer. Authorization is the process wherein a Pay TV provider confirms that an authenticated user has a valid subscription to a given resource.…

    • 2760 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Paper About Accounting

    • 769 Words
    • 4 Pages

    Chapter 1 Problem # 1 a. The purpose of transaction authorization is to ensure that all material transactions processed by the information system are valid and in accordance with management’s objectives. No transaction shall occur unless it is authorized. Authorizations may be general or specific. General authority is granted to operations personnel to perform day-to-day activities. It rules specified in advance. Specific Authorizations deal with case by case decisions associated with nonroutine transactions. However, in IT environment authorization may be imbedded in the coded program logic in a module and take place without visibility. Unauthorized transactions may not be noticed until well after the fact.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    * Security – Port security at the access level and policies at the distribution level make the network more secure.…

    • 1870 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Question 5. Objective: Explain the fundamental concepts and best practices related to authentication, authorization and access control.…

    • 1476 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Adasdsad

    • 6159 Words
    • 25 Pages

    INSTRUCTIONS: Choose and encircle the letter of the best answer. 1. At which layer of the hierarchical network design would you find switches that use access control lists to implement security?…

    • 6159 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    IDS are often considered as the functionality of firewall. But there is a thin line of difference between them. A firewall must be regarded as a fence that protects the information flow and prevent intrusions where as IDS detects if the network is under attack or if the security enforced by the firewall has been breached. Together firewall and IDS enhance the security of network.…

    • 1131 Words
    • 5 Pages
    Powerful Essays