Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 4 of 13 pages
Running head: ACCESS MANAGEMENT ACCESS MANAGEMENT Name of the Student Name of the university Author note
1ACCESS MANAGEMENT Abstract Security is one of the major issues in the context of information system. Network Access Control is considered as the solution to networking security issues and this makes use of different set of protocols for defining as well as implementing a policy describing how a network can be accessed. Access management is important as it is required to keep a check as to who is accessing a network. The main aim of access control is minimizing the various risks of the unauthorized access. The paper will discuss on the access management techniques in the system and network security. The way in which these techniques are preventing the intruders from getting into the network is to be analyzed. How effective are these in preventing cyber attacks is another major topic of discussion in the paper. Lastly, the paper will recommend certain ways in which these systems can be enhanced.
2ACCESS MANAGEMENT Table of Contents Introduction................................................................................................................................3 Research Questions....................................................................................................................3 Research Aims and Objectives...................................................................................................4 Literature Review.......................................................................................................................4 Research Methodology...............................................................................................................8 Ethics in research...................................................................................................................8 Timeline.................................................................................................................................9 Reference..................................................................................................................................10
3ACCESS MANAGEMENT Introduction Themostimportantaspectintheenterprisenetworks,networksofcritical infrastructures and multi-tenant data centre networks is providing proper security. To add to the already complicated and complex process of ensuring security of the networks is the various networking equipments that are made use of in these networks.The equipments include switches, middleboxes, routers and end host vulnerabilities. In this case, deployment of various security policies requires some specific network settings and these settings cannot be just arbitrary in nature. The settings should be done as per the standards as well as the featuresofvariousequipmentsinanetwork.Thus,asanetworkinvolvessomany equipments there is a need to manage as to who can access the same and who cannot. This requireshandlingthecomplicaciesin anetworkandherecomestheplayof access management techniques. Network Access Control refers to an approach to the security of a computer system that takes under its purview endpoint security technologies such as host intrusion prevention, antivirus, and network security(Li & Hong, 2016). In this domain, network security comprises of various policies as well as practices that need to be adopted so that unauthorized access and other such attacks to any network can be prevented. In this paper, access management techniques in the system and network security will be discussed. Research Questions The research questions that will be considered in this case are as follows: 1. How have access management techniques been modified or new innovations made, to make them suitable for this increasingly growing digitalization? 2. How effective these techniques have been in controlling unauthorized access to any network?
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss